From: Josh Poimboeuf <jpoimboe@redhat.com>
To: Torsten Duwe <duwe@lst.de>
Cc: Michael Ellerman <mpe@ellerman.id.au>,
"Naveen N . Rao" <naveen.n.rao@linux.vnet.ibm.com>,
Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>,
Balbir Singh <bsingharora@gmail.com>,
Jessica Yu <jeyu@kernel.org>,
Ananth N Mavinakayanahalli <ananth@linux.vnet.ibm.com>,
Aravinda Prasad <aravinda@linux.vnet.ibm.com>,
linuxppc-dev@lists.ozlabs.org, live-patching@vger.kernel.org
Subject: Re: [PATCH v3] kernel/module_64.c: Add REL24 relocation support of livepatch symbols
Date: Tue, 7 Nov 2017 08:52:33 -0600 [thread overview]
Message-ID: <20171107145233.lmlg5lkfcczkxj4d@treble> (raw)
In-Reply-To: <20171107113105.GA19204@lst.de>
On Tue, Nov 07, 2017 at 12:31:05PM +0100, Torsten Duwe wrote:
> On Tue, Nov 07, 2017 at 07:34:29PM +1100, Michael Ellerman wrote:
> > > So, just brainstorming a bit, here are the possible solutions I can
> > > think of:
> > >
> > > a) Create a special klp stub for such calls (as in Kamalesh's patch)
> > >
> > > b) Have kpatch-build rewrite the function to insert nops after calls to
> > > previously-local functions. This would also involve adjusting the
> > > offsets of intra-function branches and relocations which come
> > > afterwards in the same section. And also patching up the DWARF
> > > debuginfo, if we care about that (I think we do). And also patching
> > > up the jump tables which GCC sometimes creates for switch statements.
> > > Yuck. I'm pretty sure this is a horrible idea.
> >
> > It's fairly horrible. It might be *less* horrible if you generated an
> > assembly listing using the compiler, modified that, and then fed that
> > through the assembler and linker.
Ah, that would work a lot better.
> > > c) Create a new GCC flag which treats all calls as global, which can be
> > > used by kpatch-build to generate the right code (assuming this flag
> > > doesn't already exist). This would be a good option, I think.
> >
> > That's not impossible, but I doubt it will be all that popular with the
> > toolchain folks who'd have to implement it :) It will also take a long
> > time to percolate out to users.
>
> BTDT ;-)
Yeah, maybe that's not so realistic.
> > > d) Have kpatch-build do some other kind of transformation? For example,
> > > maybe it could generate klp stubs which the callee calls into. Each
> > > klp stub could then do a proper global call to the SHN_LIVEPATCH
> > > symbol.
> >
> > That could work.
> Indeed. There is no reason to load that off onto the kernel module loader.
I agree that doing the same work in tooling would be better than adding
complexity to the kernel.
> > > Do I understand the problem correctly? Do the potential solutions make
> > > sense? Any other possible solutions I missed?
> >
> > Possibly, I'm not really across how kpatch works in detail and what the
> > constraints are.
> >
> > One option would be to detect any local calls made by the patched
> > function and pull those in as well - ie. make them part of the patch.
> > The pathological case could obviously end up pulling in every function
> > in the kernel, but in practice that's probably unlikely. It already
> > happens to some extent anyway via inlining.
That's definitely a possibility, but I'd rather not go there because it
increases risk and cognitive load.
> > If modifying the source is an option, a sneaky solution is to mark the
> > local functions as weak, which means the compiler/linker has to assume
> > they could become global calls.
That could work, but it means the patch author has to modify the patch.
I'd rather have tooling hide this problem somehow.
> This might also be doable with a gcc "plugin", which would not require changes
> to the compiler itself.
Hm, that's not a bad idea.
> OTOH there's no such thing as a weak static function...
Yeah. Instead of weak, maybe just make them global (remove the
"static")?
Anyway, thanks for the ideas. I may try them out and see what sticks.
--
Josh
next prev parent reply other threads:[~2017-11-07 14:52 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-17 5:18 [PATCH v3] kernel/module_64.c: Add REL24 relocation support of livepatch symbols Kamalesh Babulal
2017-10-31 14:19 ` Naveen N . Rao
2017-10-31 15:30 ` Torsten Duwe
2017-10-31 16:23 ` Naveen N . Rao
2017-10-31 18:39 ` Torsten Duwe
2017-11-01 0:23 ` Balbir Singh
2017-11-07 4:54 ` Josh Poimboeuf
2017-11-07 8:34 ` Michael Ellerman
2017-11-07 11:31 ` Torsten Duwe
2017-11-07 14:52 ` Josh Poimboeuf [this message]
2017-11-09 10:55 ` Michael Ellerman
[not found] ` <20171107145233.lmlg5lkfcczkxj4d__32032.512050546$1510066460$gmane$org@treble>
[not found] ` <20171107145233.lmlg5lkfcczkxj4d__32032.512050546$1510066460$gmane$org@treble >
2017-11-09 11:19 ` Naveen N. Rao
2017-11-09 15:19 ` Josh Poimboeuf
2017-11-10 2:06 ` Balbir Singh
2017-11-10 3:28 ` Josh Poimboeuf
2017-11-10 9:47 ` Michael Ellerman
2017-11-13 8:38 ` Balbir Singh
2017-11-13 11:38 ` Kamalesh Babulal
2017-11-15 10:19 ` Michael Ellerman
2017-11-02 5:49 ` Kamalesh Babulal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171107145233.lmlg5lkfcczkxj4d@treble \
--to=jpoimboe@redhat.com \
--cc=ananth@linux.vnet.ibm.com \
--cc=aravinda@linux.vnet.ibm.com \
--cc=bsingharora@gmail.com \
--cc=duwe@lst.de \
--cc=jeyu@kernel.org \
--cc=kamalesh@linux.vnet.ibm.com \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=live-patching@vger.kernel.org \
--cc=mpe@ellerman.id.au \
--cc=naveen.n.rao@linux.vnet.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).