From patchwork Wed Sep 23 16:01:55 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenz Bauer X-Patchwork-Id: 1369930 X-Patchwork-Delegate: bpf@iogearbox.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=reject dis=none) header.from=cloudflare.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=cloudflare.com header.i=@cloudflare.com header.a=rsa-sha256 header.s=google header.b=esIbknqQ; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4BxNGy4jXBz9sR4 for ; Thu, 24 Sep 2020 02:02:18 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726693AbgIWQCR (ORCPT ); Wed, 23 Sep 2020 12:02:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47662 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726596AbgIWQCR (ORCPT ); Wed, 23 Sep 2020 12:02:17 -0400 Received: from mail-wm1-x342.google.com (mail-wm1-x342.google.com [IPv6:2a00:1450:4864:20::342]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 15366C0613D1 for ; Wed, 23 Sep 2020 09:02:17 -0700 (PDT) Received: by mail-wm1-x342.google.com with SMTP id b79so599015wmb.4 for ; Wed, 23 Sep 2020 09:02:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=rdZb3lkVUE/br401TIltJMdSSQTxebl44uSvpco1MYk=; b=esIbknqQR1PWGRENT0xKgyxyBUfTCQPkzyu0zLWk74o/new4euRMzzV+8wd2MhjqMx mXfpdhkmcqZTr0/mz5EDpZJjFtPgff9yeCEE5kvsn6cMlMidKrR4DvhVe9MtsCJE3wkf MELyEzgTi5LoRSRjzur483hto6+zAHlm6i30M= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=rdZb3lkVUE/br401TIltJMdSSQTxebl44uSvpco1MYk=; b=mZvjFrKNMs/TH34XAJlICe08ctC5dWe52Ddxqz2aU2HlRRyp6dxfrPP4os4SeoPwsf qOZ+eU3OYHjn6okjYYBD0Q+oVIJV6Wsy1pGH/fn3GNCcApsa3X2XwR9q/2AaEQskzRGH NEsFsNNNLaut/NOP85VBymT+gZbqPiSt6ILX+kX0MIy2yz0IR0So+JwHKrdJ5IPTY88S XsEDwwtlOoK7grnhO/IRTEA9AMja6CwRX3ckwozAkK5ad2Zmfn4Iviwav6NoCHMSTvNo ILRYTXMla6XfAH6Ne90VnAPHBw26aZig9kjPJkgEitoZjCE/5DjVxMDr7pjBPhlqgtbV EP1w== X-Gm-Message-State: AOAM531YD01Wbjt1P5FS41kMdkv5jNGzMtoPLab+YurHCAgkivfYamvn 8t3rqie3dROGHuMQ38Eq4ZpRcw== X-Google-Smtp-Source: ABdhPJw01DyGsYQK0//pvTxTR5IoS3N3sptt7R9Q4hiyc/CBkbaYXGi4glGU0Ks0BXomXuNo91tMkw== X-Received: by 2002:a7b:cd0f:: with SMTP id f15mr245825wmj.3.1600876935669; Wed, 23 Sep 2020 09:02:15 -0700 (PDT) Received: from antares.lan (a.5.8.e.c.0.7.0.9.d.7.b.b.9.4.7.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff:749b:b7d9:70c:e85a]) by smtp.gmail.com with ESMTPSA id u66sm262359wme.12.2020.09.23.09.02.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 23 Sep 2020 09:02:14 -0700 (PDT) From: Lorenz Bauer To: Alexei Starovoitov , Daniel Borkmann Cc: kernel-team@cloudflare.com, Lorenz Bauer , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next] bpf: explicitly size compatible_reg_types Date: Wed, 23 Sep 2020 17:01:55 +0100 Message-Id: <20200923160156.80814-1-lmb@cloudflare.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Arrays with designated initializers have an implicit length of the highest initialized value plus one. I used this to ensure that newly added entries in enum bpf_reg_type get a NULL entry in compatible_reg_types. This is difficult to understand since it requires knowledge of the peculiarities of designated initializers. Use __BPF_ARG_TYPE_MAX to size the array instead. Signed-off-by: Lorenz Bauer Suggested-by: Alexei Starovoitov Acked-by: Andrii Nakryiko --- kernel/bpf/verifier.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 15ab889b0a3f..d7c993ded26a 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -4002,7 +4002,7 @@ static const struct bpf_reg_types const_map_ptr_types = { .types = { CONST_PTR_T static const struct bpf_reg_types btf_ptr_types = { .types = { PTR_TO_BTF_ID } }; static const struct bpf_reg_types spin_lock_types = { .types = { PTR_TO_MAP_VALUE } }; -static const struct bpf_reg_types *compatible_reg_types[] = { +static const struct bpf_reg_types *compatible_reg_types[__BPF_ARG_TYPE_MAX] = { [ARG_PTR_TO_MAP_KEY] = &map_key_value_types, [ARG_PTR_TO_MAP_VALUE] = &map_key_value_types, [ARG_PTR_TO_UNINIT_MAP_VALUE] = &map_key_value_types, @@ -4025,7 +4025,6 @@ static const struct bpf_reg_types *compatible_reg_types[] = { [ARG_PTR_TO_ALLOC_MEM_OR_NULL] = &alloc_mem_types, [ARG_PTR_TO_INT] = &int_ptr_types, [ARG_PTR_TO_LONG] = &int_ptr_types, - [__BPF_ARG_TYPE_MAX] = NULL, }; static int check_reg_type(struct bpf_verifier_env *env, u32 regno,