Message ID | 20230315223607.50803-3-alexei.starovoitov@gmail.com (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | BPF |
Headers | show |
Series | bpf: Add detection of kfuncs. | expand |
On Wed, Mar 15, 2023 at 3:36 PM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > From: Alexei Starovoitov <ast@kernel.org> > > Add load and run time test for bpf_kfunc_exists() and check that the verifier > performs dead code elimination for non-existing kfunc. > > Signed-off-by: Alexei Starovoitov <ast@kernel.org> > --- we have prog_tests/ksyms_btf.c and progs/test_ksyms_weak.c which do these kind of tests for variable ksyms, let's just add kfunc ksyms there (user-space part has also checking that captured pointer value is correct and stuff like that, we probably want that for kfuncs as well) > .../selftests/bpf/progs/task_kfunc_success.c | 14 +++++++++++++- > 1 file changed, 13 insertions(+), 1 deletion(-) > > diff --git a/tools/testing/selftests/bpf/progs/task_kfunc_success.c b/tools/testing/selftests/bpf/progs/task_kfunc_success.c > index 4f61596b0242..c0a7774e0c79 100644 > --- a/tools/testing/selftests/bpf/progs/task_kfunc_success.c > +++ b/tools/testing/selftests/bpf/progs/task_kfunc_success.c > @@ -17,6 +17,8 @@ int err, pid; > * TP_PROTO(struct task_struct *p, u64 clone_flags) > */ > > +void invalid_kfunc(void) __ksym __weak; > + > static bool is_test_kfunc_task(void) > { > int cur_pid = bpf_get_current_pid_tgid() >> 32; > @@ -26,7 +28,17 @@ static bool is_test_kfunc_task(void) > > static int test_acquire_release(struct task_struct *task) > { > - struct task_struct *acquired; > + struct task_struct *acquired = NULL; > + > + if (!bpf_kfunc_exists(bpf_task_acquire)) { > + err = 3; > + return 0; > + } > + if (bpf_kfunc_exists(invalid_kfunc)) { > + /* the verifier's dead code elimination should remove this */ > + err = 4; > + asm volatile ("goto -1"); /* for (;;); */ > + } > > acquired = bpf_task_acquire(task); > bpf_task_release(acquired); > -- > 2.34.1 >
On Thu, Mar 16, 2023 at 1:34 PM Andrii Nakryiko <andrii.nakryiko@gmail.com> wrote: > > On Wed, Mar 15, 2023 at 3:36 PM Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > From: Alexei Starovoitov <ast@kernel.org> > > > > Add load and run time test for bpf_kfunc_exists() and check that the verifier > > performs dead code elimination for non-existing kfunc. > > > > Signed-off-by: Alexei Starovoitov <ast@kernel.org> > > --- > > we have prog_tests/ksyms_btf.c and progs/test_ksyms_weak.c which do > these kind of tests for variable ksyms, let's just add kfunc ksyms > there (user-space part has also checking that captured pointer value > is correct and stuff like that, we probably want that for kfuncs as > well) That's where initially I tried to place the test, but test_ksyms_weak.c is used in light skeleton as well which is pickier about resolving ksyms. libbpf was lucky in that sense. It does: if (btf_is_var(t)) err = bpf_object__resolve_ksym_var_btf_id(obj, ext); else err = bpf_object__resolve_ksym_func_btf_id(obj, ext); while gen_loader for lksel assumes bpf_call insn as the only option for kfunc. I figured I'll add basic support for kfunc detection first and address lksel later when I have more time. Hence the reason to pick: .../selftests/bpf/progs/task_kfunc_success.c | 14 +++++++++++++- as a location for the test.
On Thu, Mar 16, 2023 at 3:35 PM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Thu, Mar 16, 2023 at 1:34 PM Andrii Nakryiko > <andrii.nakryiko@gmail.com> wrote: > > > > On Wed, Mar 15, 2023 at 3:36 PM Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > > > > > > From: Alexei Starovoitov <ast@kernel.org> > > > > > > Add load and run time test for bpf_kfunc_exists() and check that the verifier > > > performs dead code elimination for non-existing kfunc. > > > > > > Signed-off-by: Alexei Starovoitov <ast@kernel.org> > > > --- > > > > we have prog_tests/ksyms_btf.c and progs/test_ksyms_weak.c which do > > these kind of tests for variable ksyms, let's just add kfunc ksyms > > there (user-space part has also checking that captured pointer value > > is correct and stuff like that, we probably want that for kfuncs as > > well) > > That's where initially I tried to place the test, but test_ksyms_weak.c > is used in light skeleton as well which is pickier about > resolving ksyms. > libbpf was lucky in that sense. > It does: > if (btf_is_var(t)) > err = bpf_object__resolve_ksym_var_btf_id(obj, ext); > else > err = bpf_object__resolve_ksym_func_btf_id(obj, ext); > while gen_loader for lksel assumes bpf_call insn as the only option for kfunc. > I figured I'll add basic support for kfunc detection first and > address lksel later when I have more time. > Hence the reason to pick: > .../selftests/bpf/progs/task_kfunc_success.c | 14 +++++++++++++- > as a location for the test. ok, sounds good, maybe mention this limitation in the commit message?
diff --git a/tools/testing/selftests/bpf/progs/task_kfunc_success.c b/tools/testing/selftests/bpf/progs/task_kfunc_success.c index 4f61596b0242..c0a7774e0c79 100644 --- a/tools/testing/selftests/bpf/progs/task_kfunc_success.c +++ b/tools/testing/selftests/bpf/progs/task_kfunc_success.c @@ -17,6 +17,8 @@ int err, pid; * TP_PROTO(struct task_struct *p, u64 clone_flags) */ +void invalid_kfunc(void) __ksym __weak; + static bool is_test_kfunc_task(void) { int cur_pid = bpf_get_current_pid_tgid() >> 32; @@ -26,7 +28,17 @@ static bool is_test_kfunc_task(void) static int test_acquire_release(struct task_struct *task) { - struct task_struct *acquired; + struct task_struct *acquired = NULL; + + if (!bpf_kfunc_exists(bpf_task_acquire)) { + err = 3; + return 0; + } + if (bpf_kfunc_exists(invalid_kfunc)) { + /* the verifier's dead code elimination should remove this */ + err = 4; + asm volatile ("goto -1"); /* for (;;); */ + } acquired = bpf_task_acquire(task); bpf_task_release(acquired);