Message ID | 20230605033449.239123-1-liuxin350@huawei.com (mailing list archive) |
---|---|
State | Changes Requested |
Delegated to: | BPF |
Headers | show |
Series | libbpf:fix use empty function pointers in ringbuf_poll | expand |
Context | Check | Description |
---|---|---|
bpf/vmtest-bpf-next-PR | success | PR summary |
bpf/vmtest-bpf-next-VM_Test-16 | success | Logs for test_progs_no_alu32 on s390x with gcc |
netdev/tree_selection | success | Not a local patch |
bpf/vmtest-bpf-next-VM_Test-12 | success | Logs for test_progs on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-8 | success | Logs for test_maps on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-26 | success | Logs for test_verifier on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-11 | success | Logs for test_progs on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-10 | success | Logs for test_maps on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-24 | success | Logs for test_progs_parallel on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-14 | success | Logs for test_progs on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-1 | success | Logs for ShellCheck |
bpf/vmtest-bpf-next-VM_Test-2 | success | Logs for build for aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-4 | success | Logs for build for x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-5 | success | Logs for build for x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-6 | success | Logs for set-matrix |
bpf/vmtest-bpf-next-VM_Test-3 | success | Logs for build for s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-7 | success | Logs for test_maps on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-9 | success | Logs for test_maps on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-13 | success | Logs for test_progs on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-15 | success | Logs for test_progs_no_alu32 on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-17 | success | Logs for test_progs_no_alu32 on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-18 | success | Logs for test_progs_no_alu32 on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-19 | success | Logs for test_progs_no_alu32_parallel on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-20 | success | Logs for test_progs_no_alu32_parallel on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-21 | success | Logs for test_progs_no_alu32_parallel on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-22 | success | Logs for test_progs_parallel on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-23 | success | Logs for test_progs_parallel on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-25 | success | Logs for test_verifier on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-27 | success | Logs for test_verifier on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-28 | success | Logs for test_verifier on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-29 | success | Logs for veristat |
On 06/05, Xin Liu wrote: > From: zhangmingyi <zhangmingyi5@huawei.com> > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > the system does not check whether sample_cb is NULL during > ring_buffer__poll, null pointer is used. What is the point of calling ring_buffer__new with sample_cb == NULL?
On 06/06,Stanislav Fomichev wrote: > On 06/05, Xin Liu wrote: > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > the system does not check whether sample_cb is NULL during > > ring_buffer__poll, null pointer is used. > What is the point of calling ring_buffer__new with sample_cb == NULL? Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't make sense, and few people use it that way, but that doesn't prevent this from being a allowed and supported scenario. And when ring_buffer__poll is called, it leads to a segmentation fault (core dump), which I think needs to be fixed to ensure the security quality of libbpf.
On Thu, Jun 8, 2023 at 6:00 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > On 06/06,Stanislav Fomichev wrote: > > > On 06/05, Xin Liu wrote: > > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > > the system does not check whether sample_cb is NULL during > > > ring_buffer__poll, null pointer is used. > > > What is the point of calling ring_buffer__new with sample_cb == NULL? > > Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't > make sense, and few people use it that way, but that doesn't prevent this > from being a allowed and supported scenario. And when ring_buffer__poll is > called, it leads to a segmentation fault (core dump), which I think needs > to be fixed to ensure the security quality of libbpf. I dunno. I'd argue that passing a NULL to ring_buffer__new is an API misuse. Maybe ring_buffer__new should return -EINVAL instead when passed NULL sample_cb? Although, we don't usually have those checks for the majority of the arguments in libbpf...
On Thu, Jun 8, 2023 at 9:27 AM Stanislav Fomichev <sdf@google.com> wrote: > > On Thu, Jun 8, 2023 at 6:00 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > > > On 06/06,Stanislav Fomichev wrote: > > > > > On 06/05, Xin Liu wrote: > > > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > > > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > > > the system does not check whether sample_cb is NULL during > > > > ring_buffer__poll, null pointer is used. > > > > > What is the point of calling ring_buffer__new with sample_cb == NULL? > > > > Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't > > make sense, and few people use it that way, but that doesn't prevent this > > from being a allowed and supported scenario. And when ring_buffer__poll is > > called, it leads to a segmentation fault (core dump), which I think needs > > to be fixed to ensure the security quality of libbpf. > > I dunno. I'd argue that passing a NULL to ring_buffer__new is an API > misuse. Maybe ring_buffer__new should return -EINVAL instead when > passed NULL sample_cb? Although, we don't usually have those checks > for the majority of the arguments in libbpf... Right. I'd say we should add a proper doc comment specifying all arguments and which ones are optional or not. And make it explicit that callback is not optional. If we start checking every possible pointer for NULL, libbpf will be littered with NULL checks, I'm not sure that's good.
On Fri, Jun 9, 2023 at 1:39 AM Andrii Nakryiko <andrii.nakryiko@gmail.com> wrote: > On Thu, Jun 8, 2023 at 9:27 AM Stanislav Fomichev <sdf@google.com> wrote: > > > > On Thu, Jun 8, 2023 at 6:00 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > > > > > On 06/06,Stanislav Fomichev wrote: > > > > > > > On 06/05, Xin Liu wrote: > > > > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > > > > > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > > > > the system does not check whether sample_cb is NULL during > > > > > ring_buffer__poll, null pointer is used. > > > > > > > What is the point of calling ring_buffer__new with sample_cb == NULL? > > > > > > Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't > > > make sense, and few people use it that way, but that doesn't prevent this > > > from being a allowed and supported scenario. And when ring_buffer__poll is > > > called, it leads to a segmentation fault (core dump), which I think needs > > > to be fixed to ensure the security quality of libbpf. > > > > I dunno. I'd argue that passing a NULL to ring_buffer__new is an API > > misuse. Maybe ring_buffer__new should return -EINVAL instead when > > passed NULL sample_cb? Although, we don't usually have those checks > > for the majority of the arguments in libbpf... > > Right. I'd say we should add a proper doc comment specifying all > arguments and which ones are optional or not. And make it explicit > that callback is not optional. If we start checking every possible > pointer for NULL, libbpf will be littered with NULL checks, I'm not > sure that's good. I agree, we should add a proper doc comment specifying all arguments and which ones are optional or not. However, why does the external interface API in libbpf not verify input parameters or add verification where risky operations may exist? What's more, i think sample_cb=NULL is not strictly a mistake or prohibited use, and is meaningless.
On Fri, Jun 9, 2023 at 2:38 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > On Fri, Jun 9, 2023 at 1:39 AM Andrii Nakryiko <andrii.nakryiko@gmail.com> wrote: > > > On Thu, Jun 8, 2023 at 9:27 AM Stanislav Fomichev <sdf@google.com> wrote: > > > > > > On Thu, Jun 8, 2023 at 6:00 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > > > > > > > On 06/06,Stanislav Fomichev wrote: > > > > > > > > > On 06/05, Xin Liu wrote: > > > > > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > > > > > > > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > > > > > the system does not check whether sample_cb is NULL during > > > > > > ring_buffer__poll, null pointer is used. > > > > > > > > > What is the point of calling ring_buffer__new with sample_cb == NULL? > > > > > > > > Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't > > > > make sense, and few people use it that way, but that doesn't prevent this > > > > from being a allowed and supported scenario. And when ring_buffer__poll is > > > > called, it leads to a segmentation fault (core dump), which I think needs > > > > to be fixed to ensure the security quality of libbpf. > > > > > > I dunno. I'd argue that passing a NULL to ring_buffer__new is an API > > > misuse. Maybe ring_buffer__new should return -EINVAL instead when > > > passed NULL sample_cb? Although, we don't usually have those checks > > > for the majority of the arguments in libbpf... > > > > Right. I'd say we should add a proper doc comment specifying all > > arguments and which ones are optional or not. And make it explicit > > that callback is not optional. If we start checking every possible > > pointer for NULL, libbpf will be littered with NULL checks, I'm not > > sure that's good. > > I agree, we should add a proper doc comment specifying all > arguments and which ones are optional or not. > However, why does the external interface API in libbpf not verify input > parameters or add verification where risky operations may exist? > What's more, i think sample_cb=NULL is not strictly a mistake or > prohibited use, and is meaningless. It's not really customary in C to do it? So maybe you can follow up with the update to the doc? The kindergarten is over, you pass NULL you get SIGSEGV :-D
On Fri, Jun 9, 2023 at 9:55 AM Stanislav Fomichev <sdf@google.com> wrote: > > On Fri, Jun 9, 2023 at 2:38 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > > > On Fri, Jun 9, 2023 at 1:39 AM Andrii Nakryiko <andrii.nakryiko@gmail.com> wrote: > > > > > On Thu, Jun 8, 2023 at 9:27 AM Stanislav Fomichev <sdf@google.com> wrote: > > > > > > > > On Thu, Jun 8, 2023 at 6:00 AM zhangmingyi <zhangmingyi5@huawei.com> wrote: > > > > > > > > > > On 06/06,Stanislav Fomichev wrote: > > > > > > > > > > > On 06/05, Xin Liu wrote: > > > > > > > From: zhangmingyi <zhangmingyi5@huawei.com> > > > > > > > > > > > > > The sample_cb of the ring_buffer__new interface can transfer NULL. However, > > > > > > > the system does not check whether sample_cb is NULL during > > > > > > > ring_buffer__poll, null pointer is used. > > > > > > > > > > > What is the point of calling ring_buffer__new with sample_cb == NULL? > > > > > > > > > > Yes, as you said, passing sample_cb in ring_buffer__new to NULL doesn't > > > > > make sense, and few people use it that way, but that doesn't prevent this > > > > > from being a allowed and supported scenario. And when ring_buffer__poll is > > > > > called, it leads to a segmentation fault (core dump), which I think needs > > > > > to be fixed to ensure the security quality of libbpf. > > > > > > > > I dunno. I'd argue that passing a NULL to ring_buffer__new is an API > > > > misuse. Maybe ring_buffer__new should return -EINVAL instead when > > > > passed NULL sample_cb? Although, we don't usually have those checks > > > > for the majority of the arguments in libbpf... > > > > > > Right. I'd say we should add a proper doc comment specifying all > > > arguments and which ones are optional or not. And make it explicit > > > that callback is not optional. If we start checking every possible > > > pointer for NULL, libbpf will be littered with NULL checks, I'm not > > > sure that's good. > > > > I agree, we should add a proper doc comment specifying all > > arguments and which ones are optional or not. > > However, why does the external interface API in libbpf not verify input > > parameters or add verification where risky operations may exist? > > What's more, i think sample_cb=NULL is not strictly a mistake or > > prohibited use, and is meaningless. > > It's not really customary in C to do it? So maybe you can follow up > with the update to the doc? Yep, we do not check every `struct bpf_object *` pointer to be non-NULL. Having said that, I don't think it's such a big deal to make this callback optional by assigning a no-op callback. So let's definitely update doc comments to be explicit about one way or the other. For the callback, let's just not do it on every record. Just once during initialization would be better. > > The kindergarten is over, you pass NULL you get SIGSEGV :-D
diff --git a/tools/lib/bpf/ringbuf.c b/tools/lib/bpf/ringbuf.c index 02199364db13..3661338a1d2e 100644 --- a/tools/lib/bpf/ringbuf.c +++ b/tools/lib/bpf/ringbuf.c @@ -248,7 +248,7 @@ static int64_t ringbuf_process_ring(struct ring *r) got_new_data = true; cons_pos += roundup_len(len); - if ((len & BPF_RINGBUF_DISCARD_BIT) == 0) { + if (r->sample_cb && ((len & BPF_RINGBUF_DISCARD_BIT) == 0)) { sample = (void *)len_ptr + BPF_RINGBUF_HDR_SZ; err = r->sample_cb(r->ctx, sample, len); if (err < 0) {