Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1654789rwr; Fri, 5 May 2023 18:40:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7UKIz8UZQV6EGlA2dRLMQ4g8rtL2DDzIV2LD7Y58gJD48H54xrYKpsoPJdSLWphCCc/Knd X-Received: by 2002:a05:6a20:e687:b0:ec:60b9:c724 with SMTP id mz7-20020a056a20e68700b000ec60b9c724mr3884227pzb.33.1683337237931; Fri, 05 May 2023 18:40:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683337237; cv=none; d=google.com; s=arc-20160816; b=t8WQqYYVzaXecCQy21Ox9G+s4CMdBZ7E1dcYPe1An/bKM1eshbebX4t0vOiOYNZc1w nmxyMzHXCXQETAHdR2INcmOUcuxuAXXnDM3RP4a7hKINwCdvBOLpOGzF+xsonLoStzXh TQNk5AottRUl96E01v/LzoZ9/GUSm9UIrFZZ8o7UTwtszIk8vUC3O5R0h6YyjtHdDrgc SbxrDB5gqu9PpqQTWkk7zvI9RC6VLg+UVdznQkVQjdy2RuOiEk6aG1HZocpLaJnqXt7H ghDWBpsM0WN4QZwWV2ELgjvZ1Oy0jHFP5kMzh4SwVFcZLJzvRqyjJHdA3kIhM/vhx5Tb P6VA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=6hp0Ifesb79HPJK/KIKzPfPQWNmnCC9SBcN/OAlybow=; b=ql4N7WkqWNAjlSpFUhHcLCoOxuOUtxOisqS6qoZiYU5QzhJaIiOHM0phbbkYY/MJ54 rEvbH71Ebch4SrDc6A6cF8nr4D8VzyPdtGeiuatdbWHKIrVDGYqqx9qJ3elueXKGAGNk tPCFKQ7+j3tAndAF7G+Rh18eTWyncRkQ0qBhzNEEm73QzJO9N1a7O5vf/Iiiy0am1tv2 grNpfsnY/2145teQsCbeCaL4f1tt3DbUmmOsXuCP83O7haqO+m0pfKskmeKxMHay5PFW B/0yPJKm0WKf8MG58ugYFFpkmrRtypAFeCYBb81Qo5LhzJyA9fvZNjy7/JnOeCmEAWgG PNYg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=wn934bIj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v10-20020a63610a000000b00513dbdf029csi3243421pgb.409.2023.05.05.18.40.24; Fri, 05 May 2023 18:40:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=wn934bIj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231435AbjEFBbq (ORCPT + 99 others); Fri, 5 May 2023 21:31:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54098 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230265AbjEFBbo (ORCPT ); Fri, 5 May 2023 21:31:44 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA0DE72A6 for ; Fri, 5 May 2023 18:31:42 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id 3f1490d57ef6-b9963a72fd9so4754096276.0 for ; Fri, 05 May 2023 18:31:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1683336702; x=1685928702; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=6hp0Ifesb79HPJK/KIKzPfPQWNmnCC9SBcN/OAlybow=; b=wn934bIjSlyYsjqUN/3i+nRgeyQ79+B1hcBs3GqYpWaJGFZXQA53NXLvputweRHFGw LMfhnju5v1AaMaoz9f4P0qQIYb5kkxJLnRgq6S2mToWYINn6YFZSntYoHigHqeEq6SRH 41UinaAMctI7sBvB3z8E9//uz0Rbp52e9gIrDjgSBr6yw4JTzlIHjeObPY/CjBcsKX6O 3i3syYMHoqqPrAapT7KfPo6h+KYOWD/FKhXk0yctt6mi/6o53LfT6gF6XfKNQuYTu6Cy wvc+4/7hWx1xbkRJOTC+2uMbg8jSKXBsY2oQ/eH/QSsFZs2JHRcIbHx9VIAXj/LEoAcy Oy1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683336702; x=1685928702; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=6hp0Ifesb79HPJK/KIKzPfPQWNmnCC9SBcN/OAlybow=; b=Ngu0j13kyjOOW9+T8KWXhr74N5fKrNlJuVbjXH3RR/3THaqxlDqvyHPxBbMsnxV2Je iRb4BU8lDx5ZzYm9UsOlbIak+Ab8mKJq9ecSDD0e7ZfUe69QNg7Q2qSW1vi+X1FF0bCg pI1MKaknxoAMItRmL7zauyPZ7Ak3boIukZK3VJheus7WSaW8G9NupvjjZiTVDP68VL7H FJO9fe1m4I2rO7zgCzqHb1DN7Lw3nF+k8Nc4QfOQqXC3iuKYj7JyVpD1CEsOoSu50Xi+ H7eIs0KElWpLg2/BrZesy+UF9oap6FVTIvn81AVWm+KG645OP+HYBhhvN33X4OUOTrfR TUyA== X-Gm-Message-State: AC+VfDwu55/KTXXvH/CSmi7yBDdW3ayuS7Fl+ph7E3zg6Xm50AI760mG Ea7Fl6AiXDDvSm1u61WieyeR8Sc2TOE= X-Received: from drosen.mtv.corp.google.com ([2620:15c:211:201:6826:a1a:a426:bb4a]) (user=drosen job=sendgmr) by 2002:a05:6902:1021:b0:ba1:b908:364c with SMTP id x1-20020a056902102100b00ba1b908364cmr2063343ybt.12.1683336702159; Fri, 05 May 2023 18:31:42 -0700 (PDT) Date: Fri, 5 May 2023 18:31:29 -0700 Mime-Version: 1.0 X-Mailer: git-send-email 2.40.1.521.gf1e218fcd8-goog Message-ID: <20230506013134.2492210-1-drosen@google.com> Subject: [PATCH bpf-next v3 0/5] Dynptr Verifier Adjustments From: Daniel Rosenberg To: bpf@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , John Fastabend , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Shuah Khan , Jonathan Corbet , Joanne Koong , Mykola Lysenko , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, kernel-team@android.com, Daniel Rosenberg Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org These patches relax a few verifier requirements around dynptrs. Patches 1-3 are unchanged from v2, apart from rebasing Patch 4 is the same as in v1, see https://lore.kernel.org/bpf/CA+PiJmST4WUH061KaxJ4kRL=fqy3X6+Wgb2E2rrLT5OYjUzxfQ@mail.gmail.com/ Patch 5 adds a test for the change in Patch 4 Daniel Rosenberg (5): bpf: Allow NULL buffers in bpf_dynptr_slice(_rw) selftests/bpf: Test allowing NULL buffer in dynptr slice selftests/bpf: Check overflow in optional buffer bpf: verifier: Accept dynptr mem as mem in helpers selftests/bpf: Accept mem from dynptr in helper funcs Documentation/bpf/kfuncs.rst | 23 ++++++++++- include/linux/skbuff.h | 2 +- kernel/bpf/helpers.c | 30 +++++++++------ kernel/bpf/verifier.c | 21 ++++++++-- .../testing/selftests/bpf/prog_tests/dynptr.c | 2 + .../testing/selftests/bpf/progs/dynptr_fail.c | 20 ++++++++++ .../selftests/bpf/progs/dynptr_success.c | 38 +++++++++++++++++++ 7 files changed, 118 insertions(+), 18 deletions(-) base-commit: f4dea9689c5fea3d07170c2cb0703e216f1a0922 -- 2.40.1.521.gf1e218fcd8-goog