mirror of
https://github.com/dynup/kpatch
synced 2025-04-04 23:29:23 +00:00
PPC64le - do not use the patched functions as callbacks directly
It was observed by Evgenii Shatokhin in PR#755, that when the RCU callback was called on the patched function, from unloaded livepatch module triggered a kernel crash. This patch implements the approach on PowerPC outlined in PR#755. With -mcmodel=large, like any other data, function pointers are also loaded relative to the current TOC base and are populated as relocation entries in .toc section. Every function passing a function pointer as the argument need to load the function address through .toc section + offset. Convert such .toc + offset relocation into a dynamic rela, which resolves to original function address, during module load. Also move the comment related to nested function check, into may_need_dynrela(). Suggested-by: Josh Poimboeuf <jpoimboe@redhat.com> Cc: Evgenii Shatokhin <eshatokhin@virtuozzo.com> Cc: Joe Lawrence <jdl1291@gmail.com> Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
This commit is contained in:
parent
495e619750
commit
19b0aba672
@ -2328,6 +2328,16 @@ static int kpatch_is_core_module_symbol(char *name)
|
|||||||
!strcmp(name, "kpatch_shadow_get"));
|
!strcmp(name, "kpatch_shadow_get"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static struct rela *toc_rela(const struct rela *rela)
|
||||||
|
{
|
||||||
|
if (rela->type != R_PPC64_TOC16_HA &&
|
||||||
|
rela->type != R_PPC64_TOC16_LO_DS)
|
||||||
|
return (struct rela *)rela;
|
||||||
|
|
||||||
|
/* Will return NULL for .toc constant entries */
|
||||||
|
return find_rela_by_offset(rela->sym->sec->rela, rela->addend);
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* If the patched code refers to a symbol, for example, calls a function
|
* If the patched code refers to a symbol, for example, calls a function
|
||||||
* or stores a pointer to a function somewhere, the address of that symbol
|
* or stores a pointer to a function somewhere, the address of that symbol
|
||||||
@ -2353,28 +2363,38 @@ static int kpatch_is_core_module_symbol(char *name)
|
|||||||
* the kernel could try to call the function via an invalid pointer and
|
* the kernel could try to call the function via an invalid pointer and
|
||||||
* would crash. With dynrela, the kernel would call the original function
|
* would crash. With dynrela, the kernel would call the original function
|
||||||
* in that case.
|
* in that case.
|
||||||
*
|
|
||||||
* Nested functions used as callbacks are a special case. They are not
|
|
||||||
* supposed to be visible outside of the function that defines them.
|
|
||||||
* Their names may differ in the original and the patched kernels which
|
|
||||||
* makes it difficult to use dynrelas. Fortunately, nested functions are
|
|
||||||
* rare and are unlikely to be used as asynchronous callbacks, so the
|
|
||||||
* patched code can refer to them directly. It seems, one can only
|
|
||||||
* distinguish such functions by their names containing a dot. Other
|
|
||||||
* kinds of functions with such names (e.g. optimized copies of functions)
|
|
||||||
* are unlikely to be used as callbacks.
|
|
||||||
*/
|
*/
|
||||||
static int function_ptr_rela(const struct rela *rela)
|
static int function_ptr_rela(const struct rela *rela)
|
||||||
{
|
{
|
||||||
return (rela->sym->type == STT_FUNC && rela->type == R_X86_64_32S);
|
const struct rela *rela_toc = toc_rela(rela);
|
||||||
|
|
||||||
|
return (rela_toc && rela_toc->sym->type == STT_FUNC &&
|
||||||
|
/* skip switch table on PowerPC */
|
||||||
|
rela_toc->addend == rela_toc->sym->sym.st_value &&
|
||||||
|
(rela->type == R_X86_64_32S ||
|
||||||
|
rela->type == R_PPC64_TOC16_HA ||
|
||||||
|
rela->type == R_PPC64_TOC16_LO_DS));
|
||||||
}
|
}
|
||||||
|
|
||||||
static int may_need_dynrela(const struct rela *rela)
|
static int may_need_dynrela(const struct rela *rela)
|
||||||
{
|
{
|
||||||
if (!rela->sym->sec)
|
if (!rela->sym->sec)
|
||||||
return 1;
|
return 1;
|
||||||
|
/*
|
||||||
return (function_ptr_rela(rela) && !strchr(rela->sym->name, '.'));
|
* Nested functions used as callbacks are a special case.
|
||||||
|
* They are not supposed to be visible outside of the
|
||||||
|
* function that defines them. Their names may differ in
|
||||||
|
* the original and the patched kernels which makes it
|
||||||
|
* difficult to use dynrelas. Fortunately, nested functions
|
||||||
|
* are rare and are unlikely to be used as asynchronous
|
||||||
|
* callbacks, so the patched code can refer to them directly.
|
||||||
|
* It seems, one can only distinguish such functions by their
|
||||||
|
* names containing a dot. Other kinds of functions with
|
||||||
|
* such names (e.g. optimized copies of functions) are
|
||||||
|
* unlikely to be used as callbacks.
|
||||||
|
*/
|
||||||
|
return (function_ptr_rela(rela) &&
|
||||||
|
!strchr(toc_rela(rela)->sym->name, '.'));
|
||||||
}
|
}
|
||||||
|
|
||||||
static void kpatch_create_intermediate_sections(struct kpatch_elf *kelf,
|
static void kpatch_create_intermediate_sections(struct kpatch_elf *kelf,
|
||||||
@ -2401,8 +2421,28 @@ static void kpatch_create_intermediate_sections(struct kpatch_elf *kelf,
|
|||||||
continue;
|
continue;
|
||||||
if (!strcmp(sec->name, ".rela.kpatch.funcs"))
|
if (!strcmp(sec->name, ".rela.kpatch.funcs"))
|
||||||
continue;
|
continue;
|
||||||
list_for_each_entry(rela, &sec->relas, list)
|
list_for_each_entry(rela, &sec->relas, list) {
|
||||||
nr++; /* upper bound on number of kpatch relas and symbols */
|
nr++; /* upper bound on number of kpatch relas and symbols */
|
||||||
|
/*
|
||||||
|
* Relocation section '.rela.toc' at offset 0xcc6b0 contains 46 entries:
|
||||||
|
* ...
|
||||||
|
* 0000000000000138 0000002a00000026 R_PPC64_ADDR64 0000000000000000 .text.deferred_put_nlk_sk + 8
|
||||||
|
*
|
||||||
|
* Relocation section '.rela.text.netlink_release' at offset 0xcadf0 contains 44 entries:
|
||||||
|
* ...
|
||||||
|
* 0000000000000398 0000007300000032 R_PPC64_TOC16_HA 0000000000000000 .toc + 138
|
||||||
|
* 00000000000003a0 0000007300000040 R_PPC64_TOC16_LO_DS 0000000000000000 .toc + 138
|
||||||
|
*
|
||||||
|
* On PowerPC, may_need_dynrela() should be using rela's reference in .rela.toc for
|
||||||
|
* the rela like in the example, where the sym name is .toc + offset. In such case,
|
||||||
|
* the checks are performed on both rela and its reference in .rela.toc. Where the
|
||||||
|
* rela is checked for rela->type and its corresponding rela in .rela.toc for function
|
||||||
|
* pointer/switch label. If rela->need_dynrela needs to be set, it's referenced rela
|
||||||
|
* in (.rela.toc)->need_dynrela is set, as they represent the function sym.
|
||||||
|
*/
|
||||||
|
if (may_need_dynrela(rela))
|
||||||
|
toc_rela(rela)->need_dynrela = 1;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* create .kpatch.relocations text/rela section pair */
|
/* create .kpatch.relocations text/rela section pair */
|
||||||
@ -2435,7 +2475,7 @@ static void kpatch_create_intermediate_sections(struct kpatch_elf *kelf,
|
|||||||
!strcmp(sec->name, ".rela.kpatch.dynrelas"))
|
!strcmp(sec->name, ".rela.kpatch.dynrelas"))
|
||||||
continue;
|
continue;
|
||||||
list_for_each_entry_safe(rela, safe, &sec->relas, list) {
|
list_for_each_entry_safe(rela, safe, &sec->relas, list) {
|
||||||
if (!may_need_dynrela(rela))
|
if (!rela->need_dynrela)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -20,6 +20,7 @@
|
|||||||
#ifndef _KPATCH_ELF_H_
|
#ifndef _KPATCH_ELF_H_
|
||||||
#define _KPATCH_ELF_H_
|
#define _KPATCH_ELF_H_
|
||||||
|
|
||||||
|
#include <stdbool.h>
|
||||||
#include <gelf.h>
|
#include <gelf.h>
|
||||||
#include "list.h"
|
#include "list.h"
|
||||||
#include "log.h"
|
#include "log.h"
|
||||||
@ -90,6 +91,7 @@ struct rela {
|
|||||||
int addend;
|
int addend;
|
||||||
int offset;
|
int offset;
|
||||||
char *string;
|
char *string;
|
||||||
|
bool need_dynrela;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct string {
|
struct string {
|
||||||
|
Loading…
Reference in New Issue
Block a user