From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 53CF1C4332D for ; Wed, 17 Feb 2021 18:19:04 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2324564DF0 for ; Wed, 17 Feb 2021 18:19:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234782AbhBQSS4 (ORCPT ); Wed, 17 Feb 2021 13:18:56 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:63540 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234783AbhBQSSy (ORCPT ); Wed, 17 Feb 2021 13:18:54 -0500 Received: from pps.filterd (m0148461.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 11HI8dh0020140 for ; Wed, 17 Feb 2021 10:18:14 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=facebook; bh=cMiaiTg18Be8HqcZm6e8JVBmjMKEUMsJGk4Fk5zN+FE=; b=kqGmUKZU62n0i5j4T8B7YO5opRb/S96PMnGlQ88Z06kyNJc38mfGT3KmL8RHQfAvDjWg FI5G4yRT9OJbp9EpJ+RKPdQHS3hN6j2w9vUPSYnVpIvz9ALG0gd6lEdQkGXuhaM91EP9 rhxCMGYVpylE/hH4HegPES+4vv63Se5v4tg= Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com with ESMTP id 36s1jganpc-3 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Wed, 17 Feb 2021 10:18:14 -0800 Received: from intmgw001.06.ash9.facebook.com (2620:10d:c0a8:1b::d) by mail.thefacebook.com (2620:10d:c0a8:83::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Wed, 17 Feb 2021 10:18:08 -0800 Received: by devbig003.ftw2.facebook.com (Postfix, from userid 128203) id 4AA773704F7A; Wed, 17 Feb 2021 10:18:06 -0800 (PST) From: Yonghong Song To: CC: Alexei Starovoitov , Cong Wang , Daniel Borkmann , Subject: [PATCH bpf-next v2 03/11] bpf: refactor check_func_call() to allow callback function Date: Wed, 17 Feb 2021 10:18:06 -0800 Message-ID: <20210217181806.3190025-1-yhs@fb.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20210217181803.3189437-1-yhs@fb.com> References: <20210217181803.3189437-1-yhs@fb.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-FB-Internal: Safe Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369,18.0.761 definitions=2021-02-17_13:2021-02-16,2021-02-17 signatures=0 X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 mlxlogscore=668 impostorscore=0 lowpriorityscore=0 clxscore=1015 priorityscore=1501 suspectscore=0 phishscore=0 malwarescore=0 adultscore=0 spamscore=0 mlxscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2102170133 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Later proposed bpf_for_each_map_elem() helper has callback function as one of its arguments. This patch refactored check_func_call() to permit callback function which sets callee state. Different callback functions may have different callee states. There is no functionality change for this patch except it added a case to handle where subprog number is known and there is no need to do find_subprog(). This case is used later by implementing bpf_for_each_map() helper. Signed-off-by: Yonghong Song --- kernel/bpf/verifier.c | 54 ++++++++++++++++++++++++++++++++----------- 1 file changed, 41 insertions(+), 13 deletions(-) diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index d224cd7c3a5d..fcc1a2db32c9 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -5250,13 +5250,19 @@ static void clear_caller_saved_regs(struct bpf_ve= rifier_env *env, } } =20 -static int check_func_call(struct bpf_verifier_env *env, struct bpf_insn= *insn, - int *insn_idx) +typedef int (*set_callee_state_fn)(struct bpf_verifier_env *env, + struct bpf_func_state *caller, + struct bpf_func_state *callee, + int insn_idx); + +static int __check_func_call(struct bpf_verifier_env *env, struct bpf_in= sn *insn, + int *insn_idx, int subprog, + set_callee_state_fn set_callee_st) { struct bpf_verifier_state *state =3D env->cur_state; struct bpf_func_info_aux *func_info_aux; struct bpf_func_state *caller, *callee; - int i, err, subprog, target_insn; + int err, target_insn; bool is_global =3D false; =20 if (state->curframe + 1 >=3D MAX_CALL_FRAMES) { @@ -5265,12 +5271,16 @@ static int check_func_call(struct bpf_verifier_en= v *env, struct bpf_insn *insn, return -E2BIG; } =20 - target_insn =3D *insn_idx + insn->imm; - subprog =3D find_subprog(env, target_insn + 1); if (subprog < 0) { - verbose(env, "verifier bug. No program starts at insn %d\n", - target_insn + 1); - return -EFAULT; + target_insn =3D *insn_idx + insn->imm; + subprog =3D find_subprog(env, target_insn + 1); + if (subprog < 0) { + verbose(env, "verifier bug. No program starts at insn %d\n", + target_insn + 1); + return -EFAULT; + } + } else { + target_insn =3D env->subprog_info[subprog].start - 1; } =20 caller =3D state->frame[state->curframe]; @@ -5326,11 +5336,9 @@ static int check_func_call(struct bpf_verifier_env= *env, struct bpf_insn *insn, if (err) return err; =20 - /* copy r1 - r5 args that callee can access. The copy includes parent - * pointers, which connects us up to the liveness chain - */ - for (i =3D BPF_REG_1; i <=3D BPF_REG_5; i++) - callee->regs[i] =3D caller->regs[i]; + err =3D set_callee_st(env, caller, callee, *insn_idx); + if (err) + return err; =20 clear_caller_saved_regs(env, caller->regs); =20 @@ -5349,6 +5357,26 @@ static int check_func_call(struct bpf_verifier_env= *env, struct bpf_insn *insn, return 0; } =20 +static int set_callee_state(struct bpf_verifier_env *env, + struct bpf_func_state *caller, + struct bpf_func_state *callee, int insn_idx) +{ + int i; + + /* copy r1 - r5 args that callee can access. The copy includes parent + * pointers, which connects us up to the liveness chain + */ + for (i =3D BPF_REG_1; i <=3D BPF_REG_5; i++) + callee->regs[i] =3D caller->regs[i]; + return 0; +} + +static int check_func_call(struct bpf_verifier_env *env, struct bpf_insn= *insn, + int *insn_idx) +{ + return __check_func_call(env, insn, insn_idx, -1, set_callee_state); +} + static int prepare_func_exit(struct bpf_verifier_env *env, int *insn_idx= ) { struct bpf_verifier_state *state =3D env->cur_state; --=20 2.24.1