From: John Fastabend <john.fastabend@gmail.com>
To: Kui-Feng Lee <thinker.li@gmail.com>,
bpf@vger.kernel.org, ast@kernel.org, martin.lau@linux.dev,
song@kernel.org, kernel-team@meta.com, andrii@kernel.org
Cc: sinquersw@gmail.com, kuifeng@meta.com,
Kui-Feng Lee <thinker.li@gmail.com>
Subject: RE: [PATCH bpf-next] selftests/bpf: Make sure libbpf doesn't enforce the signature of a func pointer.
Date: Mon, 01 Apr 2024 18:43:10 -0700 [thread overview]
Message-ID: <660b62aed55f5_801520863@john.notmuch> (raw)
In-Reply-To: <20240401223058.1503400-1-thinker.li@gmail.com>
Kui-Feng Lee wrote:
> The verifier in the kernel checks the signatures of struct_ops
> operators. Libbpf should not verify it in order to allow flexibility in
> loading different implementations of an operator with different signatures
> to try to comply with the kernel, even if the signature defined in the BPF
> programs does not match with the implementations and the kernel.
>
> This feature enables user space applications to manage the variations
> between different versions of the kernel by attempting various
> implementations of an operator.
What is the utility of this? I'm missing what difference it would be
if libbpf rejected vs kernel rejecting it? For backwards compat the
kernel will fail or libbpf might throw an error and user will have to
fixup signature regardless right? Why not get the error as early as
possible.
>
> This is a follow-up of the commit c911fc61a7ce ("libbpf: Skip zeroed or
> null fields if not found in the kernel type.")
>
> Signed-off-by: Kui-Feng Lee <thinker.li@gmail.com>
> ---
> .../bpf/prog_tests/test_struct_ops_module.c | 24 +++++++++++++++++++
> .../selftests/bpf/progs/struct_ops_module.c | 13 ++++++++++
> 2 files changed, 37 insertions(+)
>
> diff --git a/tools/testing/selftests/bpf/prog_tests/test_struct_ops_module.c b/tools/testing/selftests/bpf/prog_tests/test_struct_ops_module.c
> index 098776d00ab4..7cf2b9ddd3e1 100644
> --- a/tools/testing/selftests/bpf/prog_tests/test_struct_ops_module.c
> +++ b/tools/testing/selftests/bpf/prog_tests/test_struct_ops_module.c
> @@ -138,11 +138,35 @@ static void test_struct_ops_not_zeroed(void)
> struct_ops_module__destroy(skel);
> }
>
> +/* The signature of an implementation might not match the signature of the
> + * function pointer prototype defined in the BPF program. This mismatch
> + * should be allowed as long as the behavior of the operator program
> + * adheres to the signature in the kernel. Libbpf should not enforce the
> + * signature; rather, let the kernel verifier handle the enforcement.
> + */
> +static void test_struct_ops_incompatible(void)
> +{
> + struct struct_ops_module *skel;
> + struct bpf_link *link;
> +
> + skel = struct_ops_module__open_and_load();
> + if (!ASSERT_OK_PTR(skel, "open_and_load"))
> + return;
> +
> + link = bpf_map__attach_struct_ops(skel->maps.testmod_incompatible);
> + if (ASSERT_OK_PTR(link, "attach_struct_ops"))
> + bpf_link__destroy(link);
> +
> + struct_ops_module__destroy(skel);
> +}
> +
> void serial_test_struct_ops_module(void)
> {
> if (test__start_subtest("test_struct_ops_load"))
> test_struct_ops_load();
> if (test__start_subtest("test_struct_ops_not_zeroed"))
> test_struct_ops_not_zeroed();
> + if (test__start_subtest("test_struct_ops_incompatible"))
> + test_struct_ops_incompatible();
> }
>
> diff --git a/tools/testing/selftests/bpf/progs/struct_ops_module.c b/tools/testing/selftests/bpf/progs/struct_ops_module.c
> index 86e1e50c5531..63b065dae002 100644
> --- a/tools/testing/selftests/bpf/progs/struct_ops_module.c
> +++ b/tools/testing/selftests/bpf/progs/struct_ops_module.c
> @@ -68,3 +68,16 @@ struct bpf_testmod_ops___zeroed testmod_zeroed = {
> .test_1 = (void *)test_1,
> .test_2 = (void *)test_2_v2,
> };
> +
> +struct bpf_testmod_ops___incompatible {
> + int (*test_1)(void);
> + void (*test_2)(int *a);
> + int data;
> +};
> +
> +SEC(".struct_ops.link")
> +struct bpf_testmod_ops___incompatible testmod_incompatible = {
> + .test_1 = (void *)test_1,
> + .test_2 = (void *)test_2,
> + .data = 3,
> +};
> --
> 2.34.1
>
>
next prev parent reply other threads:[~2024-04-02 1:43 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-01 22:30 [PATCH bpf-next] selftests/bpf: Make sure libbpf doesn't enforce the signature of a func pointer Kui-Feng Lee
2024-04-02 1:43 ` John Fastabend [this message]
2024-04-02 17:00 ` Kui-Feng Lee
2024-04-03 20:52 ` Martin KaFai Lau
2024-04-03 21:15 ` Andrii Nakryiko
2024-04-03 21:34 ` Kui-Feng Lee
2024-04-03 21:28 ` Kui-Feng Lee
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=660b62aed55f5_801520863@john.notmuch \
--to=john.fastabend@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=kernel-team@meta.com \
--cc=kuifeng@meta.com \
--cc=martin.lau@linux.dev \
--cc=sinquersw@gmail.com \
--cc=song@kernel.org \
--cc=thinker.li@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox