[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] xen/arm: alternative: Make it possible to patch outside of the hypervisor
On Thu, Sep 01, 2016 at 08:56:39AM +0100, Julien Grall wrote: > With livepatch the alternatives that should be patched are outside of > the Xen hypervisor _start -> _end. The current code is assuming that > only Xen could be patched and therefore will explode when a payload > contains alternatives. > > Given that alt_instr contains a relative offset, the function > __apply_alternatives could directly take in parameter the virtual ^- the ^- for > address of the alt_instr set of the re-mapped region. So we can mandate > the callers of __apply_alternatives to ensure the region has read-write s/ensure the region/provide us with a region that/ > access beforehand. How do we mandate it? Should the __apply_alternatives have an comment about it? > > The only caller that will patch directly the Xen binary is the function > __apply_alternatives_multi_stop. The other caller apply_alternatives > will work on the payload which will still have read-write access at that > time. > > Signed-off-by: Julien Grall <julien.grall@xxxxxxx> > > --- > Cc: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> > > This is an alternative of the patch suggested by Konrad [1] to fix > alternatives patching with livepatching. > > [1] > https://lists.xenproject.org/archives/html/xen-devel/2016-08/msg02880.html You also did s/_stext/_start/ > > --- > xen/arch/arm/alternative.c | 58 > +++++++++++++++++++++++++--------------------- > 1 file changed, 31 insertions(+), 27 deletions(-) > > diff --git a/xen/arch/arm/alternative.c b/xen/arch/arm/alternative.c > index 8ee5a11..db4bd0f 100644 > --- a/xen/arch/arm/alternative.c > +++ b/xen/arch/arm/alternative.c > @@ -97,26 +97,11 @@ static u32 get_alt_insn(const struct alt_instr *alt, > static int __apply_alternatives(const struct alt_region *region) > { > const struct alt_instr *alt; > - const u32 *origptr, *replptr; > - u32 *writeptr, *writemap; > - mfn_t text_mfn = _mfn(virt_to_mfn(_stext)); > - unsigned int text_order = get_order_from_bytes(_end - _start); > + const u32 *replptr; > + u32 *origptr; > > printk(XENLOG_INFO "alternatives: Patching kernel code\n"); > > - /* > - * The text section is read-only. So re-map Xen to be able to patch > - * the code. > - */ > - writemap = __vmap(&text_mfn, 1 << text_order, 1, 1, PAGE_HYPERVISOR, > - VMAP_DEFAULT); > - if ( !writemap ) > - { > - printk(XENLOG_ERR "alternatives: Unable to map the text section > (size %u)\n", > - 1 << text_order); > - return -ENOMEM; > - } > - > for ( alt = region->begin; alt < region->end; alt++ ) > { > u32 insn; > @@ -128,7 +113,6 @@ static int __apply_alternatives(const struct alt_region > *region) > BUG_ON(alt->alt_len != alt->orig_len); > > origptr = ALT_ORIG_PTR(alt); > - writeptr = origptr - (u32 *)_start + writemap; > replptr = ALT_REPL_PTR(alt); > > nr_inst = alt->alt_len / sizeof(insn); > @@ -136,19 +120,17 @@ static int __apply_alternatives(const struct alt_region > *region) > for ( i = 0; i < nr_inst; i++ ) > { > insn = get_alt_insn(alt, origptr + i, replptr + i); > - *(writeptr + i) = cpu_to_le32(insn); > + *(origptr + i) = cpu_to_le32(insn); > } > > /* Ensure the new instructions reached the memory and nuke */ > - clean_and_invalidate_dcache_va_range(writeptr, > - (sizeof (*writeptr) * nr_inst)); > + clean_and_invalidate_dcache_va_range(origptr, > + (sizeof (*origptr) * nr_inst)); > } > > /* Nuke the instruction cache */ > invalidate_icache(); > > - vunmap(writemap); > - > return 0; > } > > @@ -159,10 +141,6 @@ static int __apply_alternatives(const struct alt_region > *region) > static int __apply_alternatives_multi_stop(void *unused) > { > static int patched = 0; > - const struct alt_region region = { > - .begin = __alt_instructions, > - .end = __alt_instructions_end, > - }; > > /* We always have a CPU 0 at this point (__init) */ > if ( smp_processor_id() ) > @@ -174,12 +152,38 @@ static int __apply_alternatives_multi_stop(void *unused) > else > { > int ret; > + struct alt_region region; > + mfn_t xen_mfn = _mfn(virt_to_mfn(_start)); > + unsigned int xen_order = get_order_from_bytes(_end - _start); > + char *xenmap; Could this be 'void *'? > > BUG_ON(patched); > + > + /* > + * The text and inittext section is read-only. So re-map Xen to > + * be able to patch the code. > + */ > + xenmap = __vmap(&xen_mfn, 1U << xen_order, 1, 1, PAGE_HYPERVISOR, > + VMAP_DEFAULT); > + /* Re-mapping Xen is not expected to fail during boot. */ > + BUG_ON(!xenmap); > + > + /* > + * Find the virtual address of the alternative region in the new > + * mapping. > + * alt_instr contains relative offset, so the function > + * __apply_alternatives will patch in the re-mapped version of > + * Xen. > + */ > + region.begin = (void *)((char *)__alt_instructions - _start + > xenmap); > + region.end = (void *)((char *)__alt_instructions_end - _start + > xenmap); Which I think would make this have less casts? Oh wait. _start is a char *, so we would have to have: region.begin = (void *)__alt_instructions - (void *)_start + xenmap; region.end = (void *)__alt_instructions_end - (void *)_start + xenmap; Julien, you are the maintainer, so your call. > + > ret = __apply_alternatives(®ion); > /* The patching is not expected to fail during boot. */ > BUG_ON(ret != 0); > > + vunmap(xenmap); > + > /* Barriers provided by the cache flushing */ > write_atomic(&patched, 1); > } > -- > 1.9.1 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |