-
Notifications
You must be signed in to change notification settings - Fork 5
bpf, arm64: sign return address for jited code #169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Master branch: 6091197 |
|
Master branch: 63cc8e2 |
c2f9e8c to
43eb7dd
Compare
|
Master branch: 63cc8e2 |
43eb7dd to
ae1af97
Compare
|
Master branch: 08063b4 |
ae1af97 to
24c1279
Compare
|
Master branch: 9492450 |
24c1279 to
1ca550f
Compare
|
Master branch: a8fee96 |
1ca550f to
9614f84
Compare
|
Master branch: 46e9244 |
9614f84 to
d05116b
Compare
|
Master branch: ef07860 |
d05116b to
d0654ca
Compare
|
Master branch: 7ada378 |
d0654ca to
bce6152
Compare
|
Master branch: ec80906 |
bce6152 to
a96ed4d
Compare
|
Master branch: f709869 |
a96ed4d to
5cfd7b5
Compare
|
Master branch: d0f325c |
5cfd7b5 to
e27e981
Compare
|
Master branch: d8dc09a |
e27e981 to
acf479f
Compare
|
Master branch: d56c9fe |
acf479f to
5c63188
Compare
5c63188 to
b2ce8d9
Compare
|
Master branch: f97b8b9 |
b2ce8d9 to
d3c097f
Compare
|
Master branch: 9695f4e |
d3c097f to
4fb39e9
Compare
|
Master branch: e52b8f5 |
4fb39e9 to
b180435
Compare
e52b8f5 to
7f0059b
Compare
|
Master branch: 7f0059b |
b180435 to
7998f21
Compare
|
Master branch: 7f0059b |
7998f21 to
49124e9
Compare
|
Master branch: 2af7e56 |
49124e9 to
b33c525
Compare
|
Master branch: 169e777 |
b33c525 to
6b363fd
Compare
|
Master branch: d717e4c |
6b363fd to
ebc111f
Compare
|
Master branch: 2975dbd |
Sign return address for jited code when the kernel is built with pointer authentication enabled. 1. Sign lr with paciasp instruction before lr is pushed to stack. Since paciasp acts like landing pads for function entry, no need to insert bti instruction before paciasp. 2. Authenticate lr with autiasp instruction after lr is poped from stack. Signed-off-by: Xu Kuohai <[email protected]>
ebc111f to
2bb1b6b
Compare
|
Master branch: 38608ee Pull request is NOT updated. Failed to apply https://patchwork.kernel.org/project/netdevbpf/list/?series=624572 conflict: |
|
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=624572 irrelevant now for [{'archived': False, 'project': 399, 'delegate': 121173}] |
Pu Lehui says: ==================== patch 1 fix a minor issue where usdt_cookie is cast to 32 bits. patch 2 add support riscv libbpf USDT argument parsing logic, both RV32 and RV64 tests have been passed as like follow: # ./test_progs -t usdt #169 usdt:OK Summary: 1/4 PASSED, 0 SKIPPED, 0 FAILED ==================== Signed-off-by: Andrii Nakryiko <[email protected]>
Recent additions in BPF like cpu v4 instructions, test_bpf module exhibits the following failures: test_bpf: #82 ALU_MOVSX | BPF_B jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #83 ALU_MOVSX | BPF_H jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #84 ALU64_MOVSX | BPF_B jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #85 ALU64_MOVSX | BPF_H jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #86 ALU64_MOVSX | BPF_W jited:1 ret 2 != 1 (0x2 != 0x1)FAIL (1 times) test_bpf: #165 ALU_SDIV_X: -6 / 2 = -3 jited:1 ret 2147483645 != -3 (0x7ffffffd != 0xfffffffd)FAIL (1 times) test_bpf: #166 ALU_SDIV_K: -6 / 2 = -3 jited:1 ret 2147483645 != -3 (0x7ffffffd != 0xfffffffd)FAIL (1 times) test_bpf: #169 ALU_SMOD_X: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #170 ALU_SMOD_K: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #172 ALU64_SMOD_K: -7 % 2 = -1 jited:1 ret 1 != -1 (0x1 != 0xffffffff)FAIL (1 times) test_bpf: #313 BSWAP 16: 0x0123456789abcdef -> 0xefcd eBPF filter opcode 00d7 (@2) unsupported jited:0 301 PASS test_bpf: #314 BSWAP 32: 0x0123456789abcdef -> 0xefcdab89 eBPF filter opcode 00d7 (@2) unsupported jited:0 555 PASS test_bpf: #315 BSWAP 64: 0x0123456789abcdef -> 0x67452301 eBPF filter opcode 00d7 (@2) unsupported jited:0 268 PASS test_bpf: #316 BSWAP 64: 0x0123456789abcdef >> 32 -> 0xefcdab89 eBPF filter opcode 00d7 (@2) unsupported jited:0 269 PASS test_bpf: #317 BSWAP 16: 0xfedcba9876543210 -> 0x1032 eBPF filter opcode 00d7 (@2) unsupported jited:0 460 PASS test_bpf: #318 BSWAP 32: 0xfedcba9876543210 -> 0x10325476 eBPF filter opcode 00d7 (@2) unsupported jited:0 320 PASS test_bpf: #319 BSWAP 64: 0xfedcba9876543210 -> 0x98badcfe eBPF filter opcode 00d7 (@2) unsupported jited:0 222 PASS test_bpf: #320 BSWAP 64: 0xfedcba9876543210 >> 32 -> 0x10325476 eBPF filter opcode 00d7 (@2) unsupported jited:0 273 PASS test_bpf: #344 BPF_LDX_MEMSX | BPF_B eBPF filter opcode 0091 (@5) unsupported jited:0 432 PASS test_bpf: #345 BPF_LDX_MEMSX | BPF_H eBPF filter opcode 0089 (@5) unsupported jited:0 381 PASS test_bpf: #346 BPF_LDX_MEMSX | BPF_W eBPF filter opcode 0081 (@5) unsupported jited:0 505 PASS test_bpf: #490 JMP32_JA: Unconditional jump: if (true) return 1 eBPF filter opcode 0006 (@1) unsupported jited:0 261 PASS test_bpf: Summary: 1040 PASSED, 10 FAILED, [924/1038 JIT'ed] Fix them by adding missing processing. Fixes: daabb2b ("bpf/tests: add tests for cpuv4 instructions") Signed-off-by: Christophe Leroy <[email protected]>
Pull request for series with
subject: bpf, arm64: sign return address for jited code
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=624572