Thread (35 messages) 35 messages, 9 authors, 2024-05-21

Re: [PATCHv5 bpf-next 6/8] x86/shstk: Add return uprobe support

From: Jiri Olsa <hidden>
Date: 2024-05-11 21:09:52
Also in: bpf, linux-api, linux-trace-kernel, lkml

On Thu, May 09, 2024 at 04:24:37PM +0000, Edgecombe, Rick P wrote:
On Thu, 2024-05-09 at 10:30 +0200, Jiri Olsa wrote:
quoted
quoted
Per the earlier discussion, this cannot be reached unless uretprobes are in
use,
which cannot happen without something with privileges taking an action. But
are
uretprobes ever used for monitoring applications where security is
important? Or
is it strictly a debug-time thing?
sorry, I don't have that level of detail, but we do have customers
that use uprobes in general or want to use it and complain about
the speed

there are several tools in bcc [1] that use uretprobes in scripts,
like:
  memleak, sslsniff, trace, bashreadline, gethostlatency, argdist,
  funclatency
Is it possible to have shadow stack only use the non-syscall solution? It seems
it exposes a more limited compatibility in that it only allows writing the
specific trampoline address. (IIRC) Then shadow stack users could still use
uretprobes, but just not the new optimized solution. There are already
operations that are slower with shadow stack, like longjmp(), so this could be
ok maybe.
I guess it's doable, we'd need to keep both trampolines around, because
shadow stack is enabled by app dynamically and use one based on the
state of shadow stack when uretprobe is installed

so you're worried the optimized syscall path could be somehow exploited
to add data on shadow stack?

jirka
Keyboard shortcuts
hback out one level
jnext message in thread
kprevious message in thread
ldrill in
Escclose help / fold thread tree
?toggle this help