From: Jiri Olsa <olsajiri@gmail.com>
To: Ilya Leoshkevich <iii@linux.ibm.com>
Cc: Jiri Olsa <olsajiri@gmail.com>,
Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
bpf@vger.kernel.org, Heiko Carstens <hca@linux.ibm.com>,
Vasily Gorbik <gor@linux.ibm.com>,
Alexander Gordeev <agordeev@linux.ibm.com>,
Stanislav Fomichev <sdf@google.com>
Subject: Re: [PATCH bpf-next v6] bpf: Support 64-bit pointers to kfuncs
Date: Thu, 6 Apr 2023 15:06:29 +0200 [thread overview]
Message-ID: <ZC7D1bH8zK7vDChQ@krava> (raw)
In-Reply-To: <62501084abbb6cc9492df60ff4d427a17e731fe4.camel@linux.ibm.com>
On Thu, Apr 06, 2023 at 02:31:06PM +0200, Ilya Leoshkevich wrote:
> On Thu, 2023-04-06 at 11:44 +0200, Jiri Olsa wrote:
> > On Wed, Apr 05, 2023 at 11:34:53PM +0200, Ilya Leoshkevich wrote:
> >
> > SNIP
> >
> > >
> > > +int bpf_get_kfunc_addr(const struct bpf_prog *prog, u32 func_id,
> > > + u16 btf_fd_idx, u8 **func_addr)
> > > +{
> > > + const struct bpf_kfunc_desc *desc;
> > > +
> > > + desc = find_kfunc_desc(prog, func_id, btf_fd_idx);
> > > + if (!desc)
> > > + return -EFAULT;
> > > +
> > > + *func_addr = (u8 *)desc->addr;
> > > + return 0;
> > > +}
> > > +
> > > static struct btf *__find_kfunc_desc_btf(struct bpf_verifier_env
> > > *env,
> > > s16 offset)
> > > {
> > > @@ -2672,14 +2691,19 @@ static int add_kfunc_call(struct
> > > bpf_verifier_env *env, u32 func_id, s16 offset)
> > > return -EINVAL;
> > > }
> > >
> > > - call_imm = BPF_CALL_IMM(addr);
> > > - /* Check whether or not the relative offset overflows desc-
> > > >imm */
> > > - if ((unsigned long)(s32)call_imm != call_imm) {
> > > - verbose(env, "address of kernel function %s is out
> > > of range\n",
> > > - func_name);
> > > - return -EINVAL;
> > > + if (bpf_jit_supports_far_kfunc_call()) {
> > > + call_imm = func_id;
> > > + } else {
> > > + call_imm = BPF_CALL_IMM(addr);
> >
> > we compute call_imm again in fixup_kfunc_call, seems like we could
> > store
> > the address and the func_id in desc and have fixup_kfunc_call do the
> > insn->imm setup
>
> We can drop this diff in fixup_kfunc_call():
>
> - insn->imm = desc->imm;
> + if (!bpf_jit_supports_far_kfunc_call())
> + insn->imm = BPF_CALL_IMM(desc->addr);
>
> in order to avoid duplicating the imm calculation logic, but I'm not
> sure if we want to move the entire desc->imm setup there.
>
> For example, fixup_kfunc_call() considers kfunc_tab const, which is a
> nice property that I think is worth keeping.
>
> Another option would be to drop desc->imm, but having it is very
> convenient for doing lookups the same way on all architectures.
ok, I see.. so should we do following in fixup_kfunc_call:
if (!bpf_jit_supports_far_kfunc_call())
insn->imm = desc->imm;
by default there's func_id in insn->imm
jirka
>
> > > + /* Check whether the relative offset overflows
> > > desc->imm */
> > > + if ((unsigned long)(s32)call_imm != call_imm) {
> > > + verbose(env, "address of kernel function %s
> > > is out of range\n",
> > > + func_name);
> > > + return -EINVAL;
> > > + }
> > > }
> > >
> > > +
> >
> > nit, extra line
>
> Ouch. Thanks for spotting this.
>
> >
> > > if (bpf_dev_bound_kfunc_id(func_id)) {
> > > err = bpf_dev_bound_kfunc_check(&env->log,
> > > prog_aux);
> > > if (err)
> > > @@ -2690,6 +2714,7 @@ static int add_kfunc_call(struct
> > > bpf_verifier_env *env, u32 func_id, s16 offset)
> > > desc->func_id = func_id;
> > > desc->imm = call_imm;
> > > desc->offset = offset;
> > > + desc->addr = addr;
> > > err = btf_distill_func_proto(&env->log, desc_btf,
> > > func_proto, func_name,
> > > &desc->func_model);
> > > @@ -2699,19 +2724,19 @@ static int add_kfunc_call(struct
> > > bpf_verifier_env *env, u32 func_id, s16 offset)
> > > return err;
> > > }
> > >
> > > -static int kfunc_desc_cmp_by_imm(const void *a, const void *b)
> > > +static int kfunc_desc_cmp_by_imm_off(const void *a, const void *b)
> > > {
> > > const struct bpf_kfunc_desc *d0 = a;
> > > const struct bpf_kfunc_desc *d1 = b;
> > >
> > > - if (d0->imm > d1->imm)
> > > - return 1;
> > > - else if (d0->imm < d1->imm)
> > > - return -1;
> > > + if (d0->imm != d1->imm)
> > > + return d0->imm < d1->imm ? -1 : 1;
> > > + if (d0->offset != d1->offset)
> > > + return d0->offset < d1->offset ? -1 : 1;
> > > return 0;
> > > }
> > >
> >
> > SNIP
> >
> > > +/* replace a generic kfunc with a specialized version if necessary
> > > */
> > > +static void fixup_kfunc_desc(struct bpf_verifier_env *env,
> > > + struct bpf_kfunc_desc *desc)
> > > +{
> > > + struct bpf_prog *prog = env->prog;
> > > + u32 func_id = desc->func_id;
> > > + u16 offset = desc->offset;
> > > + bool seen_direct_write;
> > > + void *xdp_kfunc;
> > > + bool is_rdonly;
> > > +
> > > + if (bpf_dev_bound_kfunc_id(func_id)) {
> > > + xdp_kfunc = bpf_dev_bound_resolve_kfunc(prog,
> > > func_id);
> > > + if (xdp_kfunc) {
> > > + desc->addr = (unsigned long)xdp_kfunc;
> > > + return;
> > > + }
> > > + /* fallback to default kfunc when not supported by
> > > netdev */
> > > + }
> > > +
> > > + if (offset)
> > > + return;
> > > +
> > > + if (func_id == special_kfunc_list[KF_bpf_dynptr_from_skb])
> > > {
> > > + seen_direct_write = env->seen_direct_write;
> > > + is_rdonly = !may_access_direct_pkt_data(env, NULL,
> > > BPF_WRITE);
> > > +
> > > + if (is_rdonly)
> > > + desc->addr = (unsigned
> > > long)bpf_dynptr_from_skb_rdonly;
> > > +
> > > + /* restore env->seen_direct_write to its original
> > > value, since
> > > + * may_access_direct_pkt_data mutates it
> > > + */
> > > + env->seen_direct_write = seen_direct_write;
> > > + }
> >
> > could we do this directly in add_kfunc_call?
>
> Initially I thought that it wasn't possible, because
> may_access_direct_pkt_data() may depend on data gathered during
> verification. But on a second look that's simply not the case, so this
> code can indeed be moved to add_kfunc_call().
>
> >
> > thanks,
> > jirka
>
> [...]
prev parent reply other threads:[~2023-04-06 13:06 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-04-05 21:34 [PATCH bpf-next v6] bpf: Support 64-bit pointers to kfuncs Ilya Leoshkevich
2023-04-06 0:25 ` kernel test robot
2023-04-06 9:44 ` Jiri Olsa
2023-04-06 12:31 ` Ilya Leoshkevich
2023-04-06 13:06 ` Jiri Olsa [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZC7D1bH8zK7vDChQ@krava \
--to=olsajiri@gmail.com \
--cc=agordeev@linux.ibm.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=gor@linux.ibm.com \
--cc=hca@linux.ibm.com \
--cc=iii@linux.ibm.com \
--cc=sdf@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox