|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5 18/28] xsplice: Add support for alternatives
>>> On 24.03.16 at 21:00, <konrad.wilk@xxxxxxxxxx> wrote:
> --- a/xen/arch/x86/alternative.c
> +++ b/xen/arch/x86/alternative.c
> @@ -28,7 +28,7 @@
> extern struct alt_instr __alt_instructions[], __alt_instructions_end[];
>
> #ifdef K8_NOP1
> -static const unsigned char k8nops[] __initconst = {
> +static const unsigned char k8nops[] = {
Just like in Linux these init annotations should become conditional
upon CONFIG_XSPLICE (and I realize this applies to at least the
previous patch too).
> @@ -127,7 +127,7 @@ static void __init add_nops(void *insns, unsigned int len)
> *
> * This routine is called with local interrupt disabled.
> */
> -static void *__init text_poke_early(void *addr, const void *opcode, size_t
> len)
> +static void *text_poke_early(void *addr, const void *opcode, size_t len)
I'm afraid this function's name as well as the comment preceding it
need to change.
> -static void __init apply_alternatives(struct alt_instr *start, struct
> alt_instr *end)
> +void apply_alternatives_nocheck(struct alt_instr *start, struct alt_instr
> *end)
Same here - the preceding comment needs adjustment.
> --- a/xen/arch/x86/test/xen_hello_world_func.c
> +++ b/xen/arch/x86/test/xen_hello_world_func.c
> @@ -5,10 +5,13 @@
>
> #include <xen/config.h>
> #include <xen/types.h>
> +#include <asm/nops.h>
> +#include <asm/alternative.h>
>
> /* Our replacement function for xen_extra_version. */
> const char *xen_hello_world(void)
> {
> + alternative(ASM_NOP1, ASM_NOP1, 1);
Above you say the code is being exercised by this: How can you be
sure that whatever feature has value 1 is actually present? The
pending SMEP/SMAP patches add X86_FEATURE_ALWAYS for such
a purpose.
> --- a/xen/common/xsplice.c
> +++ b/xen/common/xsplice.c
> @@ -590,6 +590,22 @@ static int prepare_payload(struct payload *payload,
> region->ex_end = (struct exception_table_entry *)(sec->load_addr +
> sec->sec->sh_size);
>
> sort_exception_table(region->ex, region->ex_end);
> +
> + }
These two lines want to be swapped.
> + sec = xsplice_elf_sec_by_name(elf, ".altinstructions");
> + if ( sec )
> + {
> + if ( !sec->sec->sh_size ||
> + (sec->sec->sh_size % sizeof (struct alt_instr)) )
> + {
> + dprintk(XENLOG_DEBUG, "%s%s: Wrong size of .alt_instr (exp:%lu
> vs %lu)!\n",
> + XSPLICE, elf->name, sizeof (struct alt_instr),
> + sec->sec->sh_size);
> + return -EINVAL;
> + }
> + apply_alternatives_nocheck((struct alt_instr *)sec->load_addr,
> + (struct alt_instr *)(sec->load_addr +
> + sec->sec->sh_size));
I think alternative patching needs to enforce that only code/data
within the owning image gets patched, to avoid abuse.
> --- a/xen/include/asm-x86/alternative.h
> +++ b/xen/include/asm-x86/alternative.h
> @@ -23,6 +23,12 @@ struct alt_instr {
> u8 replacementlen; /* length of new instruction, <= instrlen */
> };
>
> +/*
> + * An variant to be used on code that can be patched without many checks.
> + */
"A variant", comment style, and - what does "many" mean?
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |