From patchwork Tue Mar 15 17:56:44 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Konrad Rzeszutek Wilk X-Patchwork-Id: 8591241 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 05EDDC0555 for ; Tue, 15 Mar 2016 18:03:02 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id DC98A20379 for ; Tue, 15 Mar 2016 18:03:00 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 52FF520304 for ; Tue, 15 Mar 2016 18:02:59 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1aftGh-0001BI-AM; Tue, 15 Mar 2016 18:00:31 +0000 Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1aftGf-000193-0q for xen-devel@lists.xenproject.org; Tue, 15 Mar 2016 18:00:29 +0000 Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id C1/23-02994-CBD48E65; Tue, 15 Mar 2016 18:00:28 +0000 X-Env-Sender: konrad@char.us.oracle.com X-Msg-Ref: server-4.tower-31.messagelabs.com!1458064825!19654837!1 X-Originating-IP: [156.151.31.81] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogMTU2LjE1MS4zMS44MSA9PiAyODgzMzk=\n X-StarScan-Received: X-StarScan-Version: 8.11; banners=-,-,- X-VirusChecked: Checked Received: (qmail 23336 invoked from network); 15 Mar 2016 18:00:27 -0000 Received: from userp1040.oracle.com (HELO userp1040.oracle.com) (156.151.31.81) by server-4.tower-31.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 15 Mar 2016 18:00:27 -0000 Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u2FI0IBg011493 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 15 Mar 2016 18:00:18 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userv0021.oracle.com (8.13.8/8.13.8) with ESMTP id u2FI0HLg018400 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Tue, 15 Mar 2016 18:00:18 GMT Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by aserv0122.oracle.com (8.13.8/8.13.8) with ESMTP id u2FI0HXX025429; Tue, 15 Mar 2016 18:00:17 GMT Received: from char.us.oracle.com (/10.137.176.158) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 15 Mar 2016 11:00:17 -0700 Received: by char.us.oracle.com (Postfix, from userid 1000) id AE7FC6A00E4; Tue, 15 Mar 2016 13:59:46 -0400 (EDT) From: Konrad Rzeszutek Wilk To: xen-devel@lists.xenproject.org, ross.lagerwall@citrix.com, konrad@kernel.org, andrew.cooper3@citrix.com, mpohlack@amazon.de, sasha.levin@oracle.com Date: Tue, 15 Mar 2016 13:56:44 -0400 Message-Id: <1458064616-23101-23-git-send-email-konrad.wilk@oracle.com> X-Mailer: git-send-email 2.5.0 In-Reply-To: <1458064616-23101-1-git-send-email-konrad.wilk@oracle.com> References: <1458064616-23101-1-git-send-email-konrad.wilk@oracle.com> X-Source-IP: userv0021.oracle.com [156.151.31.71] Cc: Keir Fraser , Jan Beulich , Konrad Rzeszutek Wilk Subject: [Xen-devel] [PATCH v4 22/34] xsplice: Add support for bug frames. X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Ross Lagerwall Add support for handling bug frames contained with xsplice modules. If a trap occurs search either the kernel bug table or an applied payload's bug table depending on the instruction pointer. We also include a test-case - which will test the function that was patched to make sure it has the right value. And will only be triggered if something has gone horribly wrong. P.S. If one really wants to test, insert an WARN_ON(1) at the end of the revert_hook. Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper v2:- s/module/payload/ - add build time check in case amount of bug frames expands. - add define for the number of bug-frames. v3: - add missing BUGFRAME_NR, squash s/core_size/core/ in earlier patch. v4:- Add comment about it being optional. - Moved code around. - Changed per Andrew's recommendation. - Fixed style changes. - Made it compile under ARM (PRIu32,PRIu64) v5: Use 'struct virtual_region' - Rip more of the is_active_text code. - Use one function for the ->skip v6: Include test-case --- xen/arch/x86/test/xen_hello_world.c | 6 ++++++ xen/arch/x86/traps.c | 5 +++-- xen/common/xsplice.c | 42 +++++++++++++++++++++++++++++++++++++ xen/include/xen/xsplice.h | 5 +++++ 4 files changed, 56 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/test/xen_hello_world.c b/xen/arch/x86/test/xen_hello_world.c index d2b3cc2..5364114 100644 --- a/xen/arch/x86/test/xen_hello_world.c +++ b/xen/arch/x86/test/xen_hello_world.c @@ -19,11 +19,17 @@ extern const char *xen_extra_version(void); void apply_hook(void) { printk(KERN_DEBUG "Hook executing.\n"); + /* The hook is called _after_ the patching. */ + if ( strcmp(xen_extra_version(), "Hello World") ) + BUG(); } void revert_hook(void) { printk(KERN_DEBUG "Hook unloaded.\n"); + /* The hook is called _after_ the unpatching. */ + if ( !strcmp(xen_extra_version(), "Hello World") ) + BUG(); } XSPLICE_LOAD_HOOK(apply_hook); diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c index eeada97..f35fd1a 100644 --- a/xen/arch/x86/traps.c +++ b/xen/arch/x86/traps.c @@ -49,6 +49,7 @@ #include #include #include +#include #include #include #include @@ -1196,7 +1197,7 @@ void do_invalid_op(struct cpu_user_regs *regs) /* WARN, BUG or ASSERT: decode the filename pointer and line number. */ filename = bug_ptr(bug); - if ( !is_kernel(filename) ) + if ( !is_kernel(filename) && !is_patch(filename) ) goto die; fixup = strlen(filename); if ( fixup > 50 ) @@ -1223,7 +1224,7 @@ void do_invalid_op(struct cpu_user_regs *regs) case BUGFRAME_assert: /* ASSERT: decode the predicate string pointer. */ predicate = bug_msg(bug); - if ( !is_kernel(predicate) ) + if ( !is_kernel(predicate) && !is_patch(predicate) ) predicate = ""; printk("Assertion '%s' failed at %s%s:%d\n", diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c index 5fb1867..49f0d6e 100644 --- a/xen/common/xsplice.c +++ b/xen/common/xsplice.c @@ -117,6 +117,25 @@ static bool_t ignore_region(unsigned int flag, unsigned long priv) return !(flag & priv); } + +bool_t is_patch(const void *ptr) +{ + struct payload *data; + + /* + * No locking since this list is only ever changed during apply or revert + * context. + */ + list_for_each_entry ( data, &applied_list, applied_list ) + { + if ( ptr >= data->payload_address && + ptr < (data->payload_address + data->core_size) ) + return 1; + } + + return 0; +} + uint64_t xsplice_symbols_lookup_by_name(const char *symname) { struct payload *data; @@ -468,6 +487,29 @@ static int prepare_payload(struct payload *payload, region->start = (unsigned long)payload->payload_address; region->end = (unsigned long)(payload->payload_address + payload->core_text_size); + + /* Optional sections. */ + for ( i = 0; i < BUGFRAME_NR; i++ ) + { + char str[14]; + + snprintf(str, sizeof str, ".bug_frames.%u", i); + sec = xsplice_elf_sec_by_name(elf, str); + if ( !sec ) + continue; + + if ( !sec->sec->sh_size || + (sec->sec->sh_size % sizeof (struct bug_frame)) ) + { + dprintk(XENLOG_DEBUG, "%s%s: Wrong size of .bug_frames.%u!\n", + XSPLICE, elf->name, i); + return -EINVAL; + } + region->frame[i].bugs = (struct bug_frame *)sec->load_addr; + region->frame[i].n_bugs = sec->sec->sh_size / sizeof(struct bug_frame); + if ( !(region->priv & CHECKING_BUG_FRAME) ) + region->priv |= CHECKING_BUG_FRAME; + } return 0; } diff --git a/xen/include/xen/xsplice.h b/xen/include/xen/xsplice.h index 2e2fb78..16d35b8 100644 --- a/xen/include/xen/xsplice.h +++ b/xen/include/xen/xsplice.h @@ -42,6 +42,7 @@ struct xsplice_symbol { int xsplice_op(struct xen_sysctl_xsplice_op *); void check_for_xsplice_work(void); +bool_t is_patch(const void *addr); uint64_t xsplice_symbols_lookup_by_name(const char *symname); /* Arch hooks. */ @@ -104,6 +105,10 @@ static inline int xsplice_op(struct xen_sysctl_xsplice_op *op) return -ENOSYS; } static inline void check_for_xsplice_work(void) { }; +static inline bool_t is_patch(const void *addr) +{ + return 0; +} #endif /* CONFIG_XSPLICE */ #endif /* __XEN_XSPLICE_H__ */