Commit 72fe61d7 authored by Alexei Starovoitov's avatar Alexei Starovoitov

Merge branch 'Fix attaching fentry/fexit/fmod_ret/lsm to modules'

Viktor Malik says:

====================

I noticed that the verifier behaves incorrectly when attaching to fentry
of multiple functions of the same name located in different modules (or
in vmlinux). The reason for this is that if the target program is not
specified, the verifier will search kallsyms for the trampoline address
to attach to. The entire kallsyms is always searched, not respecting the
module in which the function to attach to is located.

As Yonghong correctly pointed out, there is yet another issue - the
trampoline acquires the module reference in register_fentry which means
that if the module is unloaded between the place where the address is
found in the verifier and register_fentry, it is possible that another
module is loaded to the same address in the meantime, which may lead to
errors.

This patch fixes the above issues by extracting the module name from the
BTF of the attachment target (which must be specified) and by doing the
search in kallsyms of the correct module. At the same time, the module
reference is acquired right after the address is found and only released
right before the program itself is unloaded.
---
Changes in v10:
- added the new test to DENYLIST.aarch64 (suggested by Andrii)
- renamed the test source file to match the test name

Changes in v9:
- two small changes suggested by Jiri Olsa and Jiri's ack

Changes in v8:
- added module_put to error paths in bpf_check_attach_target after the
  module reference is acquired

Changes in v7:
- refactored the module reference manipulation (comments by Jiri Olsa)
- cleaned up the test (comments by Andrii Nakryiko)

Changes in v6:
- storing the module reference inside bpf_prog_aux instead of
  bpf_trampoline and releasing it when the program is unloaded
  (suggested by Jiri Olsa)

Changes in v5:
- fixed acquiring and releasing of module references by trampolines to
  prevent modules being unloaded between address lookup and trampoline
  allocation

Changes in v4:
- reworked module kallsyms lookup approach using existing functions,
  verifier now calls btf_try_get_module to retrieve the module and
  find_kallsyms_symbol_value to get the symbol address (suggested by
  Alexei)
- included Jiri Olsa's comments
- improved description of the new test and added it as a comment into
  the test source

Changes in v3:
- added trivial implementation for kallsyms_lookup_name_in_module() for
  !CONFIG_MODULES (noticed by test robot, fix suggested by Hao Luo)

Changes in v2:
- introduced and used more space-efficient kallsyms lookup function,
  suggested by Jiri Olsa
- included Hao Luo's comments
====================
Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
parents b8a2e3f9 aa3d65de
...@@ -1103,6 +1103,7 @@ struct bpf_trampoline { ...@@ -1103,6 +1103,7 @@ struct bpf_trampoline {
struct bpf_attach_target_info { struct bpf_attach_target_info {
struct btf_func_model fmodel; struct btf_func_model fmodel;
long tgt_addr; long tgt_addr;
struct module *tgt_mod;
const char *tgt_name; const char *tgt_name;
const struct btf_type *tgt_type; const struct btf_type *tgt_type;
}; };
...@@ -1406,6 +1407,7 @@ struct bpf_prog_aux { ...@@ -1406,6 +1407,7 @@ struct bpf_prog_aux {
* main prog always has linfo_idx == 0 * main prog always has linfo_idx == 0
*/ */
u32 linfo_idx; u32 linfo_idx;
struct module *mod;
u32 num_exentries; u32 num_exentries;
struct exception_table_entry *extable; struct exception_table_entry *extable;
union { union {
......
...@@ -2067,6 +2067,7 @@ static void __bpf_prog_put_noref(struct bpf_prog *prog, bool deferred) ...@@ -2067,6 +2067,7 @@ static void __bpf_prog_put_noref(struct bpf_prog *prog, bool deferred)
{ {
bpf_prog_kallsyms_del_all(prog); bpf_prog_kallsyms_del_all(prog);
btf_put(prog->aux->btf); btf_put(prog->aux->btf);
module_put(prog->aux->mod);
kvfree(prog->aux->jited_linfo); kvfree(prog->aux->jited_linfo);
kvfree(prog->aux->linfo); kvfree(prog->aux->linfo);
kfree(prog->aux->kfunc_tab); kfree(prog->aux->kfunc_tab);
...@@ -3113,6 +3114,11 @@ static int bpf_tracing_prog_attach(struct bpf_prog *prog, ...@@ -3113,6 +3114,11 @@ static int bpf_tracing_prog_attach(struct bpf_prog *prog,
if (err) if (err)
goto out_unlock; goto out_unlock;
if (tgt_info.tgt_mod) {
module_put(prog->aux->mod);
prog->aux->mod = tgt_info.tgt_mod;
}
tr = bpf_trampoline_get(key, &tgt_info); tr = bpf_trampoline_get(key, &tgt_info);
if (!tr) { if (!tr) {
err = -ENOMEM; err = -ENOMEM;
......
...@@ -9,7 +9,6 @@ ...@@ -9,7 +9,6 @@
#include <linux/btf.h> #include <linux/btf.h>
#include <linux/rcupdate_trace.h> #include <linux/rcupdate_trace.h>
#include <linux/rcupdate_wait.h> #include <linux/rcupdate_wait.h>
#include <linux/module.h>
#include <linux/static_call.h> #include <linux/static_call.h>
#include <linux/bpf_verifier.h> #include <linux/bpf_verifier.h>
#include <linux/bpf_lsm.h> #include <linux/bpf_lsm.h>
...@@ -172,26 +171,6 @@ static struct bpf_trampoline *bpf_trampoline_lookup(u64 key) ...@@ -172,26 +171,6 @@ static struct bpf_trampoline *bpf_trampoline_lookup(u64 key)
return tr; return tr;
} }
static int bpf_trampoline_module_get(struct bpf_trampoline *tr)
{
struct module *mod;
int err = 0;
preempt_disable();
mod = __module_text_address((unsigned long) tr->func.addr);
if (mod && !try_module_get(mod))
err = -ENOENT;
preempt_enable();
tr->mod = mod;
return err;
}
static void bpf_trampoline_module_put(struct bpf_trampoline *tr)
{
module_put(tr->mod);
tr->mod = NULL;
}
static int unregister_fentry(struct bpf_trampoline *tr, void *old_addr) static int unregister_fentry(struct bpf_trampoline *tr, void *old_addr)
{ {
void *ip = tr->func.addr; void *ip = tr->func.addr;
...@@ -202,8 +181,6 @@ static int unregister_fentry(struct bpf_trampoline *tr, void *old_addr) ...@@ -202,8 +181,6 @@ static int unregister_fentry(struct bpf_trampoline *tr, void *old_addr)
else else
ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL); ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL);
if (!ret)
bpf_trampoline_module_put(tr);
return ret; return ret;
} }
...@@ -238,9 +215,6 @@ static int register_fentry(struct bpf_trampoline *tr, void *new_addr) ...@@ -238,9 +215,6 @@ static int register_fentry(struct bpf_trampoline *tr, void *new_addr)
tr->func.ftrace_managed = true; tr->func.ftrace_managed = true;
} }
if (bpf_trampoline_module_get(tr))
return -ENOENT;
if (tr->func.ftrace_managed) { if (tr->func.ftrace_managed) {
ftrace_set_filter_ip(tr->fops, (unsigned long)ip, 0, 1); ftrace_set_filter_ip(tr->fops, (unsigned long)ip, 0, 1);
ret = register_ftrace_direct_multi(tr->fops, (long)new_addr); ret = register_ftrace_direct_multi(tr->fops, (long)new_addr);
...@@ -248,8 +222,6 @@ static int register_fentry(struct bpf_trampoline *tr, void *new_addr) ...@@ -248,8 +222,6 @@ static int register_fentry(struct bpf_trampoline *tr, void *new_addr)
ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr); ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr);
} }
if (ret)
bpf_trampoline_module_put(tr);
return ret; return ret;
} }
......
...@@ -24,6 +24,7 @@ ...@@ -24,6 +24,7 @@
#include <linux/bpf_lsm.h> #include <linux/bpf_lsm.h>
#include <linux/btf_ids.h> #include <linux/btf_ids.h>
#include <linux/poison.h> #include <linux/poison.h>
#include "../module/internal.h"
#include "disasm.h" #include "disasm.h"
...@@ -18307,6 +18308,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log, ...@@ -18307,6 +18308,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log,
const char *tname; const char *tname;
struct btf *btf; struct btf *btf;
long addr = 0; long addr = 0;
struct module *mod = NULL;
if (!btf_id) { if (!btf_id) {
bpf_log(log, "Tracing programs must provide btf_id\n"); bpf_log(log, "Tracing programs must provide btf_id\n");
...@@ -18479,9 +18481,18 @@ int bpf_check_attach_target(struct bpf_verifier_log *log, ...@@ -18479,9 +18481,18 @@ int bpf_check_attach_target(struct bpf_verifier_log *log,
addr = (long) tgt_prog->bpf_func; addr = (long) tgt_prog->bpf_func;
else else
addr = (long) tgt_prog->aux->func[subprog]->bpf_func; addr = (long) tgt_prog->aux->func[subprog]->bpf_func;
} else {
if (btf_is_module(btf)) {
mod = btf_try_get_module(btf);
if (mod)
addr = find_kallsyms_symbol_value(mod, tname);
else
addr = 0;
} else { } else {
addr = kallsyms_lookup_name(tname); addr = kallsyms_lookup_name(tname);
}
if (!addr) { if (!addr) {
module_put(mod);
bpf_log(log, bpf_log(log,
"The address of function %s cannot be found\n", "The address of function %s cannot be found\n",
tname); tname);
...@@ -18521,11 +18532,13 @@ int bpf_check_attach_target(struct bpf_verifier_log *log, ...@@ -18521,11 +18532,13 @@ int bpf_check_attach_target(struct bpf_verifier_log *log,
break; break;
} }
if (ret) { if (ret) {
module_put(mod);
bpf_log(log, "%s is not sleepable\n", tname); bpf_log(log, "%s is not sleepable\n", tname);
return ret; return ret;
} }
} else if (prog->expected_attach_type == BPF_MODIFY_RETURN) { } else if (prog->expected_attach_type == BPF_MODIFY_RETURN) {
if (tgt_prog) { if (tgt_prog) {
module_put(mod);
bpf_log(log, "can't modify return codes of BPF programs\n"); bpf_log(log, "can't modify return codes of BPF programs\n");
return -EINVAL; return -EINVAL;
} }
...@@ -18534,6 +18547,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log, ...@@ -18534,6 +18547,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log,
!check_attach_modify_return(addr, tname)) !check_attach_modify_return(addr, tname))
ret = 0; ret = 0;
if (ret) { if (ret) {
module_put(mod);
bpf_log(log, "%s() is not modifiable\n", tname); bpf_log(log, "%s() is not modifiable\n", tname);
return ret; return ret;
} }
...@@ -18544,6 +18558,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log, ...@@ -18544,6 +18558,7 @@ int bpf_check_attach_target(struct bpf_verifier_log *log,
tgt_info->tgt_addr = addr; tgt_info->tgt_addr = addr;
tgt_info->tgt_name = tname; tgt_info->tgt_name = tname;
tgt_info->tgt_type = t; tgt_info->tgt_type = t;
tgt_info->tgt_mod = mod;
return 0; return 0;
} }
...@@ -18623,6 +18638,7 @@ static int check_attach_btf_id(struct bpf_verifier_env *env) ...@@ -18623,6 +18638,7 @@ static int check_attach_btf_id(struct bpf_verifier_env *env)
/* store info about the attachment target that will be used later */ /* store info about the attachment target that will be used later */
prog->aux->attach_func_proto = tgt_info.tgt_type; prog->aux->attach_func_proto = tgt_info.tgt_type;
prog->aux->attach_func_name = tgt_info.tgt_name; prog->aux->attach_func_name = tgt_info.tgt_name;
prog->aux->mod = tgt_info.tgt_mod;
if (tgt_prog) { if (tgt_prog) {
prog->aux->saved_dst_prog_type = tgt_prog->type; prog->aux->saved_dst_prog_type = tgt_prog->type;
......
...@@ -256,6 +256,11 @@ static inline bool sect_empty(const Elf_Shdr *sect) ...@@ -256,6 +256,11 @@ static inline bool sect_empty(const Elf_Shdr *sect)
static inline void init_build_id(struct module *mod, const struct load_info *info) { } static inline void init_build_id(struct module *mod, const struct load_info *info) { }
static inline void layout_symtab(struct module *mod, struct load_info *info) { } static inline void layout_symtab(struct module *mod, struct load_info *info) { }
static inline void add_kallsyms(struct module *mod, const struct load_info *info) { } static inline void add_kallsyms(struct module *mod, const struct load_info *info) { }
static inline unsigned long find_kallsyms_symbol_value(struct module *mod,
const char *name)
{
return 0;
}
#endif /* CONFIG_KALLSYMS */ #endif /* CONFIG_KALLSYMS */
#ifdef CONFIG_SYSFS #ifdef CONFIG_SYSFS
......
...@@ -560,6 +560,11 @@ long noinline bpf_kfunc_call_test4(signed char a, short b, int c, long d) ...@@ -560,6 +560,11 @@ long noinline bpf_kfunc_call_test4(signed char a, short b, int c, long d)
return (long)a + (long)b + (long)c + d; return (long)a + (long)b + (long)c + d;
} }
int noinline bpf_fentry_shadow_test(int a)
{
return a + 1;
}
struct prog_test_member1 { struct prog_test_member1 {
int a; int a;
}; };
......
...@@ -44,6 +44,7 @@ lookup_key # test_lookup_key__attach unexp ...@@ -44,6 +44,7 @@ lookup_key # test_lookup_key__attach unexp
lru_bug # lru_bug__attach unexpected error: -524 (errno 524) lru_bug # lru_bug__attach unexpected error: -524 (errno 524)
modify_return # modify_return__attach failed unexpected error: -524 (errno 524) modify_return # modify_return__attach failed unexpected error: -524 (errno 524)
module_attach # skel_attach skeleton attach failed: -524 module_attach # skel_attach skeleton attach failed: -524
module_fentry_shadow # bpf_link_create unexpected bpf_link_create: actual -524 < expected 0
mptcp/base # run_test mptcp unexpected error: -524 (errno 524) mptcp/base # run_test mptcp unexpected error: -524 (errno 524)
netcnt # packets unexpected packets: actual 10001 != expected 10000 netcnt # packets unexpected packets: actual 10001 != expected 10000
rcu_read_lock # failed to attach: ERROR: strerror_r(-524)=22 rcu_read_lock # failed to attach: ERROR: strerror_r(-524)=22
......
...@@ -268,6 +268,12 @@ static const struct btf_kfunc_id_set bpf_testmod_kfunc_set = { ...@@ -268,6 +268,12 @@ static const struct btf_kfunc_id_set bpf_testmod_kfunc_set = {
.set = &bpf_testmod_check_kfunc_ids, .set = &bpf_testmod_check_kfunc_ids,
}; };
noinline int bpf_fentry_shadow_test(int a)
{
return a + 2;
}
EXPORT_SYMBOL_GPL(bpf_fentry_shadow_test);
extern int bpf_fentry_test1(int a); extern int bpf_fentry_test1(int a);
static int bpf_testmod_init(void) static int bpf_testmod_init(void)
......
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2022 Red Hat */
#include <test_progs.h>
#include <bpf/btf.h>
#include "bpf/libbpf_internal.h"
#include "cgroup_helpers.h"
static const char *module_name = "bpf_testmod";
static const char *symbol_name = "bpf_fentry_shadow_test";
static int get_bpf_testmod_btf_fd(void)
{
struct bpf_btf_info info;
char name[64];
__u32 id = 0, len;
int err, fd;
while (true) {
err = bpf_btf_get_next_id(id, &id);
if (err) {
log_err("failed to iterate BTF objects");
return err;
}
fd = bpf_btf_get_fd_by_id(id);
if (fd < 0) {
if (errno == ENOENT)
continue; /* expected race: BTF was unloaded */
err = -errno;
log_err("failed to get FD for BTF object #%d", id);
return err;
}
len = sizeof(info);
memset(&info, 0, sizeof(info));
info.name = ptr_to_u64(name);
info.name_len = sizeof(name);
err = bpf_obj_get_info_by_fd(fd, &info, &len);
if (err) {
err = -errno;
log_err("failed to get info for BTF object #%d", id);
close(fd);
return err;
}
if (strcmp(name, module_name) == 0)
return fd;
close(fd);
}
return -ENOENT;
}
void test_module_fentry_shadow(void)
{
struct btf *vmlinux_btf = NULL, *mod_btf = NULL;
int err, i;
int btf_fd[2] = {};
int prog_fd[2] = {};
int link_fd[2] = {};
__s32 btf_id[2] = {};
LIBBPF_OPTS(bpf_prog_load_opts, load_opts,
.expected_attach_type = BPF_TRACE_FENTRY,
);
const struct bpf_insn trace_program[] = {
BPF_MOV64_IMM(BPF_REG_0, 0),
BPF_EXIT_INSN(),
};
vmlinux_btf = btf__load_vmlinux_btf();
if (!ASSERT_OK_PTR(vmlinux_btf, "load_vmlinux_btf"))
return;
btf_fd[1] = get_bpf_testmod_btf_fd();
if (!ASSERT_GE(btf_fd[1], 0, "get_bpf_testmod_btf_fd"))
goto out;
mod_btf = btf_get_from_fd(btf_fd[1], vmlinux_btf);
if (!ASSERT_OK_PTR(mod_btf, "btf_get_from_fd"))
goto out;
btf_id[0] = btf__find_by_name_kind(vmlinux_btf, symbol_name, BTF_KIND_FUNC);
if (!ASSERT_GT(btf_id[0], 0, "btf_find_by_name"))
goto out;
btf_id[1] = btf__find_by_name_kind(mod_btf, symbol_name, BTF_KIND_FUNC);
if (!ASSERT_GT(btf_id[1], 0, "btf_find_by_name"))
goto out;
for (i = 0; i < 2; i++) {
load_opts.attach_btf_id = btf_id[i];
load_opts.attach_btf_obj_fd = btf_fd[i];
prog_fd[i] = bpf_prog_load(BPF_PROG_TYPE_TRACING, NULL, "GPL",
trace_program,
sizeof(trace_program) / sizeof(struct bpf_insn),
&load_opts);
if (!ASSERT_GE(prog_fd[i], 0, "bpf_prog_load"))
goto out;
/* If the verifier incorrectly resolves addresses of the
* shadowed functions and uses the same address for both the
* vmlinux and the bpf_testmod functions, this will fail on
* attempting to create two trampolines for the same address,
* which is forbidden.
*/
link_fd[i] = bpf_link_create(prog_fd[i], 0, BPF_TRACE_FENTRY, NULL);
if (!ASSERT_GE(link_fd[i], 0, "bpf_link_create"))
goto out;
}
err = bpf_prog_test_run_opts(prog_fd[0], NULL);
ASSERT_OK(err, "running test");
out:
btf__free(vmlinux_btf);
btf__free(mod_btf);
for (i = 0; i < 2; i++) {
if (btf_fd[i])
close(btf_fd[i]);
if (prog_fd[i] > 0)
close(prog_fd[i]);
if (link_fd[i] > 0)
close(link_fd[i]);
}
}
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment