Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp699992ybz; Fri, 17 Apr 2020 08:29:39 -0700 (PDT) X-Google-Smtp-Source: APiQypJ60sBGxgVtwjVNZ+UabpZfprp4IU1Z0tg8ls2lNqv//noQHrU8dQG0BXYaGJ99SDQTDTS0 X-Received: by 2002:a50:9e2a:: with SMTP id z39mr3691857ede.178.1587137378874; Fri, 17 Apr 2020 08:29:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587137378; cv=none; d=google.com; s=arc-20160816; b=mZPRz2hom4fAxwV2k4+HQAaWtERfvN2Jy9qZ1Jwtr+8qX/5GbOIJhEmjhSldFsJEgs 3QxEyBpBcE1YSAKy6+qWWOYFDGnrxIfNr1nYgrnlaKKEPPt9t4Ty19/GbAKuAURJkPFH ouqSWQdpj3u8kevUfgk+SxtCzlNDdG38yyOQBpILnMUV73dxgRs7MWRvH5pB70VeuetU 6W30vYfg4XSvVU4f6Apzew2asK2XvXFhrcDPtvJRRI7t9ZBJnxd02vWYLZiAGr/4L6o7 jB6kforQjgik05IHvGkaHR/TbwrqdF4yt1AhiX3ZnDdvAoPMV2u7v+461uY1IzGnwHXr iKkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Yqtf2Cr9VCQpUS0GldnV7JK60DFB1BUHRTQDFzdrac0=; b=dx7vDanq5wYYy4z84O6EaqWqDOmSU2e4qUmCgMk96fAVIjSo1t5ox5SOQ6mPHddWBF oD9dzrsGEqg9P8dra9gtnXYc6foGiVJ9h6U9mb5/WDyA/X5oYKdCny2IgZPVhw+eFZxF COc4hrU4HOS8IbypJgoXmP0COOcJHEkVa7T2jNgJHYQXbZjzuQJLhSFm3a4kzPubC0+e oQFZ5BteIBJ9cbUTNf4F0/ZBbkksSHydt+cdqt9bj8JZXO1EgfufAqv/TUITndEqBEFH Qo/gb98wzp7mEyVFzCh56vhzfkkIXAwW5DgLtLFhsHb86YJB5+fhYx0hUs+dWVpZRIkO aovw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=PsghyDdO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y24si8511386edw.420.2020.04.17.08.29.15; Fri, 17 Apr 2020 08:29:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=PsghyDdO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729083AbgDQP11 (ORCPT + 99 others); Fri, 17 Apr 2020 11:27:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1728542AbgDQP11 (ORCPT ); Fri, 17 Apr 2020 11:27:27 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C298C061A0C for ; Fri, 17 Apr 2020 08:27:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=Yqtf2Cr9VCQpUS0GldnV7JK60DFB1BUHRTQDFzdrac0=; b=PsghyDdOxbKQz5ubAHKB+S1KQ1 4WGvoF0mQLZg7hUM7fMf8NP5ldMyeI3yCYJx6RLRak2X5e+/Q9xDAZRUP0QQU9W1n2QQPTfGOggc1 7CqiU9OJaaxVW+QPFi4Dyfve2Njq9xOAD+9mHA8/u+KFHkSdq1bH9aDEzeFKrnuisXCs6Ycf4toKF 88xJh20yh3d3gSYbH10L6SP20nwScbLCX/6eZFXn2BOF4GtsdEOGKzF6nUJuak+7+vX9OIjbkXrE0 DUV9lrpFh2d5OVlZ+pHRjXK3TL/SFRewlLfAK1go3ND7b0enqZh42kTCvyg04auwwc3DAZLklUu69 Lr0cyH0w==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by bombadil.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1jPStE-0008Sz-Ht; Fri, 17 Apr 2020 15:26:48 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id DF502304E03; Fri, 17 Apr 2020 17:26:45 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id BFFE02B12192B; Fri, 17 Apr 2020 17:26:45 +0200 (CEST) Date: Fri, 17 Apr 2020 17:26:45 +0200 From: Peter Zijlstra To: Mark Rutland Cc: Sami Tolvanen , Will Deacon , Catalin Marinas , James Morse , Steven Rostedt , Ard Biesheuvel , Masahiro Yamada , Michal Marek , Ingo Molnar , Juri Lelli , Vincent Guittot , Dave Martin , Kees Cook , Laura Abbott , Marc Zyngier , Masami Hiramatsu , Nick Desaulniers , Jann Horn , Miguel Ojeda , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v11 04/12] scs: disable when function graph tracing is enabled Message-ID: <20200417152645.GH20730@hirez.programming.kicks-ass.net> References: <20191018161033.261971-1-samitolvanen@google.com> <20200416161245.148813-1-samitolvanen@google.com> <20200416161245.148813-5-samitolvanen@google.com> <20200417100039.GS20730@hirez.programming.kicks-ass.net> <20200417144620.GA9529@lakrids.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200417144620.GA9529@lakrids.cambridge.arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 17, 2020 at 03:46:21PM +0100, Mark Rutland wrote: > > > diff --git a/arch/Kconfig b/arch/Kconfig > > > index 691a552c2cc3..c53cb9025ad2 100644 > > > --- a/arch/Kconfig > > > +++ b/arch/Kconfig > > > @@ -542,6 +542,7 @@ config ARCH_SUPPORTS_SHADOW_CALL_STACK > > > > > > config SHADOW_CALL_STACK > > > bool "Clang Shadow Call Stack" > > > + depends on DYNAMIC_FTRACE_WITH_REGS || !FUNCTION_GRAPH_TRACER > > > depends on ARCH_SUPPORTS_SHADOW_CALL_STACK > > > help > > > This option enables Clang's Shadow Call Stack, which uses a > > > AFAICT you also need to kill KRETPROBES, which plays similar games. > > Hmm... how does KREPROBES work? If you can only mess with the return > address when probing the first instruction in the function, it'll just > work for SCS or pointer authentication, as the LR is used at that > instant. If KRETPROBES tries to mess with the return address elsewhere > it'd be broken today... To be fair, I've not looked at the arm64 implementation. x86 does gross things like ftrace does. On x86 ftrace_graph and kretprobe also can't be on at the same time for the same function, there's some yuck around there. Rostedt was recently talking about cleaning some of that up. But if kretprobe can work on arm64, then ftrace_graph can too, but I think that links back to what you said earlier, you didn't want more ftrace variants or something. > > And doesn't BPF also do stuff like this? > > Can BPF mess with return addresses now!? At least on x86 I think it does. But what do I know, I can't operate that stuff. Rostedt might know.