[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during t
|
From: |
Peter Zijlstra |
|
Subject: |
Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching |
|
Date: |
Mon, 27 Nov 2023 21:08:41 +0100 |
On Mon, Nov 27, 2023 at 10:48:29AM -0600, Madhavan T. Venkataraman wrote:
> Apologies for the late reply. I was on vacation. Please see my response below:
>
> On 11/13/23 02:19, Peter Zijlstra wrote:
> > On Sun, Nov 12, 2023 at 09:23:24PM -0500, Mickaël Salaün wrote:
> >> From: Madhavan T. Venkataraman <madvenka@linux.microsoft.com>
> >>
> >> X86 uses a function called __text_poke() to modify executable code. This
> >> patching function is used by many features such as KProbes and FTrace.
> >>
> >> Update the permissions counters for the text page so that write
> >> permissions can be temporarily established in the EPT to modify the
> >> instructions in that page.
> >>
> >> Cc: Borislav Petkov <bp@alien8.de>
> >> Cc: Dave Hansen <dave.hansen@linux.intel.com>
> >> Cc: H. Peter Anvin <hpa@zytor.com>
> >> Cc: Ingo Molnar <mingo@redhat.com>
> >> Cc: Kees Cook <keescook@chromium.org>
> >> Cc: Madhavan T. Venkataraman <madvenka@linux.microsoft.com>
> >> Cc: Mickaël Salaün <mic@digikod.net>
> >> Cc: Paolo Bonzini <pbonzini@redhat.com>
> >> Cc: Sean Christopherson <seanjc@google.com>
> >> Cc: Thomas Gleixner <tglx@linutronix.de>
> >> Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
> >> Cc: Wanpeng Li <wanpengli@tencent.com>
> >> Signed-off-by: Madhavan T. Venkataraman <madvenka@linux.microsoft.com>
> >> ---
> >>
> >> Changes since v1:
> >> * New patch
> >> ---
> >> arch/x86/kernel/alternative.c | 5 ++++
> >> arch/x86/mm/heki.c | 49 +++++++++++++++++++++++++++++++++++
> >> include/linux/heki.h | 14 ++++++++++
> >> 3 files changed, 68 insertions(+)
> >>
> >> diff --git a/arch/x86/kernel/alternative.c b/arch/x86/kernel/alternative.c
> >> index 517ee01503be..64fd8757ba5c 100644
> >> --- a/arch/x86/kernel/alternative.c
> >> +++ b/arch/x86/kernel/alternative.c
> >> @@ -18,6 +18,7 @@
> >> #include <linux/mmu_context.h>
> >> #include <linux/bsearch.h>
> >> #include <linux/sync_core.h>
> >> +#include <linux/heki.h>
> >> #include <asm/text-patching.h>
> >> #include <asm/alternative.h>
> >> #include <asm/sections.h>
> >> @@ -1801,6 +1802,7 @@ static void *__text_poke(text_poke_f func, void
> >> *addr, const void *src, size_t l
> >> */
> >> pgprot = __pgprot(pgprot_val(PAGE_KERNEL) & ~_PAGE_GLOBAL);
> >>
> >> + heki_text_poke_start(pages, cross_page_boundary ? 2 : 1, pgprot);
> >> /*
> >> * The lock is not really needed, but this allows to avoid open-coding.
> >> */
> >> @@ -1865,7 +1867,10 @@ static void *__text_poke(text_poke_f func, void
> >> *addr, const void *src, size_t l
> >> }
> >>
> >> local_irq_restore(flags);
> >> +
> >> pte_unmap_unlock(ptep, ptl);
> >> + heki_text_poke_end(pages, cross_page_boundary ? 2 : 1, pgprot);
> >> +
> >> return addr;
> >> }
> >
> > This makes no sense, we already use a custom CR3 with userspace alias
> > for the actual pages to write to, why are you then frobbing permissions
> > on that *again* ?
>
> Today, the permissions for a guest page in the extended page table
> (EPT) are RWX (unless permissions are restricted for some specific
> reason like for shadow page table pages). In this Heki feature, we
> don't allow RWX by default in the EPT. We only allow those permissions
> in the EPT that the guest page actually needs. E.g., for a text page,
> it is R_X in both the guest page table and the EPT.
To what end? If you always mirror what the guest does, you've not
actually gained anything.
> For text patching, the above code establishes an alternate mapping in
> the guest page table that is RW_ so that the text can be patched. That
> needs to be reflected in the EPT so that the EPT permissions will
> change from R_X to RWX. In other words, RWX is allowed only as
> necessary. At the end of patching, the EPT permissions are restored to
> R_X.
>
> Does that address your comment?
No, if you want to mirror the native PTEs why don't you hook into the
paravirt page-table muck and get all that for free?
Also, this is the user range, are you saying you're also playing these
daft games with user maps?
- [RFC PATCH v2 10/19] KVM: x86: Implement per-guest-page permissions, (continued)
- [RFC PATCH v2 10/19] KVM: x86: Implement per-guest-page permissions, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 11/19] KVM: x86: Add new hypercall to set EPT permissions, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 08/19] KVM: x86: Extend kvm_vm_set_mem_attributes() with a mask, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 12/19] x86: Implement the Memory Table feature to store arbitrary per-page data, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 13/19] heki: Implement a kernel page table walker, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 14/19] heki: x86: Initialize permissions counters for pages mapped into KVA, Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 15/19] heki: x86: Initialize permissions counters for pages in vmap()/vunmap(), Mickaël Salaün, 2023/11/12
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Mickaël Salaün, 2023/11/12
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Peter Zijlstra, 2023/11/13
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Madhavan T. Venkataraman, 2023/11/27
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching,
Peter Zijlstra <=
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Madhavan T. Venkataraman, 2023/11/29
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Peter Zijlstra, 2023/11/30
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching, Edgecombe, Rick P, 2023/11/30
[RFC PATCH v2 18/19] heki: x86: Protect guest kernel memory using the KVM hypervisor, Mickaël Salaün, 2023/11/12
[RFC PATCH v2 16/19] heki: x86: Update permissions counters when guest page permissions change, Mickaël Salaün, 2023/11/12
[RFC PATCH v2 19/19] virt: Add Heki KUnit tests, Mickaël Salaün, 2023/11/12