Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp1417178lqg; Sun, 3 Mar 2024 09:02:42 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXo5qoE7j3CbC6/TVErqsZ+hZDoQB/kgXG72/F6O97OJohjWDbpBF7pjCVuw1R9Yep0VIeTN2pLoTzXJ2mLcSstOVDO9j2aX6cXvuZaSA== X-Google-Smtp-Source: AGHT+IF/6WSRGb8MM91WrgAewLaxQlprgQxjK72N4sTAKx8KplEJ7u2uMlPE0odrCGA4bFjxRO08 X-Received: by 2002:a05:620a:4794:b0:787:a7c1:9d03 with SMTP id dt20-20020a05620a479400b00787a7c19d03mr7101394qkb.69.1709485361769; Sun, 03 Mar 2024 09:02:41 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709485361; cv=pass; d=google.com; s=arc-20160816; b=MlRB0d+me8KrN0XSCoLFWlgS2qwYGqC/M6anhEsrXZ/wYFcPAPQk7qSrDLzBhfqL+S luyACQX8RF6bOAsNoHcEcS6Moy1F7kkOjuzb5T50MX8JVPczyygOUESrVVbpowc6y0WU SQ5sY77vZfUxPdvIYFAiLu2Js5EyK2RrOFfciSY9RQpsy7vikIxQAcRDU1C9gDViscg1 wouanoe198+Oc2ALQ1LpqfxsCEGztzrk1z3kW7ihIxvHmsK8rgdf1Fjv0OuOoOaAL1Z3 zA5QUJ4T8g802qHZJ5qHkGfZcUqhSd4ItBYhFwy+8M56YBieU0VWr4aQchFNPSaEGsLi JtIw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=aXb8hGH2jHCp7nT3iUyBh9PSkpjh+LjZSwquxd8Rwc0=; fh=LzDEnl3rQ7mpnyNU7m49Z5eWWtHCaP6L5bZ1mmQIuaw=; b=mtXbHxq9madji4KYX+1VyvhhsAS7QlZqLh9YS6sVsYX+fAQUOolOuH89I7NxLJAIba fehnrvXe25/XCrMTmcEDevjAp6O012cvGFIZgcCcHjqG3cYm6p1f+XFqW3wX+bNoftiO hHMYzfc8lKwuZlheYmOZa3Ajvds/ts9CQ8qEmVr3b8Dj8bGnjTTJHGesO+1KA2hv67Ns PYqOENOBviJMJ4tA8QYnAot7p2yoYQQCgUEjKmPBXjLLFO3v5fIY1oHAhoLKaqbW/buI 6XvHn6TC+lVdrhlnO00QGnMwhsdXScFtwZ3OAF6A/TruQaUNImg0ehyvbmmzllVrIqsB vEcQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=RM6nnGy4; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-89839-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89839-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id l23-20020a37f517000000b007880faa4920si4501064qkk.496.2024.03.03.09.02.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Mar 2024 09:02:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-89839-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=RM6nnGy4; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-89839-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89839-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 2C3151C2143D for ; Sun, 3 Mar 2024 17:02:41 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9806276047; Sun, 3 Mar 2024 17:02:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="RM6nnGy4" Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CF73E76033; Sun, 3 Mar 2024 17:02:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.51 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709485351; cv=none; b=gbVzDm+HHwZF4iq77Fs23aQiMzFTrgJr1qo/atXcG+rV6KVWS0hrNu+NIu0kcdbG58Cj9ZRSlsuwBDfcH2S/klcJuyS041gKLGhrGwZD/QnSnOrGyF8TfRUfksA270cyYnU76ONSIrgJdFiZMvmHsseWtTWzmJiiCobk7AmnZvU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709485351; c=relaxed/simple; bh=f09NI2/XxHP07DS5G48Jhx1ZgN9x1rYt+LRFgFJxvVU=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=EV+wq4WHgBBl59qy33aVWTpFoPtUQo07qFpQWDFuN3bN/KmagzUD1C2VrH0qTjmECzMmd3dYB5bzV1+Y6Ulf1m+9SXjAh4jSFSFvgPP3iuQSnmqJB7+2xhbmnjkO2XnXMl96ZqEit/yr48hb68Lc9+5cSCWHLp+bCRaQAkufRmI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=RM6nnGy4; arc=none smtp.client-ip=209.85.128.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-412e4426e32so160345e9.2; Sun, 03 Mar 2024 09:02:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1709485348; x=1710090148; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=aXb8hGH2jHCp7nT3iUyBh9PSkpjh+LjZSwquxd8Rwc0=; b=RM6nnGy4gY2N5euRbjm3nEiobOrU7I1909hhvJOj9xF3GmofKe0hMWFh4aA6DA5Hs+ gFsK3TJR7DGjrBsZ5hpIQGEat9lVDEuUxzjFeOtI75wMkL7ihJlTBJ9XEpOHIPaIBbSz Rq87P0WwVsNQ59VFGABlAgwkhFVMoR61r+MdU3SYon1oaxxlmGLDkT95yLEQBr0j1zGl UVqtDGxhwhyTinAcIynNBNGOyKzjI39kMpaKmzfK3LvM4VdiJZowCvMZhHZzvcFLPWDr V4++MuCv7JA91LAuAikzfReUzyK5E/JaweWzUNbHJoqPJtmI+i+S8M8sXlce8nmOTREf yz8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709485348; x=1710090148; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=aXb8hGH2jHCp7nT3iUyBh9PSkpjh+LjZSwquxd8Rwc0=; b=PiPpQWTy7HC3Q0tj1Dg7LjSRV10WH/BE1tjJ2qODIsW0gbfLX73tf4+LF3VNH7PBC4 tVejaHSw3Z/KE1nAmxLYpG4Q9oivt0jvksJbPD2/xk8F42rE1EhKfRI/95cc7s91ZJvx Xf7oxqp3fx5uSB+KYWVyyiw+4fqFGG3Q9taXoBPMyM1EWlNox78WIgwzpyQP3FulKBP6 ClWQvXTKEExjjB9tblafwYPJgYGdlovcduZtbt7CtLVBXUn9qwy/C5QGhXC38Ie+p52m Gq2YqACYwBfXk2UWyN4p5OgmdziCC/JO+BiW4o635gEPD5ut/FJva9IcNbV0Lx74t38S Eldw== X-Forwarded-Encrypted: i=1; AJvYcCW+vYV5K7p0dyU4OaLsz+/BbPljfO1AJyBh0PE6SlWnSY/KGe+t6zhu6dZ7sPkhnBNS2vnGZf4R2o5kjm3yz7jFxlg0mGy+mJZ7IaNbTt35IloaSXW3Lj//BS+SRDaifDyY X-Gm-Message-State: AOJu0YyoeFqNBfnAuHGM/eQH05pcyPn/hxSHWbEVjCMGYPxpGUZ4aniB 6ktf/o6MowYoutR4w2dc7GN6sQPALt7jykJrNprYv/0Sx0AQNsr+ X-Received: by 2002:adf:eb03:0:b0:33d:2dd4:7f5b with SMTP id s3-20020adfeb03000000b0033d2dd47f5bmr4453339wrn.45.1709485347987; Sun, 03 Mar 2024 09:02:27 -0800 (PST) Received: from localhost (54-240-197-231.amazon.com. [54.240.197.231]) by smtp.gmail.com with ESMTPSA id v13-20020adfd04d000000b0033d202abf01sm9986612wrh.28.2024.03.03.09.02.27 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 03 Mar 2024 09:02:27 -0800 (PST) From: Puranjay Mohan To: Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Luke Nelson , Xi Wang , =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= , Sami Tolvanen , Peter Zijlstra , Kees Cook , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org Cc: puranjay12@gmail.com Subject: [PATCH bpf-next 0/1] Support kCFI + BPF on riscv64 Date: Sun, 3 Mar 2024 17:02:06 +0000 Message-Id: <20240303170207.82201-1-puranjay12@gmail.com> X-Mailer: git-send-email 2.40.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit With CONFIG_CFI_CLANG, the compiler injects a type preamble immediately before each function and a check to validate the target function type before indirect calls: ; type preamble .word function: ... ; indirect call check lw t1, -4(a0) lui t2, addiw t2, t2, beq t1, t2, .Ltmp0 ebreak .Ltmp0: jarl a0 BPF JIT currently doesn't emit this preamble before BPF programs and when the calling fuction tries to load the type id from the preamble, it finds an invalid value there. This will cause CFI failures like in the following bpf selftest: root@rv-selftester:~/bpf# ./test_progs -a "rbtree_success" CFI failure at bpf_rbtree_add_impl+0x148/0x350 (target: bpf_prog_fb8b097ab47d164a_less+0x0/0x42; expected type: 0x00000000) WARNING: CPU: 1 PID: 278 at bpf_rbtree_add_impl+0x148/0x350 Modules linked in: bpf_testmod(OE) drm fuse dm_mod backlight i2c_core configfs drm_panel_orientation_quirks ip_tables x_tables CPU: 1 PID: 278 Comm: test_progs Tainted: P OE 6.8.0-rc1 #1 Hardware name: riscv-virtio,qemu (DT) epc : bpf_rbtree_add_impl+0x148/0x350 ra : bpf_prog_27b36e47d273751e_rbtree_first_and_remove+0x1aa/0x35e epc : ffffffff805acc0c ra : ffffffff780077fa sp : ff2000000110b9d0 gp : ffffffff868d6218 tp : ff60000085772a40 t0 : ffffffff86849660 t1 : 0000000000000000 t2 : ffffffff9e4709a9 s0 : ff2000000110ba50 s1 : ff60000089c14958 a0 : ff60000089c14758 a1 : ff60000089c14958 a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 a5 : 0000000000000000 a6 : ff6000008aba4b30 a7 : ffffffff86849640 s2 : ff6000008aba4b30 s3 : ff60000089c14758 s4 : ffffffff780079f0 s5 : 0000000000000000 s6 : ffffffff84c01080 s7 : ff6000008aba4b30 s8 : 0000000000000000 s9 : 0000000000000000 s10: 0000000000000001 s11: 0000000000000000 t3 : ffffffff868499e0 t4 : ffffffff868499c0 t5 : ffffffff86849840 t6 : ffffffff86849860 status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003 [] bpf_rbtree_add_impl+0x148/0x350 [] bpf_prog_27b36e47d273751e_rbtree_first_and_remove+0x1aa/0x35e [] bpf_test_run+0x2a4/0xa3c [] bpf_prog_test_run_skb+0x47a/0xe52 [] bpf_prog_test_run+0x170/0x548 [] __sys_bpf+0x2d2/0x378 [] __riscv_sys_bpf+0x5c/0x120 [] syscall_handler+0x62/0xe4 [] do_trap_ecall_u+0xc6/0x27c [] ret_from_exception+0x0/0x64 ---[ end trace 0000000000000000 ]--- The calling function tries to load the type id hash from target_func - 4. If this memory address is not mapped then it can cause a page fault and crash the kernel. This behaviour can be seen by running the 'dummy_st_ops' selftest: root@rv-selftester:~/bpf# ./test_progs -a dummy_st_ops Unable to handle kernel paging request at virtual address ffffffff78204ffc Oops [#1] Modules linked in: bpf_testmod(OE) drm fuse backlight i2c_core drm_panel_orientation_quirks dm_mod configfs ip_tables x_tables [last unloaded: bpf_testmod(OE)] CPU: 3 PID: 356 Comm: test_progs Tainted: P OE 6.8.0-rc1 #1 Hardware name: riscv-virtio,qemu (DT) epc : bpf_struct_ops_test_run+0x28c/0x5fc ra : bpf_struct_ops_test_run+0x26c/0x5fc epc : ffffffff82958010 ra : ffffffff82957ff0 sp : ff200000007abc80 gp : ffffffff868d6218 tp : ff6000008d87b840 t0 : 000000000000000f t1 : 0000000000000000 t2 : 000000002005793e s0 : ff200000007abcf0 s1 : ff6000008a90fee0 a0 : 0000000000000000 a1 : 0000000000000000 a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 a5 : ffffffff868dba26 a6 : 0000000000000001 a7 : 0000000052464e43 s2 : 00007ffffc0a95f0 s3 : ff6000008a90fe80 s4 : ff60000084c24c00 s5 : ffffffff78205000 s6 : ff60000088750648 s7 : ff20000000035008 s8 : fffffffffffffff4 s9 : ffffffff86200610 s10: 0000000000000000 s11: 0000000000000000 t3 : ffffffff8483dc30 t4 : ffffffff8483dc10 t5 : ffffffff8483dbf0 t6 : ffffffff8483dbd0 status: 0000000200000120 badaddr: ffffffff78204ffc cause: 000000000000000d [] bpf_struct_ops_test_run+0x28c/0x5fc [] bpf_prog_test_run+0x170/0x548 [] __sys_bpf+0x2d2/0x378 [] __riscv_sys_bpf+0x5c/0x120 [] syscall_handler+0x62/0xe4 [] do_trap_ecall_u+0xc6/0x27c [] ret_from_exception+0x0/0x64 Code: b603 0109 b683 0189 b703 0209 8493 0609 157d 8d65 (a303) ffca ---[ end trace 0000000000000000 ]--- Kernel panic - not syncing: Fatal exception SMP: stopping secondary CPUs This patch improves the BPF JIT for the riscv64 architecture to emit kCFI type id before BPF programs and struct ops trampolines. After applying this patch, the above two selftests pass without any issues. root@rv-selftester:~/bpf# ./test_progs -a "rbtree_success,dummy_st_ops" #70/1 dummy_st_ops/dummy_st_ops_attach:OK #70/2 dummy_st_ops/dummy_init_ret_value:OK #70/3 dummy_st_ops/dummy_init_ptr_arg:OK #70/4 dummy_st_ops/dummy_multiple_args:OK #70/5 dummy_st_ops/dummy_sleepable:OK #70/6 dummy_st_ops/test_unsupported_field_sleepable:OK #70 dummy_st_ops:OK #189/1 rbtree_success/rbtree_add_nodes:OK #189/2 rbtree_success/rbtree_add_and_remove:OK #189/3 rbtree_success/rbtree_first_and_remove:OK #189/4 rbtree_success/rbtree_api_release_aliasing:OK #189 rbtree_success:OK Summary: 2/10 PASSED, 0 SKIPPED, 0 FAILED root@rv-selftester:~/bpf# zcat /proc/config.gz | grep CONFIG_CFI_CLANG CONFIG_CFI_CLANG=y Puranjay Mohan (1): riscv64/cfi,bpf: Support kCFI + BPF on riscv64 arch/riscv/include/asm/cfi.h | 17 +++++++++++ arch/riscv/kernel/cfi.c | 53 +++++++++++++++++++++++++++++++++ arch/riscv/net/bpf_jit.h | 2 +- arch/riscv/net/bpf_jit_comp32.c | 2 +- arch/riscv/net/bpf_jit_comp64.c | 14 ++++++++- arch/riscv/net/bpf_jit_core.c | 9 +++--- 6 files changed, 90 insertions(+), 7 deletions(-) -- 2.40.1