Skip to content

Commit a23740e

Browse files
anakryikoborkmann
authored andcommitted
bpf: Track contents of read-only maps as scalars
Maps that are read-only both from BPF program side and user space side have their contents constant, so verifier can track referenced values precisely and use that knowledge for dead code elimination, branch pruning, etc. This patch teaches BPF verifier how to do this. Signed-off-by: Andrii Nakryiko <andriin@fb.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20191009201458.2679171-2-andriin@fb.com
1 parent e0b68fb commit a23740e

1 file changed

Lines changed: 55 additions & 2 deletions

File tree

kernel/bpf/verifier.c

Lines changed: 55 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2739,6 +2739,41 @@ static void coerce_reg_to_size(struct bpf_reg_state *reg, int size)
27392739
reg->smax_value = reg->umax_value;
27402740
}
27412741

2742+
static bool bpf_map_is_rdonly(const struct bpf_map *map)
2743+
{
2744+
return (map->map_flags & BPF_F_RDONLY_PROG) && map->frozen;
2745+
}
2746+
2747+
static int bpf_map_direct_read(struct bpf_map *map, int off, int size, u64 *val)
2748+
{
2749+
void *ptr;
2750+
u64 addr;
2751+
int err;
2752+
2753+
err = map->ops->map_direct_value_addr(map, &addr, off);
2754+
if (err)
2755+
return err;
2756+
ptr = (void *)addr + off;
2757+
2758+
switch (size) {
2759+
case sizeof(u8):
2760+
*val = (u64)*(u8 *)ptr;
2761+
break;
2762+
case sizeof(u16):
2763+
*val = (u64)*(u16 *)ptr;
2764+
break;
2765+
case sizeof(u32):
2766+
*val = (u64)*(u32 *)ptr;
2767+
break;
2768+
case sizeof(u64):
2769+
*val = *(u64 *)ptr;
2770+
break;
2771+
default:
2772+
return -EINVAL;
2773+
}
2774+
return 0;
2775+
}
2776+
27422777
/* check whether memory at (regno + off) is accessible for t = (read | write)
27432778
* if t==write, value_regno is a register which value is stored into memory
27442779
* if t==read, value_regno is a register which will receive the value from memory
@@ -2776,9 +2811,27 @@ static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regn
27762811
if (err)
27772812
return err;
27782813
err = check_map_access(env, regno, off, size, false);
2779-
if (!err && t == BPF_READ && value_regno >= 0)
2780-
mark_reg_unknown(env, regs, value_regno);
2814+
if (!err && t == BPF_READ && value_regno >= 0) {
2815+
struct bpf_map *map = reg->map_ptr;
2816+
2817+
/* if map is read-only, track its contents as scalars */
2818+
if (tnum_is_const(reg->var_off) &&
2819+
bpf_map_is_rdonly(map) &&
2820+
map->ops->map_direct_value_addr) {
2821+
int map_off = off + reg->var_off.value;
2822+
u64 val = 0;
27812823

2824+
err = bpf_map_direct_read(map, map_off, size,
2825+
&val);
2826+
if (err)
2827+
return err;
2828+
2829+
regs[value_regno].type = SCALAR_VALUE;
2830+
__mark_reg_known(&regs[value_regno], val);
2831+
} else {
2832+
mark_reg_unknown(env, regs, value_regno);
2833+
}
2834+
}
27822835
} else if (reg->type == PTR_TO_CTX) {
27832836
enum bpf_reg_type reg_type = SCALAR_VALUE;
27842837

0 commit comments

Comments
 (0)