Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161012AbbEUQ6Z (ORCPT ); Thu, 21 May 2015 12:58:25 -0400 Received: from mail-lb0-f175.google.com ([209.85.217.175]:34207 "EHLO mail-lb0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756169AbbEUQ6T (ORCPT ); Thu, 21 May 2015 12:58:19 -0400 MIME-Version: 1.0 In-Reply-To: <555E0D81.6060703@plumgrid.com> References: <1432079946-9878-1-git-send-email-ast@plumgrid.com> <1432079946-9878-2-git-send-email-ast@plumgrid.com> <555BD2E4.5050608@plumgrid.com> <555E0A93.2020803@plumgrid.com> <555E0D81.6060703@plumgrid.com> From: Andy Lutomirski Date: Thu, 21 May 2015 09:57:57 -0700 Message-ID: Subject: Re: [PATCH net-next 1/4] bpf: allow bpf programs to tail-call other bpf programs To: Alexei Starovoitov Cc: "David S. Miller" , Ingo Molnar , Daniel Borkmann , Michael Holzheu , Zi Shen Lim , Linux API , Network Development , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2965 Lines: 70 On Thu, May 21, 2015 at 9:53 AM, Alexei Starovoitov wrote: > On 5/21/15 9:43 AM, Andy Lutomirski wrote: >> >> On Thu, May 21, 2015 at 9:40 AM, Alexei Starovoitov >> wrote: >>> >>> On 5/21/15 9:20 AM, Andy Lutomirski wrote: >>>> >>>> >>>> >>>> What I mean is: why do we need the interface to be "look up this index >>>> in an array and just to what it references" as a single atomic >>>> instruction? Can't we break it down into first "look up this index in >>>> an array" and then "do this tail call"? >>> >>> >>> >>> I've actually considered to do this split and do first part as map lookup >>> and 2nd as 'tail call to this ptr' insn, but it turned out to be >>> painful: verifier gets more complicated, ctx pointer needs to kept >>> somewhere, JITs need to special case two things instead of one. >>> Also I couldn't see a use case for exposing program pointer to the >>> program itself. I've explored this path only because it felt more >>> traditional 'goto *ptr' like, but adding new PTR_TO_PROG type to >>> verifier looked wasteful. >> >> >> At some point, I think that it would be worth extending the verifier >> to support more general non-integral scalar types. "Pointer to >> tail-call target" would be just one of them. "Pointer to skb" might >> be nice as a real first-class scalar type that lives in a register as >> opposed to just being magic typed context. > > > well, I don't see a use case for 'pointer to tail-call target', > but more generic 'pointer to skb' indeed is a useful concept. > I was thinking more like 'pointer to structure of the type X', > then we can natively support 'pointer to task_struct', > 'pointer to inode', etc which will help tracing programs to be > written in more convenient way. > Right now pointer walking has to be done via bpf_probe_read() > helper as demonstrated in tracex1_kern.c example. > With this future 'pointer to struct of type X' knowledge in verifier > we'll be able to do 'ptr->field' natively with higher performance. If you implement that, then you get "pointer to tail-call target" as well, right? You wouldn't be allowed to dereference the pointer, but you could jump to it. > >> We'd still need some way to stick fds into a map, but that's not >> really the verifier's problem. > > > well, they both need to be aware of that. When it comes to safety > generalization suffers. Have to do extra checks both in map_update_elem > and in verifier. No way around that. > Sure, the verifier needs to know that the things you read from the map are "pointer to tail-call target", but that seems like a nice thing to generalize, too. After all, you could also have arrays of pointers to other things, too. --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/