* Ideal way to read FUNC_PROTO in raw tp?
@ 2024-06-06 22:03 Yan Zhai
2024-06-15 1:04 ` Alexei Starovoitov
2024-06-21 22:04 ` Andrii Nakryiko
0 siblings, 2 replies; 5+ messages in thread
From: Yan Zhai @ 2024-06-06 22:03 UTC (permalink / raw)
To: bpf; +Cc: kernel-team
Hi,
I am building a tracing program around workqueue. But I encountered
following problem when I try to record a function pointer value from
trace_workqueue_execute_end on net-next kernel:
...
libbpf: prog 'workqueue_end': BPF program load failed: Permission
denied
libbpf: prog 'workqueue_end': -- BEGIN PROG LOAD LOG --
reg type unsupported for arg#0 function workqueue_end#5
0: R1=ctx(off=0,imm=0) R10=fp0
; int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f)
0: (79) r3 = *(u64 *)(r1 +8)
func 'workqueue_execute_end' arg1 type FUNC_PROTO is not a struct
invalid bpf_context access off=8 size=8
processed 1 insns (limit 1000000) max_states_per_insn 0 total_states 0
peak_states 0 mark_read 0
-- END PROG LOAD LOG --
libbpf: prog 'workqueue_end': failed to load: -13
libbpf: failed to load object 'configs/test.bpf.o'
Error: failed to load object file
Warning: bpftool is now running in libbpf strict mode and has more
stringent requirements about BPF programs.
If it used to work for this object file but now doesn't, see --legacy
option for more details.
...
A simple reproducer for me is like:
#include "vmlinux.h"
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
SEC("tp_btf/workqueue_execute_end")
int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f)
{
u64 addr = (u64) f;
bpf_printk("f is %lu\n", addr);
return 0;
}
char LICENSE[] SEC("license") = "GPL";
I would like to use the function address to decode the kernel symbol
and track execution of these functions. Replacing raw tp to regular tp
solves the problem, but I am wondering if there is any go-to approach
to read the pointer value in a raw tp? Doesn't seem to find one in
selftests/samples. If not, does it make sense if we allow it in
the verifier for tracing programs like the attached patch?
Yan
---
diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c
index 821063660d9f..5f000ab4c8d0 100644
--- a/kernel/bpf/btf.c
+++ b/kernel/bpf/btf.c
@@ -6308,6 +6308,11 @@ bool btf_ctx_access(int off, int size, enum bpf_access_type type,
__btf_name_by_offset(btf, t->name_off),
btf_type_str(t));
return false;
+ } else if (prog->type == BPF_PROG_TYPE_TRACING || prog->type == BPF_PROG_TYPE_RAW_TRACEPOINT) {
+ /* allow reading function pointer value from a tracing program */
+ const struct btf_type *pointed = btf_type_by_id(btf, t->type);
+ if (btf_type_is_func_proto(pointed))
+ return true;
}
/* check for PTR_TO_RDONLY_BUF_OR_NULL or PTR_TO_RDWR_BUF_OR_NULL */
^ permalink raw reply related [flat|nested] 5+ messages in thread* Re: Ideal way to read FUNC_PROTO in raw tp? 2024-06-06 22:03 Ideal way to read FUNC_PROTO in raw tp? Yan Zhai @ 2024-06-15 1:04 ` Alexei Starovoitov 2024-06-20 1:57 ` Yan Zhai 2024-06-21 22:04 ` Andrii Nakryiko 1 sibling, 1 reply; 5+ messages in thread From: Alexei Starovoitov @ 2024-06-15 1:04 UTC (permalink / raw) To: Yan Zhai, Andrii Nakryiko, Eddy Z; +Cc: bpf, kernel-team On Thu, Jun 6, 2024 at 3:03 PM Yan Zhai <yan@cloudflare.com> wrote: > > Hi, > > I am building a tracing program around workqueue. But I encountered > following problem when I try to record a function pointer value from > trace_workqueue_execute_end on net-next kernel: > > ... > libbpf: prog 'workqueue_end': BPF program load failed: Permission > denied > libbpf: prog 'workqueue_end': -- BEGIN PROG LOAD LOG -- > reg type unsupported for arg#0 function workqueue_end#5 > 0: R1=ctx(off=0,imm=0) R10=fp0 > ; int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > 0: (79) r3 = *(u64 *)(r1 +8) > func 'workqueue_execute_end' arg1 type FUNC_PROTO is not a struct > invalid bpf_context access off=8 size=8 > processed 1 insns (limit 1000000) max_states_per_insn 0 total_states 0 > peak_states 0 mark_read 0 > -- END PROG LOAD LOG -- > libbpf: prog 'workqueue_end': failed to load: -13 > libbpf: failed to load object 'configs/test.bpf.o' > Error: failed to load object file > Warning: bpftool is now running in libbpf strict mode and has more > stringent requirements about BPF programs. > If it used to work for this object file but now doesn't, see --legacy > option for more details. > ... > > A simple reproducer for me is like: > #include "vmlinux.h" > #include <bpf/bpf_helpers.h> > #include <bpf/bpf_tracing.h> > > SEC("tp_btf/workqueue_execute_end") > int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > { > u64 addr = (u64) f; > bpf_printk("f is %lu\n", addr); > > return 0; > } > > char LICENSE[] SEC("license") = "GPL"; > > I would like to use the function address to decode the kernel symbol > and track execution of these functions. Replacing raw tp to regular tp > solves the problem, but I am wondering if there is any go-to approach > to read the pointer value in a raw tp? Doesn't seem to find one in > selftests/samples. If not, does it make sense if we allow it in > the verifier for tracing programs like the attached patch? > > Yan > > --- > diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c > index 821063660d9f..5f000ab4c8d0 100644 > --- a/kernel/bpf/btf.c > +++ b/kernel/bpf/btf.c > @@ -6308,6 +6308,11 @@ bool btf_ctx_access(int off, int size, enum bpf_access_type type, > __btf_name_by_offset(btf, t->name_off), > btf_type_str(t)); > return false; > + } else if (prog->type == BPF_PROG_TYPE_TRACING || prog->type == BPF_PROG_TYPE_RAW_TRACEPOINT) { > + /* allow reading function pointer value from a tracing program */ > + const struct btf_type *pointed = btf_type_by_id(btf, t->type); > + if (btf_type_is_func_proto(pointed)) > + return true; The reason it wasn't supported in tp_btf is to avoid potential backward compat issues when the verifier will start to recognize it as a proper pointer to a function. Since I didn't know what that support would look like I left it as an error for now. 'return true' (which would mean scalar type to the verifier) is a bit dangerous and I feel it's better to think it through right away. Eventually it probably will be a new reg_type PTR_TO_KERN_FUNC or something. And it won't be modifiable. Like arithmetic won't be allowed. Passing into other helpers (like prinkt in your example) is fine. But if we do 'return true -> scalar' today then bpf prog will be able to do math on it, including conditional jmps, which will be disallowed once it becomes PTR_TO_KERN_FUNC. And that would become a backward compat issue. So pls think it through from that angle. ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Ideal way to read FUNC_PROTO in raw tp? 2024-06-15 1:04 ` Alexei Starovoitov @ 2024-06-20 1:57 ` Yan Zhai 0 siblings, 0 replies; 5+ messages in thread From: Yan Zhai @ 2024-06-20 1:57 UTC (permalink / raw) To: Alexei Starovoitov; +Cc: Andrii Nakryiko, Eddy Z, bpf, kernel-team Hi Alexei, Thanks for getting back. On Fri, Jun 14, 2024 at 8:05 PM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Thu, Jun 6, 2024 at 3:03 PM Yan Zhai <yan@cloudflare.com> wrote: > > > > Hi, > > > > I am building a tracing program around workqueue. But I encountered > > following problem when I try to record a function pointer value from > > trace_workqueue_execute_end on net-next kernel: > > > > ... > > libbpf: prog 'workqueue_end': BPF program load failed: Permission > > denied > > libbpf: prog 'workqueue_end': -- BEGIN PROG LOAD LOG -- > > reg type unsupported for arg#0 function workqueue_end#5 > > 0: R1=ctx(off=0,imm=0) R10=fp0 > > ; int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > > 0: (79) r3 = *(u64 *)(r1 +8) > > func 'workqueue_execute_end' arg1 type FUNC_PROTO is not a struct > > invalid bpf_context access off=8 size=8 > > processed 1 insns (limit 1000000) max_states_per_insn 0 total_states 0 > > peak_states 0 mark_read 0 > > -- END PROG LOAD LOG -- > > libbpf: prog 'workqueue_end': failed to load: -13 > > libbpf: failed to load object 'configs/test.bpf.o' > > Error: failed to load object file > > Warning: bpftool is now running in libbpf strict mode and has more > > stringent requirements about BPF programs. > > If it used to work for this object file but now doesn't, see --legacy > > option for more details. > > ... > > > > A simple reproducer for me is like: > > #include "vmlinux.h" > > #include <bpf/bpf_helpers.h> > > #include <bpf/bpf_tracing.h> > > > > SEC("tp_btf/workqueue_execute_end") > > int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > > { > > u64 addr = (u64) f; > > bpf_printk("f is %lu\n", addr); > > > > return 0; > > } > > > > char LICENSE[] SEC("license") = "GPL"; > > > > I would like to use the function address to decode the kernel symbol > > and track execution of these functions. Replacing raw tp to regular tp > > solves the problem, but I am wondering if there is any go-to approach > > to read the pointer value in a raw tp? Doesn't seem to find one in > > selftests/samples. If not, does it make sense if we allow it in > > the verifier for tracing programs like the attached patch? > > > > Yan > > > > --- > > diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c > > index 821063660d9f..5f000ab4c8d0 100644 > > --- a/kernel/bpf/btf.c > > +++ b/kernel/bpf/btf.c > > @@ -6308,6 +6308,11 @@ bool btf_ctx_access(int off, int size, enum bpf_access_type type, > > __btf_name_by_offset(btf, t->name_off), > > btf_type_str(t)); > > return false; > > + } else if (prog->type == BPF_PROG_TYPE_TRACING || prog->type == BPF_PROG_TYPE_RAW_TRACEPOINT) { > > + /* allow reading function pointer value from a tracing program */ > > + const struct btf_type *pointed = btf_type_by_id(btf, t->type); > > + if (btf_type_is_func_proto(pointed)) > > + return true; > > The reason it wasn't supported in tp_btf is to avoid potential > backward compat issues when the verifier will start to recognize it > as a proper pointer to a function. > Since I didn't know what that support would look like I left it > as an error for now. > > 'return true' (which would mean scalar type to the verifier) > is a bit dangerous and I feel it's better to think it through right away. > > Eventually it probably will be a new reg_type PTR_TO_KERN_FUNC or something. > And it won't be modifiable. > Like arithmetic won't be allowed. > Passing into other helpers (like prinkt in your example) is fine. > But if we do 'return true -> scalar' today then bpf prog > will be able to do math on it, including conditional jmps, > which will be disallowed once it becomes PTR_TO_KERN_FUNC. > And that would become a backward compat issue. > So pls think it through from that angle. Having a new reg_type makes sense to me, but IMHO it could still cause a backward compatibility issue. In my example, the regular version TP has the func pointer assigned as a void * arg, which I can do arithmetics already with. So if anyone relies on this fact, then it may break if we introduce the PTR_TO_KERN_FUNC and replace void * with a proper kernel function pointer. But if we leave the void * in place, then TP/Raw-TP have different capabilities on the same argument just like today. WDYT? Yan ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Ideal way to read FUNC_PROTO in raw tp? 2024-06-06 22:03 Ideal way to read FUNC_PROTO in raw tp? Yan Zhai 2024-06-15 1:04 ` Alexei Starovoitov @ 2024-06-21 22:04 ` Andrii Nakryiko 2024-06-25 3:00 ` Yan Zhai 1 sibling, 1 reply; 5+ messages in thread From: Andrii Nakryiko @ 2024-06-21 22:04 UTC (permalink / raw) To: Yan Zhai; +Cc: bpf, kernel-team On Thu, Jun 6, 2024 at 3:03 PM Yan Zhai <yan@cloudflare.com> wrote: > > Hi, > > I am building a tracing program around workqueue. But I encountered > following problem when I try to record a function pointer value from > trace_workqueue_execute_end on net-next kernel: > > ... > libbpf: prog 'workqueue_end': BPF program load failed: Permission > denied > libbpf: prog 'workqueue_end': -- BEGIN PROG LOAD LOG -- > reg type unsupported for arg#0 function workqueue_end#5 > 0: R1=ctx(off=0,imm=0) R10=fp0 > ; int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > 0: (79) r3 = *(u64 *)(r1 +8) > func 'workqueue_execute_end' arg1 type FUNC_PROTO is not a struct > invalid bpf_context access off=8 size=8 > processed 1 insns (limit 1000000) max_states_per_insn 0 total_states 0 > peak_states 0 mark_read 0 > -- END PROG LOAD LOG -- > libbpf: prog 'workqueue_end': failed to load: -13 > libbpf: failed to load object 'configs/test.bpf.o' > Error: failed to load object file > Warning: bpftool is now running in libbpf strict mode and has more > stringent requirements about BPF programs. > If it used to work for this object file but now doesn't, see --legacy > option for more details. > ... > > A simple reproducer for me is like: > #include "vmlinux.h" > #include <bpf/bpf_helpers.h> > #include <bpf/bpf_tracing.h> > > SEC("tp_btf/workqueue_execute_end") > int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > { > u64 addr = (u64) f; you can work around with: bpf_probe_read_kernel(&addr, sizeof(addr), &ctx[1]); /* ctx[1] is the second argument */ Not great, but will get you past this easily. > bpf_printk("f is %lu\n", addr); > > return 0; > } > > char LICENSE[] SEC("license") = "GPL"; > > I would like to use the function address to decode the kernel symbol > and track execution of these functions. Replacing raw tp to regular tp > solves the problem, but I am wondering if there is any go-to approach > to read the pointer value in a raw tp? Doesn't seem to find one in > selftests/samples. If not, does it make sense if we allow it in > the verifier for tracing programs like the attached patch? > > Yan > > --- > diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c > index 821063660d9f..5f000ab4c8d0 100644 > --- a/kernel/bpf/btf.c > +++ b/kernel/bpf/btf.c > @@ -6308,6 +6308,11 @@ bool btf_ctx_access(int off, int size, enum bpf_access_type type, > __btf_name_by_offset(btf, t->name_off), > btf_type_str(t)); > return false; > + } else if (prog->type == BPF_PROG_TYPE_TRACING || prog->type == BPF_PROG_TYPE_RAW_TRACEPOINT) { > + /* allow reading function pointer value from a tracing program */ > + const struct btf_type *pointed = btf_type_by_id(btf, t->type); > + if (btf_type_is_func_proto(pointed)) > + return true; > } > > /* check for PTR_TO_RDONLY_BUF_OR_NULL or PTR_TO_RDWR_BUF_OR_NULL */ > ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Ideal way to read FUNC_PROTO in raw tp? 2024-06-21 22:04 ` Andrii Nakryiko @ 2024-06-25 3:00 ` Yan Zhai 0 siblings, 0 replies; 5+ messages in thread From: Yan Zhai @ 2024-06-25 3:00 UTC (permalink / raw) To: Andrii Nakryiko; +Cc: bpf, kernel-team, Alexei Starovoitov On Fri, Jun 21, 2024 at 5:04 PM Andrii Nakryiko <andrii.nakryiko@gmail.com> wrote: > > On Thu, Jun 6, 2024 at 3:03 PM Yan Zhai <yan@cloudflare.com> wrote: > > > > Hi, > > > > I am building a tracing program around workqueue. But I encountered > > following problem when I try to record a function pointer value from > > trace_workqueue_execute_end on net-next kernel: > > > > ... > > libbpf: prog 'workqueue_end': BPF program load failed: Permission > > denied > > libbpf: prog 'workqueue_end': -- BEGIN PROG LOAD LOG -- > > reg type unsupported for arg#0 function workqueue_end#5 > > 0: R1=ctx(off=0,imm=0) R10=fp0 > > ; int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > > 0: (79) r3 = *(u64 *)(r1 +8) > > func 'workqueue_execute_end' arg1 type FUNC_PROTO is not a struct > > invalid bpf_context access off=8 size=8 > > processed 1 insns (limit 1000000) max_states_per_insn 0 total_states 0 > > peak_states 0 mark_read 0 > > -- END PROG LOAD LOG -- > > libbpf: prog 'workqueue_end': failed to load: -13 > > libbpf: failed to load object 'configs/test.bpf.o' > > Error: failed to load object file > > Warning: bpftool is now running in libbpf strict mode and has more > > stringent requirements about BPF programs. > > If it used to work for this object file but now doesn't, see --legacy > > option for more details. > > ... > > > > A simple reproducer for me is like: > > #include "vmlinux.h" > > #include <bpf/bpf_helpers.h> > > #include <bpf/bpf_tracing.h> > > > > SEC("tp_btf/workqueue_execute_end") > > int BPF_PROG(workqueue_end, struct work_struct *w, work_func_t f) > > { > > u64 addr = (u64) f; > > you can work around with: > > bpf_probe_read_kernel(&addr, sizeof(addr), &ctx[1]); /* ctx[1] is the > second argument */ > > Not great, but will get you past this easily. > Yes that works, too. Currently I am using the regular tp to workaround. That said, I am more interested in the verifier side of this. I am happy to add it to my queue if no one has signed up to support func_proto type in ctx. Would maintainers welcome RFC patches for this or is it something that you prefer to leave for now? best Yan ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2024-06-25 3:00 UTC | newest] Thread overview: 5+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2024-06-06 22:03 Ideal way to read FUNC_PROTO in raw tp? Yan Zhai 2024-06-15 1:04 ` Alexei Starovoitov 2024-06-20 1:57 ` Yan Zhai 2024-06-21 22:04 ` Andrii Nakryiko 2024-06-25 3:00 ` Yan Zhai
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox