Received: by 2002:ac0:cd04:0:0:0:0:0 with SMTP id w4csp193445imn; Fri, 1 Jul 2022 12:55:27 -0700 (PDT) X-Google-Smtp-Source: AGRyM1t28kdZsZwknLrfQJlfNUtTEwtTeJY1hSG5IbSwgPXlJrCaem9YrbIXk8Efe9T9d32dQ5ZP X-Received: by 2002:a17:902:854a:b0:16b:a3c3:ed8c with SMTP id d10-20020a170902854a00b0016ba3c3ed8cmr14175895plo.167.1656705327332; Fri, 01 Jul 2022 12:55:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656705327; cv=none; d=google.com; s=arc-20160816; b=pq8tB6oy8juI1BU1ntmCjvtbE8RzuHC62XATlJLBtytSfMS/Rf4AQN5ft+Kj+73mQ5 s/b5RIgcGVHW3praZe56/jDC0niL+bFTR2W733c0sZNgvorNbQ8UFjAUQU8qWZ7TXY5K xbnpSpyVFGDkJLk7tFLnCK09laQGN/q40itCRxhTHpQ4DBWC2CDlqDfUTyVJjkfJtdIl 4epySaKgs+DLH0gTouJoT2NodoxwuFyCaOsbA0+/463qriEi0jhE+Lqvs7LhZ2thpy0Z TK/C02dsNXnmq55rfWqsnOSZya/4kqO0cBNITGLDPpD0cr+O+21bcKHqH9qM5jipWWi3 gk9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=GWy2YeVuMJUaFDcJYtow9oLioamoe+ff03AojkonNx8=; b=AKR1yiqaO8vQMTeNABsErYu6h6/0iq25mG1jYBMyLMTwH5CESu9WOfvkfP5rTzLk/q ki62TVRE8lPTd7bqyffuodaNJC4eQ3zfFA47xk+Ps40s83ghnvrOWI5IMeA35x3bjyFw FaNwNzWWqGOezdS1hGbM7YJ+XoSJbI72foYfmWKRhUlFDmfNTIkacdPj38/axO8HfQHh qCgSuzEhnqVnDFaxIpuK2khY0+ArWMFgR+vK/VmvWqN4zmozs2CLZW9N1Pl1Awvm6DMR gABrFlscSy4pdSuKfMplPoaES5wcKkKN4XgEHl8jLJni+LLPm++lLqdARSa4+cTw23Jl pXQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=IKZGO7wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r204-20020a632bd5000000b0040d848967b1si2743812pgr.247.2022.07.01.12.55.14; Fri, 01 Jul 2022 12:55:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=IKZGO7wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231628AbiGATxf (ORCPT + 99 others); Fri, 1 Jul 2022 15:53:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32908 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231557AbiGATxe (ORCPT ); Fri, 1 Jul 2022 15:53:34 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B69C82DD5F; Fri, 1 Jul 2022 12:53:32 -0700 (PDT) Received: from [192.168.254.32] (unknown [47.189.24.195]) by linux.microsoft.com (Postfix) with ESMTPSA id 73BBB20D4D81; Fri, 1 Jul 2022 12:53:31 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 73BBB20D4D81 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1656705212; bh=GWy2YeVuMJUaFDcJYtow9oLioamoe+ff03AojkonNx8=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=IKZGO7wjlIW630K+t+j77XST3E9Bvb+6B5S+KUKfFB8d4OBOdz8JtCIfBXKI3Q2U1 CrMDyTtTsLep67lNEdOu+XPJCQ49o01fWw0ItUQgFj1UkIT9iaDiYQV06pTCJ5Pg4A uC5xI0yQRw1fodp3owj/PRkB8XjaLs0gDshSkivI= Message-ID: <884d1d23-84ee-38ad-2bff-40b2d046fbf2@linux.microsoft.com> Date: Fri, 1 Jul 2022 14:53:30 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: Re: [RFC PATCH v2 19/20] arm64: Miscellaneous changes required for enabling livepatch Content-Language: en-US To: Miroslav Benes Cc: jpoimboe@redhat.com, peterz@infradead.org, chenzhongjin@huawei.com, mark.rutland@arm.com, broonie@kernel.org, nobuta.keiya@fujitsu.com, sjitindarsingh@gmail.com, catalin.marinas@arm.com, will@kernel.org, jamorris@linux.microsoft.com, linux-arm-kernel@lists.infradead.org, live-patching@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220524001637.1707472-1-madvenka@linux.microsoft.com> <20220524001637.1707472-20-madvenka@linux.microsoft.com> From: "Madhavan T. Venkataraman" In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Thanks for the review. On 7/1/22 09:16, Miroslav Benes wrote: > Hi, > > sorry for the late reply... > > On Mon, 23 May 2022, madvenka@linux.microsoft.com wrote: > >> From: "Madhavan T. Venkataraman" >> >> - Create arch/arm64/include/asm/livepatch.h and define >> klp_arch_set_pc() and klp_get_ftrace_location() which >> are required for livepatch. >> >> - Define TIF_PATCH_PENDING in arch/arm64/include/asm/thread_info.h >> for livepatch. >> >> - Check TIF_PATCH_PENDING in do_notify_resume() to patch the >> current task for livepatch. >> >> Signed-off-by: Suraj Jitindar Singh >> Signed-off-by: Madhavan T. Venkataraman >> --- >> arch/arm64/include/asm/livepatch.h | 42 ++++++++++++++++++++++++++++ >> arch/arm64/include/asm/thread_info.h | 4 ++- >> arch/arm64/kernel/signal.c | 4 +++ >> 3 files changed, 49 insertions(+), 1 deletion(-) >> create mode 100644 arch/arm64/include/asm/livepatch.h >> >> diff --git a/arch/arm64/include/asm/livepatch.h b/arch/arm64/include/asm/livepatch.h >> new file mode 100644 >> index 000000000000..72d7cd86f158 >> --- /dev/null >> +++ b/arch/arm64/include/asm/livepatch.h >> @@ -0,0 +1,42 @@ >> +/* SPDX-License-Identifier: GPL-2.0 >> + * >> + * livepatch.h - arm64-specific Kernel Live Patching Core >> + */ >> +#ifndef _ASM_ARM64_LIVEPATCH_H >> +#define _ASM_ARM64_LIVEPATCH_H >> + >> +#include >> + >> +static inline void klp_arch_set_pc(struct ftrace_regs *fregs, unsigned long ip) >> +{ >> + struct pt_regs *regs = ftrace_get_regs(fregs); >> + >> + regs->pc = ip; >> +} > > kernel/livepatch/ does not use klp_arch_set_pc() anymore. It was replaced > by ftrace_instruction_pointer_set() and > CONFIG_HAVE_DYNAMIC_FTRACE_WITH_ARGS. > OK. I will address this in the next version. Thanks for pointing it out. >> +/* >> + * klp_get_ftrace_location is expected to return the address of the BL to the >> + * relevant ftrace handler in the callsite. The location of this can vary based >> + * on several compilation options. >> + * CONFIG_DYNAMIC_FTRACE_WITH_REGS >> + * - Inserts 2 nops on function entry the second of which is the BL >> + * referenced above. (See ftrace_init_nop() for the callsite sequence) >> + * (this is required by livepatch and must be selected) >> + * CONFIG_ARM64_BTI_KERNEL: >> + * - Inserts a hint #0x22 on function entry if the function is called >> + * indirectly (to satisfy BTI requirements), which is inserted before >> + * the two nops from above. >> + */ >> +#define klp_get_ftrace_location klp_get_ftrace_location >> +static inline unsigned long klp_get_ftrace_location(unsigned long faddr) >> +{ >> + unsigned long addr = faddr + AARCH64_INSN_SIZE; >> + >> +#if IS_ENABLED(CONFIG_ARM64_BTI_KERNEL) >> + addr = ftrace_location_range(addr, addr + AARCH64_INSN_SIZE); >> +#endif >> + >> + return addr; >> +} > > This is not needed either. peterz improved the ftrace code and livepatch > now uses ftrace_location() which gives the proper location directly. > OK. I will remove this in the next version. >> diff --git a/arch/arm64/include/asm/thread_info.h b/arch/arm64/include/asm/thread_info.h >> index e1317b7c4525..a1d8999dbdcc 100644 >> --- a/arch/arm64/include/asm/thread_info.h >> +++ b/arch/arm64/include/asm/thread_info.h >> @@ -68,6 +68,7 @@ int arch_dup_task_struct(struct task_struct *dst, >> #define TIF_UPROBE 4 /* uprobe breakpoint or singlestep */ >> #define TIF_MTE_ASYNC_FAULT 5 /* MTE Asynchronous Tag Check Fault */ >> #define TIF_NOTIFY_SIGNAL 6 /* signal notifications exist */ >> +#define TIF_PATCH_PENDING 7 /* pending live patching update */ >> #define TIF_SYSCALL_TRACE 8 /* syscall trace active */ >> #define TIF_SYSCALL_AUDIT 9 /* syscall auditing */ >> #define TIF_SYSCALL_TRACEPOINT 10 /* syscall tracepoint for ftrace */ >> @@ -98,11 +99,12 @@ int arch_dup_task_struct(struct task_struct *dst, >> #define _TIF_SVE (1 << TIF_SVE) >> #define _TIF_MTE_ASYNC_FAULT (1 << TIF_MTE_ASYNC_FAULT) >> #define _TIF_NOTIFY_SIGNAL (1 << TIF_NOTIFY_SIGNAL) >> +#define _TIF_PATCH_PENDING (1 << TIF_PATCH_PENDING) >> >> #define _TIF_WORK_MASK (_TIF_NEED_RESCHED | _TIF_SIGPENDING | \ >> _TIF_NOTIFY_RESUME | _TIF_FOREIGN_FPSTATE | \ >> _TIF_UPROBE | _TIF_MTE_ASYNC_FAULT | \ >> - _TIF_NOTIFY_SIGNAL) >> + _TIF_NOTIFY_SIGNAL | _TIF_PATCH_PENDING) >> >> #define _TIF_SYSCALL_WORK (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_AUDIT | \ >> _TIF_SYSCALL_TRACEPOINT | _TIF_SECCOMP | \ >> diff --git a/arch/arm64/kernel/signal.c b/arch/arm64/kernel/signal.c >> index 4a4122ef6f39..cbec9597349f 100644 >> --- a/arch/arm64/kernel/signal.c >> +++ b/arch/arm64/kernel/signal.c >> @@ -17,6 +17,7 @@ >> #include >> #include >> #include >> +#include >> #include >> #include >> >> @@ -938,6 +939,9 @@ void do_notify_resume(struct pt_regs *regs, unsigned long thread_flags) >> (void __user *)NULL, current); >> } >> >> + if (thread_flags & _TIF_PATCH_PENDING) >> + klp_update_patch_state(current); >> + >> if (thread_flags & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL)) >> do_signal(regs); > > The rest should be fine. > Thanks! Madhavan