-
Notifications
You must be signed in to change notification settings - Fork 5
bpf, arm64: sign return address for jited code #169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Master branch: 6091197 |
Master branch: 63cc8e2 |
c2f9e8c
to
43eb7dd
Compare
Master branch: 63cc8e2 |
43eb7dd
to
ae1af97
Compare
Master branch: 08063b4 |
ae1af97
to
24c1279
Compare
Master branch: 9492450 |
24c1279
to
1ca550f
Compare
Master branch: a8fee96 |
1ca550f
to
9614f84
Compare
Master branch: 46e9244 |
9614f84
to
d05116b
Compare
Master branch: ef07860 |
d05116b
to
d0654ca
Compare
Master branch: 7ada378 |
d0654ca
to
bce6152
Compare
Master branch: ec80906 |
bce6152
to
a96ed4d
Compare
Master branch: f709869 |
a96ed4d
to
5cfd7b5
Compare
Master branch: d0f325c |
5cfd7b5
to
e27e981
Compare
Master branch: d8dc09a |
e27e981
to
acf479f
Compare
Master branch: d56c9fe |
acf479f
to
5c63188
Compare
5c63188
to
b2ce8d9
Compare
Master branch: f97b8b9 |
b2ce8d9
to
d3c097f
Compare
Master branch: 9695f4e |
d3c097f
to
4fb39e9
Compare
Master branch: e52b8f5 |
4fb39e9
to
b180435
Compare
e52b8f5
to
7f0059b
Compare
Master branch: 7f0059b |
b180435
to
7998f21
Compare
Master branch: 7f0059b |
7998f21
to
49124e9
Compare
Master branch: 2af7e56 |
49124e9
to
b33c525
Compare
Master branch: 169e777 |
b33c525
to
6b363fd
Compare
Master branch: d717e4c |
6b363fd
to
ebc111f
Compare
Master branch: 2975dbd |
Sign return address for jited code when the kernel is built with pointer authentication enabled. 1. Sign lr with paciasp instruction before lr is pushed to stack. Since paciasp acts like landing pads for function entry, no need to insert bti instruction before paciasp. 2. Authenticate lr with autiasp instruction after lr is poped from stack. Signed-off-by: Xu Kuohai <[email protected]>
ebc111f
to
2bb1b6b
Compare
Master branch: 38608ee Pull request is NOT updated. Failed to apply https://patchwork.kernel.org/project/netdevbpf/list/?series=624572
conflict:
|
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=624572 irrelevant now for [{'archived': False, 'project': 399, 'delegate': 121173}] |
Pu Lehui says: ==================== patch 1 fix a minor issue where usdt_cookie is cast to 32 bits. patch 2 add support riscv libbpf USDT argument parsing logic, both RV32 and RV64 tests have been passed as like follow: # ./test_progs -t usdt #169 usdt:OK Summary: 1/4 PASSED, 0 SKIPPED, 0 FAILED ==================== Signed-off-by: Andrii Nakryiko <[email protected]>
Recent additions in BPF like cpu v4 instructions, test_bpf module exhibits the following failures: test_bpf: #82 ALU_MOVSX | BPF_B jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #83 ALU_MOVSX | BPF_H jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #84 ALU64_MOVSX | BPF_B jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #85 ALU64_MOVSX | BPF_H jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #86 ALU64_MOVSX | BPF_W jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #165 ALU_SDIV_X: -6 / 2 = -3 jited:1 ret 2147483645 != -3 (0x7ffffffd != 0xfffffffd)FAIL (1 times) test_bpf: #166 ALU_SDIV_K: -6 / 2 = -3 jited:1 ret 2147483645 != -3 (0x7ffffffd != 0xfffffffd)FAIL (1 times) test_bpf: #169 ALU_SMOD_X: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #170 ALU_SMOD_K: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #172 ALU64_SMOD_K: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #313 BSWAP 16: 0x0123456789abcdef -> 0xefcd eBPF filter opcode 00d7 (@2) unsupported jited:0 301 PASS test_bpf: #314 BSWAP 32: 0x0123456789abcdef -> 0xefcdab89 eBPF filter opcode 00d7 (@2) unsupported jited:0 555 PASS test_bpf: #315 BSWAP 64: 0x0123456789abcdef -> 0x67452301 eBPF filter opcode 00d7 (@2) unsupported jited:0 268 PASS test_bpf: #316 BSWAP 64: 0x0123456789abcdef >> 32 -> 0xefcdab89 eBPF filter opcode 00d7 (@2) unsupported jited:0 269 PASS test_bpf: #317 BSWAP 16: 0xfedcba9876543210 -> 0x1032 eBPF filter opcode 00d7 (@2) unsupported jited:0 460 PASS test_bpf: #318 BSWAP 32: 0xfedcba9876543210 -> 0x10325476 eBPF filter opcode 00d7 (@2) unsupported jited:0 320 PASS test_bpf: #319 BSWAP 64: 0xfedcba9876543210 -> 0x98badcfe eBPF filter opcode 00d7 (@2) unsupported jited:0 222 PASS test_bpf: #320 BSWAP 64: 0xfedcba9876543210 >> 32 -> 0x10325476 eBPF filter opcode 00d7 (@2) unsupported jited:0 273 PASS test_bpf: #344 BPF_LDX_MEMSX | BPF_B eBPF filter opcode 0091 (@5) unsupported jited:0 432 PASS test_bpf: #345 BPF_LDX_MEMSX | BPF_H eBPF filter opcode 0089 (@5) unsupported jited:0 381 PASS test_bpf: #346 BPF_LDX_MEMSX | BPF_W eBPF filter opcode 0081 (@5) unsupported jited:0 505 PASS test_bpf: #490 JMP32_JA: Unconditional jump: if (true) return 1 eBPF filter opcode 0006 (@1) unsupported jited:0 261 PASS test_bpf: Summary: 1040 PASSED, 10 FAILED, [924/1038 JIT'ed] Fix them by adding missing processing. Fixes: daabb2b ("bpf/tests: add tests for cpuv4 instructions") Signed-off-by: Christophe Leroy <[email protected]>
Pull request for series with
subject: bpf, arm64: sign return address for jited code
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=624572