From: Eduard Zingerman <eddyz87@gmail.com>
To: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: bpf <bpf@vger.kernel.org>, Alexei Starovoitov <ast@kernel.org>,
Andrii Nakryiko <andrii@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Martin KaFai Lau <martin.lau@linux.dev>,
Kernel Team <kernel-team@fb.com>,
Yonghong Song <yonghong.song@linux.dev>,
Nick Zavaritsky <mejedi@gmail.com>
Subject: Re: [PATCH bpf 3/4] bpf: track changes_pkt_data property for global functions
Date: Mon, 09 Dec 2024 09:57:12 -0800 [thread overview]
Message-ID: <58dbb0671ad59507e45c3f5ff50da66b0f8bd36e.camel@gmail.com> (raw)
In-Reply-To: <CAADnVQKDDpFFkaR21o5cBU5Q0dqBgP_0c9KWt1t5ADLV1yX=HQ@mail.gmail.com>
On Mon, 2024-12-09 at 08:53 -0800, Alexei Starovoitov wrote:
[...]
> >
> > // tc_bpf2bpf.c
> > __noinline freplace
> > int subprog_tc(struct __sk_buff *skb) <--------.
> > { |
> > int ret = 1; |
> > |
> > __sink(skb); |
> > __sink(ret); |
> > return ret; |
> > } |
> > |
> > SEC("tc") |
> > int entry_tc(struct __sk_buff *skb) |
> > { |
> > return subprog_tc(skb); |
> > } |
> > |
> > // tailcall_freplace.c |
> > struct { |
> > __uint(type, BPF_MAP_TYPE_PROG_ARRAY); |
> > __uint(max_entries, 1); |
> > __uint(key_size, sizeof(__u32)); |
> > __uint(value_size, sizeof(__u32)); |
> > } jmp_table SEC(".maps"); |
> > |
> > int count = 0; |
> > |
> > SEC("freplace") |
> > int entry_freplace(struct __sk_buff *skb) -----'
> > {
> > count++;
> > bpf_tail_call_static(skb, &jmp_table, 0);
> > return count;
> > }
>
> hmm. none of the above changes pkt_data, so it should be allowed.
> The prog doesn't read skb->data either.
> So I don't quite see the problem.
The problem is when I use simplified rule: "every tail call changes packet data",
as a substitute for proper map content effects tracking.
If map content effects are tracked, there should be no problems
verifying this program. However, that can't be done in check_cfg(),
as it does not track register values, and register value is needed to
identify the map. Hence, mechanics with "in-line" global sub-program
traversal is needed (as described by Andrii):
- during a regular verification pass get to a global sub-program call:
- if sub-program had not been visited yet, verify it completely
and compute changes_pkt_data effect;
- continue from the call-site using the computed effect;
- during a regular verification pass get to a tail call:
- check the map pointed to by R1 to see whether it has
changes_pkt_data effect.
> > Here 'entry_freplace' is assumed to invalidate packet data because of
> > the bpf_tail_call_static(), and thus it can't replace 'subprog_tc'.
> > There is an option to add a dummy call to bpf_skb_pull_data(),
> > but this operation is not a noop, as far as I can tell.
>
> skb_pull is not, but there are plenty that are practically nop helpers.
> bpf_helper_changes_pkt_data() lists them all.
> Like bpf_xdp_adjust_meta(xdp, 0)
>
> > Same situation was discussed in the sub-thread regarding use of tags.
> > (Note: because of the tail calls, some form of changes_pkt_data effect
> > propagation similar to one done in check_cfg() would be needed with
> > tags as well. That, or tags would be needed not only for global
> > sub-programs but also for BPF_MAP_TYPE_PROG_ARRAY maps).
>
> nack to tags approach.
Understood.
next prev parent reply other threads:[~2024-12-09 17:57 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-12-06 4:03 [PATCH bpf 0/4] bpf: track changes_pkt_data property for global functions Eduard Zingerman
2024-12-06 4:03 ` [PATCH bpf 1/4] bpf: add find_containing_subprog() utility function Eduard Zingerman
2024-12-06 4:03 ` [PATCH bpf 2/4] bpf: refactor bpf_helper_changes_pkt_data to use helper number Eduard Zingerman
2024-12-06 4:03 ` [PATCH bpf 3/4] bpf: track changes_pkt_data property for global functions Eduard Zingerman
2024-12-06 20:43 ` Alexei Starovoitov
2024-12-06 21:35 ` Eduard Zingerman
2024-12-09 7:40 ` Eduard Zingerman
2024-12-09 16:53 ` Alexei Starovoitov
2024-12-09 17:57 ` Eduard Zingerman [this message]
2024-12-10 0:48 ` Alexei Starovoitov
2024-12-10 1:24 ` Eduard Zingerman
2024-12-10 1:38 ` Alexei Starovoitov
2024-12-06 4:03 ` [PATCH bpf 4/4] selftests/bpf: test for changing packet data from " Eduard Zingerman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=58dbb0671ad59507e45c3f5ff50da66b0f8bd36e.camel@gmail.com \
--to=eddyz87@gmail.com \
--cc=alexei.starovoitov@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=kernel-team@fb.com \
--cc=martin.lau@linux.dev \
--cc=mejedi@gmail.com \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox