From: Eduard Zingerman <eddyz87@gmail.com>
To: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: bpf <bpf@vger.kernel.org>, Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
Martin KaFai Lau <martin.lau@kernel.org>,
Kumar Kartikeya Dwivedi <memxor@gmail.com>,
Kernel Team <kernel-team@fb.com>
Subject: Re: [PATCH v3 bpf-next 1/2] bpf: Relax precision marking in open coded iters and may_goto loop.
Date: Tue, 28 May 2024 18:08:57 -0700 [thread overview]
Message-ID: <ceec0883544b6855b7d1fda2884de775414a56c4.camel@gmail.com> (raw)
In-Reply-To: <CAADnVQJdaQT_KPEjvmniCTeUed3jY0mzDNLUhKbFjpbjApMJrA@mail.gmail.com>
On Tue, 2024-05-28 at 17:34 -0700, Alexei Starovoitov wrote:
[...]
> > I'm not sure how much of a deal-breaker this is, but proposed
> > heuristics precludes verification for the following program:
>
> not quite.
>
> > char arr[10];
> >
> > SEC("socket")
> > __success __flag(BPF_F_TEST_STATE_FREQ)
> > int simple_loop(const void *ctx)
> > {
> > struct bpf_iter_num it;
> > int *v, sum = 0, i = 0;
> >
> > bpf_iter_num_new(&it, 0, 10);
> > while ((v = bpf_iter_num_next(&it))) {
> > if (i < 5)
> > sum += arr[i++];
> > }
> > bpf_iter_num_destroy(&it);
> > return sum;
> > }
> >
> > The presence of the loop with bpf_iter_num creates a set of states
> > with non-null loop_header, which in turn switches-off predictions for
> > comparison operations inside the loop.
>
> Is this a pseudo code ?
No, I tried this test with v3 of this patch and on master.
It passes on master and fails with v3.
(Full test in the end of the email, I run it as
./test_progs -vvv -a verifier_loops1/simple_loop).
> Because your guess at the reason for the verifier reject is not correct.
> It's signed stuff that is causing issues.
> s/int i/__u32 i/
> and this test is passing the verifier with just 143 insn processed.
I'm reading through verifier log, will get back shortly.
> > This looks like a bad a compose-ability of verifier features to me.
>
> As with any heuristic there are two steps forward and one step back.
> The heuristic is trying to minimize the size of that step back.
> If you noticed in v1 and v2 I had to add 'if (!v) break;'
> to iter_pragma_unroll_loop().
> And it would have been ok this way.
> It is a step back for a corner case like iter_pragma_unroll_loop().
> Luckily this new algorithm in v3 doesn't need this if (!v) workaround
> anymore. So the step back is minimized.
> Is it still there? Absolutely. There is a chance that some working prog
> will stop working. (as with any verifier change).
Not sure I understand how 'if (!v) break;' is relevant.
The patch says:
+ ignore_pred = (get_loop_entry(this_branch) ||
+ this_branch->may_goto_depth) &&
+ /* Gate widen_reg() logic */
+ env->bpf_capable;
get_loop_entry(this_branch) would return true for states inside a
'while' because of the bpf_iter_num_next() calls.
Hence, predictions for all conditionals inside the loop would be
ignored and also src/dst registers would be widened because comparison
is not JEQ/JNE.
[...]
> Just like i=zero is magical.
> All such magic has to go. The users should write normal C.
Noted.
---
diff --git a/tools/testing/selftests/bpf/progs/verifier_loops1.c b/tools/testing/selftests/bpf/progs/verifier_loops1.c
index e07b43b78fd2..1ebf0c829d5e 100644
--- a/tools/testing/selftests/bpf/progs/verifier_loops1.c
+++ b/tools/testing/selftests/bpf/progs/verifier_loops1.c
@@ -283,4 +283,22 @@ exit_%=: \
: __clobber_all);
}
+char arr[10];
+
+SEC("socket")
+__success __flag(BPF_F_TEST_STATE_FREQ)
+int simple_loop(const void *ctx)
+{
+ struct bpf_iter_num it;
+ int *v, sum = 0, i = 0;
+
+ bpf_iter_num_new(&it, 0, 10);
+ while ((v = bpf_iter_num_next(&it))) {
+ if (i < 5)
+ sum += arr[i++];
+ }
+ bpf_iter_num_destroy(&it);
+ return sum;
+}
+
char _license[] SEC("license") = "GPL";
next prev parent reply other threads:[~2024-05-29 1:09 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-05-25 3:11 [PATCH v3 bpf-next 1/2] bpf: Relax precision marking in open coded iters and may_goto loop Alexei Starovoitov
2024-05-25 3:11 ` [PATCH v3 bpf-next 2/2] selftests/bpf: Remove i = zero workaround and add new tests Alexei Starovoitov
2024-05-27 7:26 ` [PATCH v3 bpf-next 1/2] bpf: Relax precision marking in open coded iters and may_goto loop Dan Carpenter
2024-05-27 22:44 ` Alexei Starovoitov
2024-05-29 14:32 ` Dan Carpenter
2024-05-28 4:10 ` Eduard Zingerman
2024-05-29 0:34 ` Alexei Starovoitov
2024-05-29 1:08 ` Eduard Zingerman [this message]
2024-05-29 2:18 ` Eduard Zingerman
2024-05-29 3:22 ` Alexei Starovoitov
2024-05-29 10:14 ` Eduard Zingerman
2024-06-01 3:08 ` Alexei Starovoitov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ceec0883544b6855b7d1fda2884de775414a56c4.camel@gmail.com \
--to=eddyz87@gmail.com \
--cc=alexei.starovoitov@gmail.com \
--cc=andrii@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=kernel-team@fb.com \
--cc=martin.lau@kernel.org \
--cc=memxor@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox