From: Eduard Zingerman <eddyz87@gmail.com>
To: Andrii Nakryiko <andrii.nakryiko@gmail.com>
Cc: bpf@vger.kernel.org, ast@kernel.org, andrii@kernel.org,
daniel@iogearbox.net, martin.lau@linux.dev, kernel-team@fb.com,
yonghong.song@linux.dev, memxor@gmail.com, awerner32@gmail.com,
john.fastabend@gmail.com
Subject: Re: [PATCH bpf-next v3 0/7] exact states comparison for iterator convergence checks
Date: Tue, 24 Oct 2023 14:57:31 +0300 [thread overview]
Message-ID: <8be57ef5f403c123296cde2af81492a7cc18fd72.camel@gmail.com> (raw)
In-Reply-To: <CAEf4BzZKBq+nJdcUyD4_UcU1joojzuaHDaVp1Tb=MfXyUu-MLg@mail.gmail.com>
On Mon, 2023-10-23 at 22:58 -0700, Andrii Nakryiko wrote:
> On Mon, Oct 23, 2023 at 5:09 PM Eduard Zingerman <eddyz87@gmail.com> wrote:
> >
> > Iterator convergence logic in is_state_visited() uses state_equals()
> > for states with branches counter > 0 to check if iterator based loop
> > converges. This is not fully correct because state_equals() relies on
> > presence of read and precision marks on registers. These marks are not
> > guaranteed to be finalized while state has branches.
> > Commit message for patch #3 describes a program that exhibits such
> > behavior.
> >
> > This patch-set aims to fix iterator convergence logic by adding notion
> > of exact states comparison. Exact comparison does not rely on presence
> > of read or precision marks and thus is more strict.
> > As explained in commit message for patch #3 exact comparisons require
> > addition of speculative register bounds widening. The end result for
> > BPF verifier users could be summarized as follows:
> >
> > (!) After this update verifier would reject programs that conjure an
> > imprecise value on the first loop iteration and use it as precise
> > on the second (for iterator based loops).
> >
> > I urge people to at least skim over the commit message for patch #3.
> >
> > Patches are organized as follows:
> > - patches #1,2: moving/extracting utility functions;
> > - patch #3: introduces exact mode for states comparison and adds
> > widening heuristic;
> > - patch #4: adds test-cases that demonstrate why the series is
> > necessary;
> > - patch #5: extends patch #3 with a notion of state loop entries,
> > these entries have to be tracked to correctly identify that
> > different verifier states belong to the same states loop;
> > - patch #6: adds a test-case that demonstrates a program
> > which requires loop entry tracking for correct verification;
> > - patch #7: just adds a few debug prints.
> >
> > The following actions are planned as a followup for this patch-set:
> > - implementation has to be adapted for callbacks handling logic as a
> > part of a fix for [1];
> > - it is necessary to explore ways to improve widening heuristic to
> > handle iters_task_vma test w/o need to insert barrier_var() calls;
> > - explored states eviction logic on cache miss has to be extended
> > to either:
> > - allow eviction of checkpoint states -or-
> > - be sped up in case if there are many active checkpoints associated
> > with the same instruction.
> >
> > The patch-set is a followup for mailing list discussion [1].
> >
> > Changelog:
> > - V2 [3] -> V3:
> > - correct check for stack spills in widen_imprecise_scalars(),
> > added test case progs/iters.c:widen_spill to check the behavior
> > (suggested by Andrii);
> > - allow eviction of checkpoint states in is_state_visited() to avoid
> > pathological verifier performance when iterator based loop does not
> > converge (discussion with Alexei).
> > - V1 [2] -> V2, applied changes suggested by Alexei offlist:
> > - __explored_state() function removed;
> > - same_callsites() function is now used in clean_live_states();
> > - patches #1,2 are added as preparatory code movement;
> > - in process_iter_next_call() a safeguard is added to verify that
> > cur_st->parent exists and has expected insn index / call sites.
> >
> > [1] https://lore.kernel.org/bpf/97a90da09404c65c8e810cf83c94ac703705dc0e.camel@gmail.com/
> > [2] https://lore.kernel.org/bpf/20231021005939.1041-1-eddyz87@gmail.com/
> > [3] https://lore.kernel.org/bpf/20231022010812.9201-1-eddyz87@gmail.com/
> >
> > Eduard Zingerman (7):
> > bpf: move explored_state() closer to the beginning of verifier.c
> > bpf: extract same_callsites() as utility function
> > bpf: exact states comparison for iterator convergence checks
> > selftests/bpf: tests with delayed read/precision makrs in loop body
> > bpf: correct loop detection for iterators convergence
> > selftests/bpf: test if state loops are detected in a tricky case
> > bpf: print full verifier states on infinite loop detection
> >
> > include/linux/bpf_verifier.h | 16 +
> > kernel/bpf/verifier.c | 475 ++++++++++--
> > tools/testing/selftests/bpf/progs/iters.c | 695 ++++++++++++++++++
> > .../selftests/bpf/progs/iters_task_vma.c | 1 +
> > 4 files changed, 1133 insertions(+), 54 deletions(-)
> >
> > --
> > 2.42.0
> >
>
> Thanks a lot for working on this and getting it to the end despite
> many setbacks and ambiguity, great work!
Thank you and Alexei for working on it as well.
We'll see if this patch-set is good enough or the idea with
computing fixed point for read and precision marks has to be finalized.
prev parent reply other threads:[~2023-10-24 11:57 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-24 0:09 [PATCH bpf-next v3 0/7] exact states comparison for iterator convergence checks Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 1/7] bpf: move explored_state() closer to the beginning of verifier.c Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 2/7] bpf: extract same_callsites() as utility function Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 3/7] bpf: exact states comparison for iterator convergence checks Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 4/7] selftests/bpf: tests with delayed read/precision makrs in loop body Eduard Zingerman
2023-10-24 1:43 ` kernel test robot
2023-10-24 0:09 ` [PATCH bpf-next v3 5/7] bpf: correct loop detection for iterators convergence Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 6/7] selftests/bpf: test if state loops are detected in a tricky case Eduard Zingerman
2023-10-24 0:09 ` [PATCH bpf-next v3 7/7] bpf: print full verifier states on infinite loop detection Eduard Zingerman
2023-10-24 5:10 ` [PATCH bpf-next v3 0/7] exact states comparison for iterator convergence checks patchwork-bot+netdevbpf
2023-10-24 5:58 ` Andrii Nakryiko
2023-10-24 11:57 ` Eduard Zingerman [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=8be57ef5f403c123296cde2af81492a7cc18fd72.camel@gmail.com \
--to=eddyz87@gmail.com \
--cc=andrii.nakryiko@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=awerner32@gmail.com \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=john.fastabend@gmail.com \
--cc=kernel-team@fb.com \
--cc=martin.lau@linux.dev \
--cc=memxor@gmail.com \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox