Hi Pingfan,

On Tue, 16 Sep 2025 10:00:41 +0800
Pingfan Liu <pi...@redhat.com> wrote:

> On Mon, Sep 01, 2025 at 04:29:29PM +0200, Philipp Rudo wrote:
> Hi Philipp,
> 
> Thank you for deep insight, please see the comments
> 
> > Hi Pingfan,
> > 
> > thanks for sharing the updated version of the series. There are a few
> > small nits you can find in my comments to the individual patches.
> > 
> > I also took an other look at the bigger picture. The way I see it the
> > series contains two major changes.
> > 
> > 1. A generic mechanism to parse and run bpf programs during kexec.  
> 
> Thanks for your suggestion. This makes the whole design look more
> natural. Without it, using the PE format parser as a frontend to the
> image parser looks a bit awkward.
> 
> > 2. A new loader for UEFI Applications building up on 1.
> > 
> > Both those changes are currently smashed together as "PE image loader",
> > which IMHO is quite confusing. It's correct that UEFI Apps are PE
> > files. But the PE format is also used in many other ways and in the end
> > we are only interested in this specific use case. Plus the generic
> > mechanism to parse and run bpf programs during kexec can also be used
> > with any other file format, not just PE.
> > 
> > In addition I noticed that hooking into kexec_file while loading the
> > image is too late. The problem is that in
> > kernel/kexec_file.c:kimage_file_prepare_segments the cmdline is
> > measured for IMA before the image is loaded. But we allow the
> > bpf_prog to change the cmdline. When that is done the IMA measurement
> > no longer is correct. So we need a new hook to run the bpf programs
> > after the initrd and cmdline were read but before the IMA measurement is
> > done.
> >   
> 
> This should be a issue when turning on IMA measurement on cmdline. And it
> can be perfectly addressed with your suggestion.
> 
> > So my suggestions are:
> > 
> > 1. Extend the kexec_file_ops by a new 'get_bpf_prog' hook.  
> 
> I'm not sure I agree with you on this.  We both agree that the generic
> mechanism to parse and run BPF programs should be independent of the
> image parser and belong in kexec_file.c. However, kexec_file_ops is
> still a concept that belongs to the image parser layer. So I think that
> moving the logic to kexec_file.c is good enough.

I'm not sure I get your point here. My rational is, that the bpf_prog
can be included in different file formats. So we still need a mechanism
to parse it from the different formats. Plus we need a file_ops that is
"responsible" for a file type. All in all it makes most sense to me to
have a file_ops that only has a .probe and .get_bpf_prog.

But yes, maybe I'm missing something. I'm curious on seeing your v6.

Thanks
Philipp

> 
> > 2. Move the mechanism to run bpf progs from kexec_pe_image.c to
> >    kexec_file.c (with the new hook in the file_ops there shouldn't be
> >    any problems).  
> 
> Yes, the logic of loading and runing bpf progs should be placed in
> kexec_file.c.
> 
> > 3. Rename CONFIG_KEXEC_PE_IMAGE to CONFIG_KEXEC_BPF  
> 
> OK.
> 
> > 4. Rename kexec_pe_image.c (and the functions within) to
> >    kexec_uefi_app.c 
> >   
> 
> OK.
> 
> Thanks for your careful review and good suggestion.
> 
> 
> Best Regards,
> 
> Pingfan
> 
> > Thanks
> > Philipp
> > 
> > On Tue, 19 Aug 2025 09:24:16 +0800
> > Pingfan Liu <pi...@redhat.com> wrote:
> >   
> > > Cc systemd-de...@lists.freedesktop.org so any UKI expert can comment
> > > 
> > > *** Review the history ***
> > > 
> > > Nowadays UEFI PE bootable image is more and more popular on the 
> > > distribution.
> > > But it is still an open issue to load that kind of image by kexec with 
> > > IMA enabled
> > > 
> > > There are several approaches to reslove this issue, but none of them are
> > > accepted in upstream till now.
> > > 
> > > The summary of those approaches:
> > >   -1. UEFI service emulator for UEFI stub
> > >   -2. PE format parser in kernel
> > > 
> > > For the first one, I have tried a purgatory-style emulator [1]. But it
> > > confronts the hardware scaling trouble.  For the second one, there are two
> > > choices, one is to implement it inside the kernel, the other is inside 
> > > the user
> > > space.  Both zboot-format [2] and UKI-format [3] parsers are rejected due 
> > > to
> > > the concern that the variant format parsers will inflate the kernel code. 
> > >  And
> > > finally, we have these kinds of parsers in the user space 'kexec-tools'.
> > > 
> > > 
> > > *** The approach in this series ***
> > > 
> > > This approach allows the various PE boot image to be parsed in the 
> > > bpf-prog,
> > > as a result, the kexec kernel code to remain relatively stable.
> > > 
> > > Benefits
> > > And it abstracts architecture independent part and 
> > > the API is limitted 
> > > 
> > > To protect against malicious attacks on the BPF loader in user space, it
> > > employs BPF lskel to load and execute BPF programs from within the
> > > kernel.
> > > 
> > > Each type of PE image contains a dedicated section '.bpf', which stores
> > > the bpf-prog designed to parse the format.  This ensures that the PE's
> > > signature also protects the integrity of the '.bpf' section.
> > > 
> > > 
> > > The parsing process operates as a pipeline. The current BPF program
> > > parser attaches to bpf_handle_pefile() and detaches at the end of the
> > > current stage via disarm_bpf_prog(). The results parsed by the current
> > > BPF program are buffered in the kernel through prepare_nested_pe() and
> > > then delivered to the next stage. For each stage of the pipeline, the
> > > BPF bytecode is stored in the '.bpf' section of the PE file. That means
> > > a vmlinuz.efi embeded in UKI format can be handled.
> > > 
> > > 
> > > Special thanks to Philipp Rudo, who spent significant time evaluating
> > > the practicality of my solution, and to Viktor Malik, who guided me
> > > toward using BPF light skeleton to prevent malicious attacks from user
> > > space.
> > > 
> > > *** Test result ***
> > > Configured with RHEL kernel debug file, which turns on most of locking,
> > > memory debug option, I have not seen any warning or bug for 1000 times.
> > > 
> > > Test approach:
> > > -1. compile kernel
> > > -2. get the zboot image with bpf-prog by 'make -C tools/kexec zboot'
> > > -3. compile kexec-tools from 
> > > https://github.com/pfliu/kexec-tools/pull/new/pe_bpf
> > > 
> > > The rest process is the common convention to use kexec.
> > > 
> > > 
> > > [1]: 
> > > https://lore.kernel.org/lkml/20240819145417.23367-1-pi...@redhat.com/T/
> > > [2]: 
> > > https://lore.kernel.org/kexec/20230306030305.15595-1-kernelf...@gmail.com/
> > > [3]: https://lore.kernel.org/lkml/20230911052535.335770-1-ker...@jfarr.cc/
> > > [4]: 
> > > https://lore.kernel.org/linux-arm-kernel/20230921133703.39042-2-kernelf...@gmail.com/T/
> > > 
> > > v4 -> v5
> > >   - rebased onto Linux 6.17-rc2
> > >   - [1/12], use a separate CONFIG_KEEP_COMPRESSOR to decide the section
> > >     of decompressor method
> > >   - [10/12], add Catalin's acked-by (Thanks Catalin!)
> > > 
> > > v3 -> v4
> > >   - Use dynamic allocator in decompression ([4/12])
> > >   - Fix issue caused by Identical Code Folding ([5/12])
> > >   - Integrate the image generator tool in the kernel tree ([11,12/12])
> > >   - Address the issue according to Philipp's comments in v3 reviewing.
> > >     Thanks Philipp!
> > > 
> > > RFCv2 -> v3
> > >   - move the introduced bpf kfuncs to kernel/bpf/* and mark them sleepable
> > >   - use listener and publisher model to implement bpf_copy_to_kernel()
> > >   - keep each introduced kfunc under the control of memcg
> > > 
> > > RFCv1 -> RFCv2
> > >   - Use bpf kfunc instead of helper
> > >   - Use C source code to generate the light skeleton file
> > > 
> > > 
> > > *** BLURB HERE ***
> > > 
> > > Pingfan Liu (12):
> > >   kexec_file: Make kexec_image_load_default global visible
> > >   lib/decompress: Keep decompressor when CONFIG_KEEP_COMPRESSOR
> > >   bpf: Introduce bpf_copy_to_kernel() to buffer the content from bpf-prog
> > >   bpf: Introduce decompressor kfunc
> > >   kexec: Introduce kexec_pe_image to parse and load PE file
> > >   kexec: Integrate with the introduced bpf kfuncs
> > >   kexec: Introduce a bpf-prog lskel to parse PE file
> > >   kexec: Factor out routine to find a symbol in ELF
> > >   kexec: Integrate bpf light skeleton to load zboot image
> > >   arm64/kexec: Add PE image format support
> > >   tools/kexec: Introduce a bpf-prog to parse zboot image format
> > >   tools/kexec: Add a zboot image building tool
> > > 
> > >  arch/arm64/Kconfig                           |   1 +
> > >  arch/arm64/include/asm/kexec.h               |   1 +
> > >  arch/arm64/kernel/machine_kexec_file.c       |   3 +
> > >  include/linux/bpf.h                          |  42 ++
> > >  include/linux/decompress/mm.h                |   7 +
> > >  include/linux/kexec.h                        |  10 +
> > >  kernel/Kconfig.kexec                         |   9 +
> > >  kernel/Makefile                              |   2 +
> > >  kernel/bpf/Makefile                          |   3 +
> > >  kernel/bpf/helpers.c                         | 230 +++++++++
> > >  kernel/bpf/helpers_carrier.c                 | 215 +++++++++
> > >  kernel/kexec_bpf/Makefile                    |  71 +++
> > >  kernel/kexec_bpf/kexec_pe_parser_bpf.c       |  67 +++
> > >  kernel/kexec_bpf/kexec_pe_parser_bpf.lskel.h | 147 ++++++
> > >  kernel/kexec_file.c                          |  88 ++--
> > >  kernel/kexec_pe_image.c                      | 463 +++++++++++++++++++
> > >  lib/Kconfig                                  |   3 +
> > >  lib/decompress.c                             |   6 +-
> > >  tools/kexec/Makefile                         |  90 ++++
> > >  tools/kexec/pe.h                             | 177 +++++++
> > >  tools/kexec/zboot_image_builder.c            | 280 +++++++++++
> > >  tools/kexec/zboot_parser_bpf.c               | 158 +++++++
> > >  22 files changed, 2029 insertions(+), 44 deletions(-)
> > >  create mode 100644 kernel/bpf/helpers_carrier.c
> > >  create mode 100644 kernel/kexec_bpf/Makefile
> > >  create mode 100644 kernel/kexec_bpf/kexec_pe_parser_bpf.c
> > >  create mode 100644 kernel/kexec_bpf/kexec_pe_parser_bpf.lskel.h
> > >  create mode 100644 kernel/kexec_pe_image.c
> > >  create mode 100644 tools/kexec/Makefile
> > >  create mode 100644 tools/kexec/pe.h
> > >  create mode 100644 tools/kexec/zboot_image_builder.c
> > >  create mode 100644 tools/kexec/zboot_parser_bpf.c
> > > 
> > > 
> > > base-commit: c17b750b3ad9f45f2b6f7e6f7f4679844244f0b9  
> >   
> 


Reply via email to