From: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
To: Torsten Duwe <duwe@lst.de>
Cc: Michael Ellerman <mpe@ellerman.id.au>,
Balbir Singh <bsingharora@gmail.com>,
"Naveen N . Rao" <naveen.n.rao@linux.vnet.ibm.com>,
Josh Poimboeuf <jpoimboe@redhat.com>,
Jessica Yu <jeyu@kernel.org>,
Ananth N Mavinakayanahalli <ananth@linux.vnet.ibm.com>,
Aravinda Prasad <aravinda@linux.vnet.ibm.com>,
linuxppc-dev@lists.ozlabs.org, live-patching@vger.kernel.org
Subject: Re: [PATCH v2] kernel/module_64.c: Add REL24 relocation support of livepatch symbols
Date: Fri, 6 Oct 2017 11:27:42 +0530 [thread overview]
Message-ID: <9f388c9a-8d74-865a-b113-f77322918b39@linux.vnet.ibm.com> (raw)
In-Reply-To: <20171005124313.GA25100@lst.de>
On Thursday 05 October 2017 06:13 PM, Torsten Duwe wrote:
> On Wed, Oct 04, 2017 at 11:25:16AM -0400, Kamalesh Babulal wrote:
>>
>> Both the failures with REL24 livepatch symbols relocation, can be
>> resolved by constructing a new livepatch stub. The newly setup klp_stub
>> mimics the functionality of entry_64.S::livepatch_handler introduced by
>> commit 85baa095497f ("powerpc/livepatch: Add live patching support on
>> ppc64le").
>
> So, do I get his right that this patch is based on your June 13 proposal
> "powerpc/modules: Introduce new stub code for SHN_LIVEPATCH symbols" ?
> I guess you lost many of us already at that point. What is the new, much
> bigger stub code needed for? Stub code should do only the very bare minimum,
> all common functionality is handled in the kernel main object.
>
> What exactly is the problem you're trying to solve, what is to be achieved?
Resending the reply, sorry about the word wrapping in the previous mail.
Thanks for the review.
With apply_relocate_add() writing out relocations for livepatch symbols
too. R_PPC_REL24: Doesn't handle SHN_LIVEPATCH symbols and ends up
being treated as local symbol and calls local_entry_offset(). Which
triggers an error:
module_64: kpatch_meminfo: REL24 -1152921504897399800 out of range!
Whereas SHN_LIVEPATCH symbols are essentially SHN_UNDEF, should be
called via external stub. This issue can be fixed by handling both
SHN_UNDEF and SHN_LIVEPATCH via same external stub. It isn't a complete
fix, because it will fail with local calls becoming global.
Consider the livepatch sequence[1]. Where function A calls B, B is the
function which has been livepatched and the call to function B is
redirected to patched version P. P calls the function C in M2, whereas
C was local to the function B and have became SHN_UNDEF in function P.
Local call becoming global.
+--------+ +--------+ +--------+ +--------+
| | +--------+--------+--->| | +-->| |
| A | | | B | | F | | | P |
| | | | | | +--+ | |
| +---+ | | | |<-+ | |
| |<--+ +----+ C | | | | | |
| | | | +->| | | | | | |<---+
| K / M1 | | | | | K / M2 | +-+ Kernel | +---+ Mod3 +--+ |
+--------+ | | | +--------+ | +--------+ +--------+ | |
| | | | | |
+---+-+--------------+ | |
| | | |
| +--------------------------------------------+ |
+------------------------------------------------+
Handling such call with regular stub, triggers another error:
module_64: kpatch_meminfo: Expect noop after relocate, got 3d220000
Every branch to SHN_UNDEF is followed by a nop instruction, that gets
overwritten by an instruction to restore TOC with r2 value that get
stored onto the stack, before calling the function via global entry
point.
Given that C was local to function B, it does not store/restore TOC as
they are not expected to be clobbered for functions called via local
entry point.
Current stub can be extended to re-store TOC and have a single stub for
both SHN_UNDEF/SHN_LIVEPATCH symbols. Constructing a single stub is an
overhead for non livepatch calla, as it adds extra instructions for TOC
restore.
Idea was to create a new stub for SHN_LIVEPATCH symbols. Which would
also restore the TOC on the return to livepatched function, by
introducing an intermediate stack between function P and function C.
This was the earlier proposal made in June.
It will work for most of the cases but will not work, when arguments to
C as passes through stack. This issue has been already solved by
introduction of livepatch_handler, which runs in _mcount context by
creating a livepatch stack to store/restore TOC/LR. It avoids the need
for an intermediate stack.
Current approach, creates a hybrid stub. Which is a combination of
regular stub (stub setup code) + livepatch_handler (stores/restores
TOC/LR with livepatch stack).
>
>> +
>> + /*
>> + * Patch the code required to load the trampoline address into r11,
>> + * function global entry point into r12, ctr.
>> + */
>> + entry->jump[klp_stub_idx++] = (PPC_INST_ADDIS | ___PPC_RT(11) |
>> + ___PPC_RA(2) | PPC_HA(reladdr));
>> +
>> + entry->jump[klp_stub_idx++] = (PPC_INST_ADDI | ___PPC_RT(11) |
>> + ___PPC_RA(11) | PPC_LO(reladdr));
>> +
>> + entry->jump[klp_stub_idx++] = (PPC_INST_LD | ___PPC_RT(12) |
>> + ___PPC_RA(11) | 128);
> ^^^
> Also, I was a bit puzzled by this constant, BTW.
> Can you #define a meaning to this, perhaps?
Naveen too pointed it out. Will introduce a define for the offset.
>
>> @@ -201,8 +204,33 @@ livepatch_handler:
>> ori r12, r12, STACK_END_MAGIC@l
>> std r12, -8(r11)
>>
>> + /*
>> + * klp_stub_insn/klp_stub_insn_end marks the beginning/end of the
>> + * additional instructions, which gets patched by create_klp_stub()
>> + * for livepatch symbol relocation stub. The instructions are:
>> + *
>> + * Load TOC relative address into r11. module_64.c::klp_stub_for_addr()
>> + * identifies the available free stub slot and loads the address into
>> + * r11 with two instructions.
>> + *
>> + * addis r11, r2, stub_address@ha
>> + * addi r11, r11, stub_address@l
>> + *
>> + * Load global entry into r12 from entry->funcdata offset
>> + * ld r12, 128(r11)
>
> Is that the same 128 as above? Then it should definitely be a #define to
> avoid inconsistencies.
>
Yes, it's the same offset as above in the comments.
[1] ASCII diagram adopted from:
http://mpe.github.io/posts/2016/05/23/kernel-live-patching-for-ppc64le/
--
cheers,
Kamalesh.
next prev parent reply other threads:[~2017-10-06 5:57 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-04 15:25 [PATCH v2] kernel/module_64.c: Add REL24 relocation support of livepatch symbols Kamalesh Babulal
2017-10-05 6:56 ` Naveen N . Rao
2017-10-05 12:43 ` Torsten Duwe
2017-10-06 5:43 ` Kamalesh Babulal
2017-10-11 9:44 ` Kamalesh Babulal
2017-10-06 5:57 ` Kamalesh Babulal [this message]
2017-10-17 14:47 ` Torsten Duwe
2017-10-18 6:17 ` Kamalesh Babulal
2017-10-20 12:07 ` Torsten Duwe
2017-10-21 0:59 ` Balbir Singh
2017-10-23 8:19 ` Kamalesh Babulal
2017-12-12 11:39 ` [PATCH] On ppc64le we HAVE_RELIABLE_STACKTRACE Torsten Duwe
2017-12-12 12:12 ` Miroslav Benes
2017-12-12 13:02 ` Torsten Duwe
2018-02-27 16:09 ` [PATCH 2/2] ppc64le save_stack_trace_tsk_reliable (Was: HAVE_RELIABLE_STACKTRACE) Torsten Duwe
2018-03-08 21:43 ` Balbir Singh
2018-03-09 15:54 ` Torsten Duwe
2017-12-12 14:05 ` [PATCH] On ppc64le we HAVE_RELIABLE_STACKTRACE Josh Poimboeuf
2017-12-15 9:40 ` Nicholas Piggin
2017-12-18 2:58 ` Josh Poimboeuf
2017-12-18 3:39 ` Balbir Singh
2017-12-18 4:01 ` Josh Poimboeuf
2017-12-18 5:33 ` Nicholas Piggin
2017-12-18 18:56 ` Josh Poimboeuf
2017-12-19 2:46 ` Nicholas Piggin
2017-12-19 11:28 ` Torsten Duwe
2017-12-19 21:46 ` Josh Poimboeuf
2017-12-21 12:10 ` Michael Ellerman
2017-12-23 4:00 ` Josh Poimboeuf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9f388c9a-8d74-865a-b113-f77322918b39@linux.vnet.ibm.com \
--to=kamalesh@linux.vnet.ibm.com \
--cc=ananth@linux.vnet.ibm.com \
--cc=aravinda@linux.vnet.ibm.com \
--cc=bsingharora@gmail.com \
--cc=duwe@lst.de \
--cc=jeyu@kernel.org \
--cc=jpoimboe@redhat.com \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=live-patching@vger.kernel.org \
--cc=mpe@ellerman.id.au \
--cc=naveen.n.rao@linux.vnet.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).