Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2969654rwd; Fri, 2 Jun 2023 18:31:54 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5jXAw074vWPGEjnnEuLUoPYEj1HnvaeVCNo+2zE7OHD2fPTt1ApsnvSbFqmKXdbe4wPd3Y X-Received: by 2002:a05:6830:1311:b0:6af:8b3f:cda4 with SMTP id p17-20020a056830131100b006af8b3fcda4mr3938213otq.13.1685755914599; Fri, 02 Jun 2023 18:31:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685755914; cv=none; d=google.com; s=arc-20160816; b=BB2H44vMZ883tG0B84n7oSCU7UrJ3bzXY/5QPglKY6+59//mkIEVjifaltx6uh51aS ipAeFto3v9ptSCmocAD7wCTaywXXzr5ryXROf+sozZ0EMN0YN5ZJPBvUgF+0Oas4MApv KF7EB42uVlBl7QpSf8XMN2lZVpKByMSOoJbYf5yrwYd2Dx/WHglo0dq7IwTAELH++6ui K9kgWSjME7cgTNy6gW2FlybnQ0fL5uny77AwK8RkrCbppUmow7EufAlFqztpr4KJv6rz bvgcPfvpkOSjGg7V39RGKNJsy5U8GMgZLqY9TK4zLWAaOt0u/Eu2yMMWoB0jCeEdo1Wy o05w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=r9odDFuUUCWNFrJW5Mn1/x9rMGT75lmcR9ka1dMFpE4=; b=xXHX+e5XytFNBBlDRj2X4HWAEIiO1j5M0RQ9Opf8mSECL0gGBw/iDpwPwLpkBAKSyw 3Jg3sFaN1xl6QOofKQ+cGxQX6O910HWzsSeqHxP41yruJtr9wa93vgeieIvM+X4+zNcI upO9GlnIJLt22ggHQAoHi5/3xTRjXMXzmKPmuuuOrnyrkuz75Bfg4zXReFggJMrbx0Ch f9Pt72XyqPMni8VDkbxo2NbCZwEoIN+6AegzLdz+p9Gyl0EDqL2u2WySX4aVEsGCCW0W 5CdANj8b1EwE+XQe2vklv6xqpDg1q+Kj7ghISn0PEzmOouMCZy8HN2T3gD+ZpAmh4rgG zBcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=Jv7XGDxz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v63-20020a626142000000b0063d19a45a93si1579277pfb.280.2023.06.02.18.31.38; Fri, 02 Jun 2023 18:31:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=Jv7XGDxz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236966AbjFCB06 (ORCPT + 99 others); Fri, 2 Jun 2023 21:26:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50864 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236509AbjFCB04 (ORCPT ); Fri, 2 Jun 2023 21:26:56 -0400 Received: from mail-yw1-x1149.google.com (mail-yw1-x1149.google.com [IPv6:2607:f8b0:4864:20::1149]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A5E9219B for ; Fri, 2 Jun 2023 18:26:55 -0700 (PDT) Received: by mail-yw1-x1149.google.com with SMTP id 00721157ae682-565de486762so34995277b3.3 for ; Fri, 02 Jun 2023 18:26:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1685755615; x=1688347615; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=r9odDFuUUCWNFrJW5Mn1/x9rMGT75lmcR9ka1dMFpE4=; b=Jv7XGDxzp2tsB25VC6pyU0066j5ScpxkzYxTx88IAYu/PzkCsqAUGFutIplRdqxDvR f7YtpwlbTOjWdwErALUEPDvv8h+xSpcSEmEpUs93NthDTXJfk7c2vrPIfpaCXJlUvfnP eefGoRmZZQgMZdWHno/fOIeibRxus2L1wthgWDRr8PQrt8SV3+ApF5GaRFUixWB/bQrx 7rK3YUvwJmns1RQjS3rzo+u9RW1rIEobxYGlsvB5Krjq8ZhKKpY4xgDim9PbAyqtfRr8 HNP1pMCv70xFxKHRAXuY/Vxo/yYlTVDWtF+xM9OXVlS3p3DD/ECZKGwK0WXhmlQVz48g qv9Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685755615; x=1688347615; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=r9odDFuUUCWNFrJW5Mn1/x9rMGT75lmcR9ka1dMFpE4=; b=i6j8Icz7kPSmypIP+bZuzCkcZa/xDvFBNNdpPCSsy0Lewf58Kgidk3OoHDesT05Sbz xJEkcVr3qy3gE4cvfglxxjXYgJ2yUvQzOxXaiQP+t5fPCzNcfYRVyZ7dxpcnr+NkNTPt OSYDDi7Ii4Y3SagxfE6cockYHXNjXvGWl2aikocSFljyXHjkTT8eYs1K11c/zUTKvCTB 5HEs0N4q+/cmW07dQbjpb5VORDW306dhNB4tnzqr9YYWPb8CjvxSYOWnoDIZzVuFGEgu +IA6pLuy0K9I/tIFhXJ61SN3DVqmMbwT276Wp/3de0pUBH4A2xm2PmfigODZ4BrI9koa HxgA== X-Gm-Message-State: AC+VfDyHdqTScGN3FOdIr3u7fWRKlU8zq6P54wMhK5FIXVQUCXnG3oOp Y682MRYuSOscOHcOHMeqqUTID/U= X-Received: from sdf.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5935]) (user=sdf job=sendgmr) by 2002:a81:ad66:0:b0:55d:955b:360 with SMTP id l38-20020a81ad66000000b0055d955b0360mr796535ywk.5.1685755614961; Fri, 02 Jun 2023 18:26:54 -0700 (PDT) Date: Fri, 2 Jun 2023 18:26:53 -0700 In-Reply-To: <20230602150112.1494194-2-void@manifault.com> Mime-Version: 1.0 References: <20230602150112.1494194-1-void@manifault.com> <20230602150112.1494194-2-void@manifault.com> Message-ID: Subject: Re: [PATCH bpf-next 2/2] selftests/bpf: Add test for non-NULLable PTR_TO_BTF_IDs From: Stanislav Fomichev To: David Vernet Cc: bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, haoluo@google.com, jolsa@kernel.org, linux-kernel@vger.kernel.org, kernel-team@meta.com Content-Type: text/plain; charset="utf-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/02, David Vernet wrote: > In a recent patch, we taught the verifier that trusted PTR_TO_BTF_ID can > never be NULL. This prevents the verifier from incorrectly failing to > load certain programs where it gets confused and thinks a reference > isn't dropped because it incorrectly assumes that a branch exists in > which a NULL PTR_TO_BTF_ID pointer is never released. > > This patch adds a testcase that verifies this cannot happen. > > Signed-off-by: David Vernet Acked-by: Stanislav Fomichev I hope someone else can look at the actual change. It looks good to me conceptually, but not sure what other parts it might affect. > --- > .../selftests/bpf/prog_tests/cpumask.c | 1 + > .../selftests/bpf/progs/cpumask_success.c | 24 +++++++++++++++++++ > 2 files changed, 25 insertions(+) > > diff --git a/tools/testing/selftests/bpf/prog_tests/cpumask.c b/tools/testing/selftests/bpf/prog_tests/cpumask.c > index cdf4acc18e4c..d89191440fb1 100644 > --- a/tools/testing/selftests/bpf/prog_tests/cpumask.c > +++ b/tools/testing/selftests/bpf/prog_tests/cpumask.c > @@ -70,5 +70,6 @@ void test_cpumask(void) > verify_success(cpumask_success_testcases[i]); > } > > + RUN_TESTS(cpumask_success); > RUN_TESTS(cpumask_failure); > } > diff --git a/tools/testing/selftests/bpf/progs/cpumask_success.c b/tools/testing/selftests/bpf/progs/cpumask_success.c > index 2fcdd7f68ac7..602a88b03dbc 100644 > --- a/tools/testing/selftests/bpf/progs/cpumask_success.c > +++ b/tools/testing/selftests/bpf/progs/cpumask_success.c > @@ -5,6 +5,7 @@ > #include > #include > > +#include "bpf_misc.h" > #include "cpumask_common.h" > > char _license[] SEC("license") = "GPL"; > @@ -426,3 +427,26 @@ int BPF_PROG(test_global_mask_rcu, struct task_struct *task, u64 clone_flags) > > return 0; > } > + > +SEC("tp_btf/task_newtask") > +__success > +int BPF_PROG(test_refcount_null_tracking, struct task_struct *task, u64 clone_flags) > +{ > + struct bpf_cpumask *mask1, *mask2; > + > + mask1 = bpf_cpumask_create(); > + mask2 = bpf_cpumask_create(); > + > + if (!mask1 || !mask2) > + goto free_masks_return; > + > + bpf_cpumask_test_cpu(0, (const struct cpumask *)mask1); > + bpf_cpumask_test_cpu(0, (const struct cpumask *)mask2); > + > +free_masks_return: > + if (mask1) > + bpf_cpumask_release(mask1); > + if (mask2) > + bpf_cpumask_release(mask2); > + return 0; > +} > -- > 2.40.1 >