Re: [PATCH 5/6] x86/alternative: Relocate all insn-relative fields

2024-04-23 Thread Jan Beulich
On 23.04.2024 16:59, Jan Beulich wrote:
> On 22.04.2024 20:14, Andrew Cooper wrote:
>> --- a/xen/arch/x86/alternative.c
>> +++ b/xen/arch/x86/alternative.c
>> @@ -244,10 +244,31 @@ static void init_or_livepatch 
>> _apply_alternatives(struct alt_instr *start,
>>  
>>  memcpy(buf, repl, a->repl_len);
>>  
>> +/* Walk buf[] and adjust any insn-relative operands. */
>> +if ( a->repl_len )
>>  {
>> -/* 0xe8/0xe9 are relative branches; fix the offset. */
>> -if ( a->repl_len >= 5 && (*buf & 0xfe) == 0xe8 )
>> +uint8_t *ip = buf, *end = ip + a->repl_len;
>> +
>> +for ( x86_decode_lite_t res; ip < end; ip += res.len )
>>  {
>> +int32_t *d32;
>> +uint8_t *target;
>> +
>> +res = x86_decode_lite(ip, end);
>> +
>> +if ( res.len <= 0 )
>> +{
>> +printk("Alternative for %ps [%*ph]\n",
>> +   ALT_ORIG_PTR(a), a->repl_len, repl);
>> +printk("Unable to decode instruction in alternative - 
>> ignoring.\n");
>> +goto skip_this_alternative;
> 
> Can this really be just a log message? There are cases where patching has
> to happen for things to operate correctly. Hence if not panic()ing, I'd
> say we at least want to taint the hypervisor.

Actually, after some further thought, I don't even think we should skip
such alternatives. Think of e.g. cases where in principle we could get
away with just patching the prefix of an insn. Yet even without such
trickery - there's a fair chance that the alternative doesn't need
fiddling with, and hence putting it in unaltered is likely the best we
can do here.

Jan



Re: [PATCH 5/6] x86/alternative: Relocate all insn-relative fields

2024-04-23 Thread Jan Beulich
On 22.04.2024 20:14, Andrew Cooper wrote:
> --- a/xen/arch/x86/alternative.c
> +++ b/xen/arch/x86/alternative.c
> @@ -244,10 +244,31 @@ static void init_or_livepatch 
> _apply_alternatives(struct alt_instr *start,
>  
>  memcpy(buf, repl, a->repl_len);
>  
> +/* Walk buf[] and adjust any insn-relative operands. */
> +if ( a->repl_len )
>  {
> -/* 0xe8/0xe9 are relative branches; fix the offset. */
> -if ( a->repl_len >= 5 && (*buf & 0xfe) == 0xe8 )
> +uint8_t *ip = buf, *end = ip + a->repl_len;
> +
> +for ( x86_decode_lite_t res; ip < end; ip += res.len )
>  {
> +int32_t *d32;
> +uint8_t *target;
> +
> +res = x86_decode_lite(ip, end);
> +
> +if ( res.len <= 0 )
> +{
> +printk("Alternative for %ps [%*ph]\n",
> +   ALT_ORIG_PTR(a), a->repl_len, repl);
> +printk("Unable to decode instruction in alternative - 
> ignoring.\n");
> +goto skip_this_alternative;

Can this really be just a log message? There are cases where patching has
to happen for things to operate correctly. Hence if not panic()ing, I'd
say we at least want to taint the hypervisor.

> @@ -317,14 +338,23 @@ static void init_or_livepatch 
> _apply_alternatives(struct alt_instr *start,
>   */
>  goto skip_this_alternative;
>  }
> +
> +continue;
>  }
> -else if ( force && system_state < SYS_STATE_active )
> -ASSERT_UNREACHABLE();

This (and the other one below) is related to altcall patching, which you
say you mean to leave alone: During the 2nd pass, no un-processed CALL /
JMP should occur anymore that aren't altcall related.

Jan



[PATCH 5/6] x86/alternative: Relocate all insn-relative fields

2024-04-22 Thread Andrew Cooper
Right now, relocation of displacements is restricted to finding 0xe8/e9 as the
first byte of the replacement, but this is overly restrictive.

Use x86_decode_lite() to find and adjust all insn-relative fields.

As with disp8's not leaving the replacemnet block, some disp32's don't either.
e.g. the RSB stuffing loop.  These stay unmodified.

For now, leave the altcall devirtualisation alone.  These require more care to
transform into the new scheme.

Signed-off-by: Andrew Cooper 
---
CC: Jan Beulich 
CC: Roger Pau Monné 
---
 xen/arch/x86/alternative.c | 46 +++---
 1 file changed, 38 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/alternative.c b/xen/arch/x86/alternative.c
index c86ea235e865..4d7dc9418cf0 100644
--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -244,10 +244,31 @@ static void init_or_livepatch _apply_alternatives(struct 
alt_instr *start,
 
 memcpy(buf, repl, a->repl_len);
 
+/* Walk buf[] and adjust any insn-relative operands. */
+if ( a->repl_len )
 {
-/* 0xe8/0xe9 are relative branches; fix the offset. */
-if ( a->repl_len >= 5 && (*buf & 0xfe) == 0xe8 )
+uint8_t *ip = buf, *end = ip + a->repl_len;
+
+for ( x86_decode_lite_t res; ip < end; ip += res.len )
 {
+int32_t *d32;
+uint8_t *target;
+
+res = x86_decode_lite(ip, end);
+
+if ( res.len <= 0 )
+{
+printk("Alternative for %ps [%*ph]\n",
+   ALT_ORIG_PTR(a), a->repl_len, repl);
+printk("Unable to decode instruction in alternative - 
ignoring.\n");
+goto skip_this_alternative;
+}
+
+if ( res.rel_type != REL_TYPE_d32 )
+continue;
+
+d32 = res.rel;
+
 /*
  * Detect the special case of indirect-to-direct branch 
patching:
  * - replacement is a direct CALL/JMP (opcodes 0xE8/0xE9; 
already
@@ -317,14 +338,23 @@ static void init_or_livepatch _apply_alternatives(struct 
alt_instr *start,
  */
 goto skip_this_alternative;
 }
+
+continue;
 }
-else if ( force && system_state < SYS_STATE_active )
-ASSERT_UNREACHABLE();
-else
-*(int32_t *)(buf + 1) += repl - orig;
+
+target = ip + res.len + *d32;
+
+if ( target >= buf && target <= end )
+{
+/*
+ * Target doesn't leave the replacement block.  e.g. RSB
+ * stuffing.  Leave it unmodified.
+ */
+continue;
+}
+
+*d32 += repl - orig;
 }
-else if ( force && system_state < SYS_STATE_active  )
-ASSERT_UNREACHABLE();
 }
 
 a->priv = 1;
-- 
2.30.2