[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240227151115.4623-1-puranjay12@gmail.com>
Date: Tue, 27 Feb 2024 15:11:14 +0000
From: Puranjay Mohan <puranjay12@...il.com>
To: Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
Andrii Nakryiko <andrii@...nel.org>,
Martin KaFai Lau <martin.lau@...ux.dev>,
Eduard Zingerman <eddyz87@...il.com>,
Song Liu <song@...nel.org>,
Yonghong Song <yonghong.song@...ux.dev>,
John Fastabend <john.fastabend@...il.com>,
KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...gle.com>,
Hao Luo <haoluo@...gle.com>,
Jiri Olsa <jolsa@...nel.org>,
Zi Shen Lim <zlim.lnx@...il.com>,
Mark Rutland <mark.rutland@....com>,
Suzuki K Poulose <suzuki.poulose@....com>,
Mark Brown <broonie@...nel.org>,
linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org (open list),
bpf@...r.kernel.org (open list:BPF [GENERAL] (Safe Dynamic Programs and Tools)),
Josh Poimboeuf <jpoimboe@...nel.org>
Cc: puranjay12@...il.com
Subject: [PATCH bpf-next 0/1] Support kCFI + BPF on arm64
On ARM64 with CONFIG_CFI_CLANG, CFI warnings can be triggered by running
the bpf selftests. This is because the JIT doesn't emit proper CFI prologues
for BPF programs, callbacks, and struct_ops trampolines.
Example Warning:
CFI failure at bpf_rbtree_add_impl+0x120/0x1d4 (target: bpf_prog_fb8b097ab47d164a_less+0x0/0x98; expected type: 0x9e4709a9)
WARNING: CPU: 0 PID: 1488 at bpf_rbtree_add_impl+0x120/0x1d4
Modules linked in: bpf_testmod(OE) virtio_net net_failover failover aes_ce_blk aes_ce_cipher ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_mmio uio_pdrv_genirq uio dm_mod dax configfs [last unloaded: bpf_testmod(OE)]
CPU: 0 PID: 1488 Comm: new_name Tainted: P OE 6.8.0-rc1+ #1
Hardware name: linux,dummy-virt (DT)
pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : bpf_rbtree_add_impl+0x120/0x1d4
lr : bpf_prog_234260f1d6227155_rbtree_first_and_remove+0x218/0x438
sp : ffff80008444bb10
x29: ffff80008444bb10 x28: ffff80008444bbf0 x27: ffff80008444bb60
x26: 0000000000000000 x25: 0000000000000010 x24: 0000000000000008
x23: 0000000000000001 x22: ffff00000ab71658 x21: ffff8000843dd5fc
x20: ffff00000ab459f0 x19: ffff00000ab71358 x18: 0000000000000000
x17: 000000009e4709a9 x16: 00000000d4202000 x15: 0000aaaadf15e420
x14: 0000000000004007 x13: ffff800084448000 x12: 0000000000000000
x11: dead00000000eb9f x10: ffff00000ab71370 x9 : 0000000000000000
x8 : ffff00000ab71658 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : ffff00000ab71658 x0 : ffff00000ab71358
Call trace:
bpf_rbtree_add_impl+0x120/0x1d4
bpf_prog_234260f1d6227155_rbtree_first_and_remove+0x218/0x438
bpf_test_run+0x190/0x358
bpf_prog_test_run_skb+0x354/0x460
bpf_prog_test_run+0x128/0x164
__sys_bpf+0x364/0x428
__arm64_sys_bpf+0x30/0x44
invoke_syscall+0x64/0x128
el0_svc_common+0xb4/0xe8
do_el0_svc+0x28/0x34
el0_svc+0x58/0x108
el0t_64_sync_handler+0x90/0xfc
el0t_64_sync+0x1a8/0x1ac
irq event stamp: 35493817
hardirqs last enabled at (35493816): [<ffff8000802e4268>] unit_alloc+0x110/0x1b0
hardirqs last disabled at (35493817): [<ffff8000802ad35c>] bpf_spin_lock+0x2c/0xec
softirqs last enabled at (35493688): [<ffff800080275934>] bpf_ksym_add+0x164/0x184
softirqs last disabled at (35493810): [<ffff800080cd9ac8>] local_bh_disable+0x4/0x30
---[ end trace 0000000000000000 ]---
This patch fixes the prologue and trampoline generation code to emit the
KCFI hash before the expected branch targets. The KCFI hashes are generated
at compile time and are unique to function prototypes. To allow the JIT to
find these hashes at runtime, the following behaviour of the compiler is used:
Two function prototypes are declared, one for BPF programs and another for callbacks:
extern unsigned int __bpf_prog_runX(const void *ctx, const struct bpf_insn *insn);
extern u64 __bpf_callback_fn(u64, u64, u64, u64, u64);
We force a reference to these external symbols:
__ADDRESSABLE(__bpf_prog_runX);
__ADDRESSABLE(__bpf_callback_fn);
This makes the compiler add the following two symbols with the hashes in
the symbol table:
00000000d9421881 0 NOTYPE WEAK DEFAULT ABS __kcfi_typeid___bpf_prog_runX
000000009e4709a9 0 NOTYPE WEAK DEFAULT ABS __kcfi_typeid___bpf_callback_fn
The JIT can now use the above symbols to emit the hashes in the prologues of
the programs and callbacks.
For struct_ops trampoline, the bpf_struct_ops_prepare_trampoline() function
receives a stub function that would have the hash at (function - 4). The
bpf_struct_ops_prepare_trampoline() sets `flags = BPF_TRAMP_F_INDIRECT;`
which tells prepare_trampoline() to find the hash before the stub function
and emit it in the struct_ops trampoline.
Running the selftests causes no CFI warnings:
---------------------------------------------
test_progs: Summary: 454/3613 PASSED, 62 SKIPPED, 74 FAILED
test_tag: OK (40945 tests)
test_verifier: Summary: 789 PASSED, 0 SKIPPED, 0 FAILED
ARM64 Doesn't support DYNAMIC_FTRACE_WITH_CALL_OPS when CFI_CLANG is
enabled. This causes all tests that attach fentry to kernel functions to fail.
While running the selftests, I saw some CFI warnings which were related to
static calls. Josh Poimboeuf had sent a patch series[1] last year that includes
a patch to fix this issue. I forward ported those patches and rebased my patch
on that series. You can find the tree here[2]. With this tree there are
zero CFI warnings.
[1] https://lore.kernel.org/all/cover.1679456900.git.jpoimboe@kernel.org/
[2] https://github.com/puranjaymohan/linux/tree/kcfi_bpf
Puranjay Mohan (1):
arm64/cfi,bpf: Support kCFI + BPF on arm64
arch/arm64/include/asm/cfi.h | 23 ++++++++++++++
arch/arm64/kernel/alternative.c | 54 +++++++++++++++++++++++++++++++++
arch/arm64/net/bpf_jit_comp.c | 26 ++++++++++++----
3 files changed, 97 insertions(+), 6 deletions(-)
create mode 100644 arch/arm64/include/asm/cfi.h
--
2.40.1
Powered by blists - more mailing lists