Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1160868ybb; Wed, 8 Apr 2020 18:13:54 -0700 (PDT) X-Google-Smtp-Source: APiQypItVCJRsHCXHPldVJ7RttgaPsYZnPBZM+JkCbHLk7cwjvJWQQD3NCsY9iU+Euf/xERrmUfQ X-Received: by 2002:aca:80e:: with SMTP id 14mr2017493oii.143.1586394834467; Wed, 08 Apr 2020 18:13:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586394834; cv=none; d=google.com; s=arc-20160816; b=IKevLC4xkt5k/OU075B0QALnnjBWkM9/Q9eEP3e9N0E4fwPWiivm66wUct0o55ueUK bNAgxLicXjK3GcpmFwRbOarRgP6R0fVY49na1nrk3a5Xwec5Qu6O+KRPpjhnplayK5is 9oJdpP9q0qIEaRuapCWI5LYseMUhPir5+oK8mCw5OFsiKy8iVIcpOJEravU6yF0Wa00A agGMWLYJu4hlJ6GBbgPnYUESi8U06Tb3PWmkGUeYNERA7uISlJelDHu94QLJWF7mYFJ4 PdfUuKncW4tUrcuycJHj6KuEWKAd+ntR4n1oMlWBE11zzgaKzM78o0OwqpyjE/6bOnPe B0zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=HZNygAdDyze41zEMgXS+Rl5FVegsQH7BsRnE747mhy4=; b=z35b2T0KH27xY/2KrPwISjueLdV/+A1FYvlX+fLuhJ7l7fBA2ZZKmHiWp7XOkbsp7q scRr0cDDbho0IFN//50Zh7cIDhUoDusApGxtkGjCJp47Uf7F4uf2z6IOLPxxpHTasRwL D+XpF3a+YlyA0090Mv/yo+4sqaqpxax2dVzVLsWkbnG4T+xTeSklky41PAW3kaPH1VGL nMdugRWP0ACmBm0wFRfQqm0BqxYfVas7IeSGIvDEZUbfDHX0TLSs2r1gz+2XMQk4xOpp 5PT2fIfnBIBSBL87DdgW7J9UsrNvb1Tg1KJONIfnrvkcEiL3U1zjHeuRlD0EYCSGRVfG ewUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UX3gqTpZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q11si787883ool.8.2020.04.08.18.13.39; Wed, 08 Apr 2020 18:13:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UX3gqTpZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726594AbgDIBMz (ORCPT + 99 others); Wed, 8 Apr 2020 21:12:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:46408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726536AbgDIBMz (ORCPT ); Wed, 8 Apr 2020 21:12:55 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A6B9820857; Thu, 9 Apr 2020 01:12:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586394774; bh=2zHKbO+Qsg+s3myu/Dctq5cWqHCIJBg0kO1iky7QXUo=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=UX3gqTpZOI9MYmL0qiIW7VaH1bhW0NX8Dmp38ScnlkF4PnEkXzJiNqgafCx2SSn8G pDQiIW+Tz7eGLBFzj82BSuPDtQ4DKly7skQgNZRpw63NYgQOg1wjFzTSQrC95GqwWO hAla2cAViXndNZvKEaEe0HBwMEDgqbgL/k4y/0oA= Date: Thu, 9 Apr 2020 10:12:50 +0900 From: Masami Hiramatsu To: Zong Li Cc: palmer@dabbelt.com, paul.walmsley@sifive.com, aou@eecs.berkeley.edu, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 2/9] riscv: introduce interfaces to patch kernel code Message-Id: <20200409101250.211b698d63d9dade595aaac8@kernel.org> In-Reply-To: <6f145470ffdf83b303ecd83db4f6e06477b61220.1586332296.git.zong.li@sifive.com> References: <6f145470ffdf83b303ecd83db4f6e06477b61220.1586332296.git.zong.li@sifive.com> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 8 Apr 2020 15:56:57 +0800 Zong Li wrote: > On strict kernel memory permission, we couldn't patch code without > writable permission. Preserve two holes in fixmap area, so we can map > the kernel code temporarily to fixmap area, then patch the instructions. > > We need two pages here because we support the compressed instruction, so > the instruction might be align to 2 bytes. When patching the 32-bit > length instruction which is 2 bytes alignment, it will across two pages. > > Introduce two interfaces to patch kernel code: > riscv_patch_text_nosync: > - patch code without synchronization, it's caller's responsibility to > synchronize all CPUs if needed. > riscv_patch_text: > - patch code and always synchronize with stop_machine() > Looks good to me. Reviewed-by: Masami Hiramatsu Thank you, > Signed-off-by: Zong Li > Suggested-by: Masami Hiramatsu > --- > arch/riscv/include/asm/fixmap.h | 2 + > arch/riscv/include/asm/patch.h | 12 +++ > arch/riscv/kernel/Makefile | 4 +- > arch/riscv/kernel/patch.c | 128 ++++++++++++++++++++++++++++++++ > 4 files changed, 145 insertions(+), 1 deletion(-) > create mode 100644 arch/riscv/include/asm/patch.h > create mode 100644 arch/riscv/kernel/patch.c > > diff --git a/arch/riscv/include/asm/fixmap.h b/arch/riscv/include/asm/fixmap.h > index 42d2c42f3cc9..2368d49eb4ef 100644 > --- a/arch/riscv/include/asm/fixmap.h > +++ b/arch/riscv/include/asm/fixmap.h > @@ -27,6 +27,8 @@ enum fixed_addresses { > FIX_FDT = FIX_FDT_END + FIX_FDT_SIZE / PAGE_SIZE - 1, > FIX_PTE, > FIX_PMD, > + FIX_TEXT_POKE1, > + FIX_TEXT_POKE0, > FIX_EARLYCON_MEM_BASE, > __end_of_fixed_addresses > }; > diff --git a/arch/riscv/include/asm/patch.h b/arch/riscv/include/asm/patch.h > new file mode 100644 > index 000000000000..9a7d7346001e > --- /dev/null > +++ b/arch/riscv/include/asm/patch.h > @@ -0,0 +1,12 @@ > +/* SPDX-License-Identifier: GPL-2.0-only */ > +/* > + * Copyright (C) 2020 SiFive > + */ > + > +#ifndef _ASM_RISCV_PATCH_H > +#define _ASM_RISCV_PATCH_H > + > +int patch_text_nosync(void *addr, const void *insns, size_t len); > +int patch_text(void *addr, u32 insn); > + > +#endif /* _ASM_RISCV_PATCH_H */ > diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile > index f40205cb9a22..d189bd3d8501 100644 > --- a/arch/riscv/kernel/Makefile > +++ b/arch/riscv/kernel/Makefile > @@ -4,7 +4,8 @@ > # > > ifdef CONFIG_FTRACE > -CFLAGS_REMOVE_ftrace.o = -pg > +CFLAGS_REMOVE_ftrace.o = -pg > +CFLAGS_REMOVE_patch.o = -pg > endif > > extra-y += head.o > @@ -26,6 +27,7 @@ obj-y += traps.o > obj-y += riscv_ksyms.o > obj-y += stacktrace.o > obj-y += cacheinfo.o > +obj-y += patch.o > obj-$(CONFIG_MMU) += vdso.o vdso/ > > obj-$(CONFIG_RISCV_M_MODE) += clint.o > diff --git a/arch/riscv/kernel/patch.c b/arch/riscv/kernel/patch.c > new file mode 100644 > index 000000000000..f16466123947 > --- /dev/null > +++ b/arch/riscv/kernel/patch.c > @@ -0,0 +1,128 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2020 SiFive > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +struct patch_insn_patch { > + void *addr; > + u32 insn; > + atomic_t cpu_count; > +}; > + > +#ifdef CONFIG_MMU > +static void *patch_map(void *addr, int fixmap) > +{ > + uintptr_t uintaddr = (uintptr_t) addr; > + struct page *page; > + > + if (core_kernel_text(uintaddr)) > + page = phys_to_page(__pa_symbol(addr)); > + else if (IS_ENABLED(CONFIG_STRICT_MODULE_RWX)) > + page = vmalloc_to_page(addr); > + else > + return addr; > + > + BUG_ON(!page); > + > + return (void *)set_fixmap_offset(fixmap, page_to_phys(page) + > + (uintaddr & ~PAGE_MASK)); > +} > +NOKPROBE_SYMBOL(patch_map); > + > +static void patch_unmap(int fixmap) > +{ > + clear_fixmap(fixmap); > +} > +NOKPROBE_SYMBOL(patch_unmap); > + > +static int patch_insn_write(void *addr, const void *insn, size_t len) > +{ > + void *waddr = addr; > + bool across_pages = (((uintptr_t) addr & ~PAGE_MASK) + len) > PAGE_SIZE; > + int ret; > + > + /* > + * Before reaching here, it was expected to lock the text_mutex > + * already, so we don't need to give another lock here and could > + * ensure that it was safe between each cores. > + */ > + lockdep_assert_held(&text_mutex); > + > + if (across_pages) > + patch_map(addr + len, FIX_TEXT_POKE1); > + > + waddr = patch_map(addr, FIX_TEXT_POKE0); > + > + ret = probe_kernel_write(waddr, insn, len); > + > + patch_unmap(FIX_TEXT_POKE0); > + > + if (across_pages) > + patch_unmap(FIX_TEXT_POKE1); > + > + return ret; > +} > +NOKPROBE_SYMBOL(patch_insn_write); > +#else > +static int patch_insn_write(void *addr, const void *insn, size_t len) > +{ > + return probe_kernel_write(addr, insn, len); > +} > +NOKPROBE_SYMBOL(patch_insn_write); > +#endif /* CONFIG_MMU */ > + > +int patch_text_nosync(void *addr, const void *insns, size_t len) > +{ > + u32 *tp = addr; > + int ret; > + > + ret = patch_insn_write(tp, insns, len); > + > + if (!ret) > + flush_icache_range((uintptr_t) tp, (uintptr_t) tp + len); > + > + return ret; > +} > +NOKPROBE_SYMBOL(patch_text_nosync); > + > +static int patch_text_cb(void *data) > +{ > + struct patch_insn_patch *patch = data; > + int ret = 0; > + > + if (atomic_inc_return(&patch->cpu_count) == 1) { > + ret = > + patch_text_nosync(patch->addr, &patch->insn, > + GET_INSN_LENGTH(patch->insn)); > + atomic_inc(&patch->cpu_count); > + } else { > + while (atomic_read(&patch->cpu_count) <= num_online_cpus()) > + cpu_relax(); > + smp_mb(); > + } > + > + return ret; > +} > +NOKPROBE_SYMBOL(patch_text_cb); > + > +int patch_text(void *addr, u32 insn) > +{ > + struct patch_insn_patch patch = { > + .addr = addr, > + .insn = insn, > + .cpu_count = ATOMIC_INIT(0), > + }; > + > + return stop_machine_cpuslocked(patch_text_cb, > + &patch, cpu_online_mask); > +} > +NOKPROBE_SYMBOL(patch_text); > -- > 2.26.0 > -- Masami Hiramatsu