From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2BA6CCFB424 for ; Sun, 6 Oct 2024 19:00:22 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 405DF6B0175; Sun, 6 Oct 2024 15:00:22 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 3B4AB6B0176; Sun, 6 Oct 2024 15:00:22 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 27CBD6B0177; Sun, 6 Oct 2024 15:00:22 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 0AC616B0175 for ; Sun, 6 Oct 2024 15:00:22 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id A6BDDA0A62 for ; Sun, 6 Oct 2024 19:00:21 +0000 (UTC) X-FDA: 82644093042.15.F6D2494 Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf11.hostedemail.com (Postfix) with ESMTP id F129940011 for ; Sun, 6 Oct 2024 19:00:19 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=jzK+NVy7; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf11.hostedemail.com: domain of namhyung@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=namhyung@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1728241111; a=rsa-sha256; cv=none; b=pVm+oWuT/gH9JS+Ak5LTFST+2LU0q+1aeDsulXcckUerUcHGouf/PB41Evy3hgKrFUzJWy ODi2yY4FmrzFRQimlRZId22xwLkTQPTDyrDWk7bGtDpden29XssiyoPbmcg75aorLeAylv mqUDd+auL8+oPolaIc+po1C0ZE82dps= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=jzK+NVy7; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf11.hostedemail.com: domain of namhyung@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=namhyung@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1728241111; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Salv2z5s6SGA3EBXTO4b0bCTbDEaOSZmptzy7a8z8BU=; b=w5KuTiCnkQ0WVr4kGy9/Ac6HaJrXuBEsOJg+RmkanILMcN+O2pgfbkUctHZLgn/p1rH78d rvVPzfxcJ20QAFrtM0/rSUSB8cwOkX/eU+GZZtAu+hrMCRIsXVZB01w/Pbh2puocdQniBg XYIB/dqQ0xUlTKjgS6gryCCfNZcgYm4= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id A1019A40EAB; Sun, 6 Oct 2024 19:00:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F1838C4CEC5; Sun, 6 Oct 2024 19:00:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728241218; bh=iwFEjW6d6zkYqFBkePAlQ+Q5V3zdYkn/YSKeM+fBUbk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jzK+NVy77xMQ8mnIGl5r8YW8+gaIHZFA6eeSX7S+J2wGME1FquMnX2XrvprpuspJ/ wWftMSgXu4tb51+8QCqI5+J/FfvpQoK8P/aT32PjEJpKaYVBwq5N6exYbVI960FKf4 MuZi4T66F8wsD1e9FJY64FroxojUCkPGziLTseK1oxwQNuM4demxK2/L8H6rq3fmcf zgfgLJLn+s28cs5KgVvtP/nmmMXoGLKIg33u65qtj2P3gyKBgFa6lcZqTrYYAi2V0H 9THLt3UC4ktBSh+8huDttITbxGHk2fUbmhf65cP2h5PZtvq3Y6fALp1j9XEp2Z9K98 /zbaqJVyWTRug== Date: Sun, 6 Oct 2024 12:00:16 -0700 From: Namhyung Kim To: Song Liu Cc: Alexei Starovoitov , Roman Gushchin , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , LKML , bpf , Andrew Morton , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Vlastimil Babka , Hyeonggon Yoo <42.hyeyoo@gmail.com>, linux-mm , Arnaldo Carvalho de Melo , Kees Cook Subject: Re: [PATCH v4 bpf-next 2/3] mm/bpf: Add bpf_get_kmem_cache() kfunc Message-ID: References: <20241002180956.1781008-1-namhyung@kernel.org> <20241002180956.1781008-3-namhyung@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: F129940011 X-Stat-Signature: 3z5k6turya6dbyuo1qpk3oprte9wt5ek X-Rspam-User: X-HE-Tag: 1728241219-949563 X-HE-Meta: U2FsdGVkX1/E2TwfOhQY1HminbOJskKLpOo0QfAbR4FQEwXCj/GncBGzcwgxiQs4zoVenZTxqo42hqcUp67VVmrO9kfsiYddjaJJOsfcC48BPI9qTx0ediSXMy+a9jreNhbatruW7YQmCSxW+/BI+LOnvhboc7usrofP5F3r6mThvm2eispm+Ta7HMnvqET/30euBu75utzdC3WsCR0U1M6lxc6dq9JeH7it6uBza4FqnDuH+DXje7WlbeLHYV3MeX/daMkTknC0recNuVQxgJzkMrXlQ2ICl0Y3sTVWBadbBImQuN7X6gnjN+nigLrqTTbOnTnOjZoO0MHbGypqGfN8pJnUt98ZMFSAy32ec6afiuq3zKFC1b3nTPIqg5pOKMWEEj5ixw1AkIBaVdq4w4D2sFa0fIVBiEtZ7Vt8rtXfmrf6KknY4zecA9JQRqwxEmunZ+7MvK5QKjPD+iNWJjywuZAZ4JGT63BrSykNhUcSMW2A7TlX+3cciihmb/Xxh2VJ8cJ3o0A/+nNrvCWadRk8NhqQSV81YCueQGFIUJqdGO4pLPiAruBuPZl/LBdZGRh3Z50j8EWci0YR32jbXPr2pEPaR+IfsbJCsA4xpHHO/E9ZE3U8aq5qFUHsTS3dY1Ey1gNVl58mfpLMZ1YmpNpkgzMcThDdfXalSoUiIQFDvDo1/UHJfQT6qwmFF6ET2ufPtLK1li/rmDvTwiDatyef56jYMI13wUYoJHsgVk+XZaMlLusePKtR7ZSq/R+ZKLWAIXJO0Q3jlWsXzJ3yP9NjXCYeDNo6mILG7YJAn+Ro/upYSrxyc5aN3Zn6nWuOyBT/EbLcbaI2zoOTgK7NROrivBM1Hsiy7aj0vA+FJuZVcCmIHvKycdqVmFKCKAmi7NSYnVMxrkxeTDkwGAEZZoPWbwXLAlkusf046OkbFXWvWjAO5nIfNjTQ09XCAHpzpfj4EK4bL1HEjp+yWWH wovYE6/d 3vfjaLv75gof4sn08Ff4ea4pL6EpGljCfyGwRf5LMCLIg0Oy0xRa9w5sW5WeBu768nTnBHyfU/dOjtCqXpPVCEH2+DaMINL2Xi4gLStlraVpcTE4GN3vwAXyoyqdqTjZVpYCncmbV21FY3TGCFbZJHoQ74gb5oPQ+g/ImeFbgLWGQZ94OQoJMIIWnXzNuBGEmyZtHT52TXNzvWhoK501oFkXzI/UFWQlCgTCo06sg1iplZb6RSZtrGdEstDkKMEz5k7bq3jssgcPU4BuQJ8inKcAWzEY4WfQ1TTPuWqZoZtMQhUiagkpF0IISblPASarTeIodFNfUcdNgB5/DVM+PLA4DsUHy1v4LfVQZYdW4XjiIV4LySaEYYZqawc8P9l9PkiveaUwMhtbzSh9wU0t5KxOVkXvNBlluk8+9f6EWKTue9cIf5magCNMdjVYcABrFR60oGrxqGy6Z7EE= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hello, On Fri, Oct 04, 2024 at 04:56:57PM -0700, Song Liu wrote: > On Fri, Oct 4, 2024 at 4:44 PM Alexei Starovoitov > wrote: > [...] > > > diff --git i/kernel/bpf/helpers.c w/kernel/bpf/helpers.c > > > index 3709fb142881..7311a26ecb01 100644 > > > --- i/kernel/bpf/helpers.c > > > +++ w/kernel/bpf/helpers.c > > > @@ -3090,7 +3090,7 @@ BTF_ID_FLAGS(func, bpf_iter_bits_new, KF_ITER_NEW) > > > BTF_ID_FLAGS(func, bpf_iter_bits_next, KF_ITER_NEXT | KF_RET_NULL) > > > BTF_ID_FLAGS(func, bpf_iter_bits_destroy, KF_ITER_DESTROY) > > > BTF_ID_FLAGS(func, bpf_copy_from_user_str, KF_SLEEPABLE) > > > -BTF_ID_FLAGS(func, bpf_get_kmem_cache, KF_RET_NULL) > > > +BTF_ID_FLAGS(func, bpf_get_kmem_cache, KF_RET_NULL | KF_TRUSTED_ARGS > > > | KF_RCU_PROTECTED) > > > > I don't think KF_TRUSTED_ARGS approach would fit here. > > Namhyung's use case is tracing. The 'addr' will be some potentially > > arbitrary address from somewhere. The chance to see a trusted pointer > > is probably very low in such a tracing use case. > > I thought the primary use case was to trace lock contention, for > example, queued_spin_lock_slowpath(). Of course, a more > general solution is better. Right, my intended use case is the lock contention profiling so probably it's ok to limit it for trusted pointers if it helps. But as Song said, a general solution should be better. :) > > > > > The verifier change can mainly be the following: > > > > diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c > > index 7d9b38ffd220..e09eb108e956 100644 > > --- a/kernel/bpf/verifier.c > > +++ b/kernel/bpf/verifier.c > > @@ -12834,6 +12834,9 @@ static int check_kfunc_call(struct > > bpf_verifier_env *env, struct bpf_insn *insn, > > regs[BPF_REG_0].type = PTR_TO_BTF_ID; > > regs[BPF_REG_0].btf_id = ptr_type_id; > > > > + if (meta.func_id == special_kfunc_list[KF_get_kmem_cache]) > > + regs[BPF_REG_0].type |= PTR_UNTRUSTED; > > + > > if (is_iter_next_kfunc(&meta)) { > > struct bpf_reg_state *cur_iter; > > This is easier than I thought. Indeed! Thanks for providing the code. > > > The returned 'struct kmem_cache *' won't be refcnt-ed (acquired). > > It will be readonly via ptr_to_btf_id logic. > > s->flags; > > s->size; > > s->offset; > > access will be allowed but the verifier will sanitize them > > with an inlined version of probe_read_kernel. > > Even KF_RET_NULL can be dropped. Ok, I'll check this out. By having PTR_UNTRUSTED, are the callers still required to check NULL or is it handled by probe_read_kernel()? Thanks, Namhyung