module-elf-format.txt 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. ===========================
  2. Livepatch module Elf format
  3. ===========================
  4. This document outlines the Elf format requirements that livepatch modules must follow.
  5. -----------------
  6. Table of Contents
  7. -----------------
  8. 0. Background and motivation
  9. 1. Livepatch modinfo field
  10. 2. Livepatch relocation sections
  11. 2.1 What are livepatch relocation sections?
  12. 2.2 Livepatch relocation section format
  13. 2.2.1 Required flags
  14. 2.2.2 Required name format
  15. 2.2.3 Example livepatch relocation section names
  16. 2.2.4 Example `readelf --sections` output
  17. 2.2.5 Example `readelf --relocs` output
  18. 3. Livepatch symbols
  19. 3.1 What are livepatch symbols?
  20. 3.2 A livepatch module's symbol table
  21. 3.3 Livepatch symbol format
  22. 3.3.1 Required flags
  23. 3.3.2 Required name format
  24. 3.3.3 Example livepatch symbol names
  25. 3.3.4 Example `readelf --symbols` output
  26. 4. Architecture-specific sections
  27. 5. Symbol table and Elf section access
  28. ----------------------------
  29. 0. Background and motivation
  30. ----------------------------
  31. Formerly, livepatch required separate architecture-specific code to write
  32. relocations. However, arch-specific code to write relocations already
  33. exists in the module loader, so this former approach produced redundant
  34. code. So, instead of duplicating code and re-implementing what the module
  35. loader can already do, livepatch leverages existing code in the module
  36. loader to perform the all the arch-specific relocation work. Specifically,
  37. livepatch reuses the apply_relocate_add() function in the module loader to
  38. write relocations. The patch module Elf format described in this document
  39. enables livepatch to be able to do this. The hope is that this will make
  40. livepatch more easily portable to other architectures and reduce the amount
  41. of arch-specific code required to port livepatch to a particular
  42. architecture.
  43. Since apply_relocate_add() requires access to a module's section header
  44. table, symbol table, and relocation section indices, Elf information is
  45. preserved for livepatch modules (see section 5). Livepatch manages its own
  46. relocation sections and symbols, which are described in this document. The
  47. Elf constants used to mark livepatch symbols and relocation sections were
  48. selected from OS-specific ranges according to the definitions from glibc.
  49. 0.1 Why does livepatch need to write its own relocations?
  50. ---------------------------------------------------------
  51. A typical livepatch module contains patched versions of functions that can
  52. reference non-exported global symbols and non-included local symbols.
  53. Relocations referencing these types of symbols cannot be left in as-is
  54. since the kernel module loader cannot resolve them and will therefore
  55. reject the livepatch module. Furthermore, we cannot apply relocations that
  56. affect modules not yet loaded at patch module load time (e.g. a patch to a
  57. driver that is not loaded). Formerly, livepatch solved this problem by
  58. embedding special "dynrela" (dynamic rela) sections in the resulting patch
  59. module Elf output. Using these dynrela sections, livepatch could resolve
  60. symbols while taking into account its scope and what module the symbol
  61. belongs to, and then manually apply the dynamic relocations. However this
  62. approach required livepatch to supply arch-specific code in order to write
  63. these relocations. In the new format, livepatch manages its own SHT_RELA
  64. relocation sections in place of dynrela sections, and the symbols that the
  65. relas reference are special livepatch symbols (see section 2 and 3). The
  66. arch-specific livepatch relocation code is replaced by a call to
  67. apply_relocate_add().
  68. ================================
  69. PATCH MODULE FORMAT REQUIREMENTS
  70. ================================
  71. --------------------------
  72. 1. Livepatch modinfo field
  73. --------------------------
  74. Livepatch modules are required to have the "livepatch" modinfo attribute.
  75. See the sample livepatch module in samples/livepatch/ for how this is done.
  76. Livepatch modules can be identified by users by using the 'modinfo' command
  77. and looking for the presence of the "livepatch" field. This field is also
  78. used by the kernel module loader to identify livepatch modules.
  79. Example modinfo output:
  80. -----------------------
  81. % modinfo livepatch-meminfo.ko
  82. filename: livepatch-meminfo.ko
  83. livepatch: Y
  84. license: GPL
  85. depends:
  86. vermagic: 4.3.0+ SMP mod_unload
  87. --------------------------------
  88. 2. Livepatch relocation sections
  89. --------------------------------
  90. -------------------------------------------
  91. 2.1 What are livepatch relocation sections?
  92. -------------------------------------------
  93. A livepatch module manages its own Elf relocation sections to apply
  94. relocations to modules as well as to the kernel (vmlinux) at the
  95. appropriate time. For example, if a patch module patches a driver that is
  96. not currently loaded, livepatch will apply the corresponding livepatch
  97. relocation section(s) to the driver once it loads.
  98. Each "object" (e.g. vmlinux, or a module) within a patch module may have
  99. multiple livepatch relocation sections associated with it (e.g. patches to
  100. multiple functions within the same object). There is a 1-1 correspondence
  101. between a livepatch relocation section and the target section (usually the
  102. text section of a function) to which the relocation(s) apply. It is
  103. also possible for a livepatch module to have no livepatch relocation
  104. sections, as in the case of the sample livepatch module (see
  105. samples/livepatch).
  106. Since Elf information is preserved for livepatch modules (see Section 5), a
  107. livepatch relocation section can be applied simply by passing in the
  108. appropriate section index to apply_relocate_add(), which then uses it to
  109. access the relocation section and apply the relocations.
  110. Every symbol referenced by a rela in a livepatch relocation section is a
  111. livepatch symbol. These must be resolved before livepatch can call
  112. apply_relocate_add(). See Section 3 for more information.
  113. ---------------------------------------
  114. 2.2 Livepatch relocation section format
  115. ---------------------------------------
  116. 2.2.1 Required flags
  117. --------------------
  118. Livepatch relocation sections must be marked with the SHF_RELA_LIVEPATCH
  119. section flag. See include/uapi/linux/elf.h for the definition. The module
  120. loader recognizes this flag and will avoid applying those relocation sections
  121. at patch module load time. These sections must also be marked with SHF_ALLOC,
  122. so that the module loader doesn't discard them on module load (i.e. they will
  123. be copied into memory along with the other SHF_ALLOC sections).
  124. 2.2.2 Required name format
  125. --------------------------
  126. The name of a livepatch relocation section must conform to the following format:
  127. .klp.rela.objname.section_name
  128. ^ ^^ ^ ^ ^
  129. |________||_____| |__________|
  130. [A] [B] [C]
  131. [A] The relocation section name is prefixed with the string ".klp.rela."
  132. [B] The name of the object (i.e. "vmlinux" or name of module) to
  133. which the relocation section belongs follows immediately after the prefix.
  134. [C] The actual name of the section to which this relocation section applies.
  135. 2.2.3 Example livepatch relocation section names:
  136. -------------------------------------------------
  137. .klp.rela.ext4.text.ext4_attr_store
  138. .klp.rela.vmlinux.text.cmdline_proc_show
  139. 2.2.4 Example `readelf --sections` output for a patch
  140. module that patches vmlinux and modules 9p, btrfs, ext4:
  141. --------------------------------------------------------
  142. Section Headers:
  143. [Nr] Name Type Address Off Size ES Flg Lk Inf Al
  144. [ snip ]
  145. [29] .klp.rela.9p.text.caches.show RELA 0000000000000000 002d58 0000c0 18 AIo 64 9 8
  146. [30] .klp.rela.btrfs.text.btrfs.feature.attr.show RELA 0000000000000000 002e18 000060 18 AIo 64 11 8
  147. [ snip ]
  148. [34] .klp.rela.ext4.text.ext4.attr.store RELA 0000000000000000 002fd8 0000d8 18 AIo 64 13 8
  149. [35] .klp.rela.ext4.text.ext4.attr.show RELA 0000000000000000 0030b0 000150 18 AIo 64 15 8
  150. [36] .klp.rela.vmlinux.text.cmdline.proc.show RELA 0000000000000000 003200 000018 18 AIo 64 17 8
  151. [37] .klp.rela.vmlinux.text.meminfo.proc.show RELA 0000000000000000 003218 0000f0 18 AIo 64 19 8
  152. [ snip ] ^ ^
  153. | |
  154. [*] [*]
  155. [*] Livepatch relocation sections are SHT_RELA sections but with a few special
  156. characteristics. Notice that they are marked SHF_ALLOC ("A") so that they will
  157. not be discarded when the module is loaded into memory, as well as with the
  158. SHF_RELA_LIVEPATCH flag ("o" - for OS-specific).
  159. 2.2.5 Example `readelf --relocs` output for a patch module:
  160. -----------------------------------------------------------
  161. Relocation section '.klp.rela.btrfs.text.btrfs_feature_attr_show' at offset 0x2ba0 contains 4 entries:
  162. Offset Info Type Symbol's Value Symbol's Name + Addend
  163. 000000000000001f 0000005e00000002 R_X86_64_PC32 0000000000000000 .klp.sym.vmlinux.printk,0 - 4
  164. 0000000000000028 0000003d0000000b R_X86_64_32S 0000000000000000 .klp.sym.btrfs.btrfs_ktype,0 + 0
  165. 0000000000000036 0000003b00000002 R_X86_64_PC32 0000000000000000 .klp.sym.btrfs.can_modify_feature.isra.3,0 - 4
  166. 000000000000004c 0000004900000002 R_X86_64_PC32 0000000000000000 .klp.sym.vmlinux.snprintf,0 - 4
  167. [ snip ] ^
  168. |
  169. [*]
  170. [*] Every symbol referenced by a relocation is a livepatch symbol.
  171. --------------------
  172. 3. Livepatch symbols
  173. --------------------
  174. -------------------------------
  175. 3.1 What are livepatch symbols?
  176. -------------------------------
  177. Livepatch symbols are symbols referred to by livepatch relocation sections.
  178. These are symbols accessed from new versions of functions for patched
  179. objects, whose addresses cannot be resolved by the module loader (because
  180. they are local or unexported global syms). Since the module loader only
  181. resolves exported syms, and not every symbol referenced by the new patched
  182. functions is exported, livepatch symbols were introduced. They are used
  183. also in cases where we cannot immediately know the address of a symbol when
  184. a patch module loads. For example, this is the case when livepatch patches
  185. a module that is not loaded yet. In this case, the relevant livepatch
  186. symbols are resolved simply when the target module loads. In any case, for
  187. any livepatch relocation section, all livepatch symbols referenced by that
  188. section must be resolved before livepatch can call apply_relocate_add() for
  189. that reloc section.
  190. Livepatch symbols must be marked with SHN_LIVEPATCH so that the module
  191. loader can identify and ignore them. Livepatch modules keep these symbols
  192. in their symbol tables, and the symbol table is made accessible through
  193. module->symtab.
  194. -------------------------------------
  195. 3.2 A livepatch module's symbol table
  196. -------------------------------------
  197. Normally, a stripped down copy of a module's symbol table (containing only
  198. "core" symbols) is made available through module->symtab (See layout_symtab()
  199. in kernel/module.c). For livepatch modules, the symbol table copied into memory
  200. on module load must be exactly the same as the symbol table produced when the
  201. patch module was compiled. This is because the relocations in each livepatch
  202. relocation section refer to their respective symbols with their symbol indices,
  203. and the original symbol indices (and thus the symtab ordering) must be
  204. preserved in order for apply_relocate_add() to find the right symbol.
  205. For example, take this particular rela from a livepatch module:
  206. Relocation section '.klp.rela.btrfs.text.btrfs_feature_attr_show' at offset 0x2ba0 contains 4 entries:
  207. Offset Info Type Symbol's Value Symbol's Name + Addend
  208. 000000000000001f 0000005e00000002 R_X86_64_PC32 0000000000000000 .klp.sym.vmlinux.printk,0 - 4
  209. This rela refers to the symbol '.klp.sym.vmlinux.printk,0', and the symbol index is encoded
  210. in 'Info'. Here its symbol index is 0x5e, which is 94 in decimal, which refers to the
  211. symbol index 94.
  212. And in this patch module's corresponding symbol table, symbol index 94 refers to that very symbol:
  213. [ snip ]
  214. 94: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.printk,0
  215. [ snip ]
  216. ---------------------------
  217. 3.3 Livepatch symbol format
  218. ---------------------------
  219. 3.3.1 Required flags
  220. --------------------
  221. Livepatch symbols must have their section index marked as SHN_LIVEPATCH, so
  222. that the module loader can identify them and not attempt to resolve them.
  223. See include/uapi/linux/elf.h for the actual definitions.
  224. 3.3.2 Required name format
  225. --------------------------
  226. Livepatch symbol names must conform to the following format:
  227. .klp.sym.objname.symbol_name,sympos
  228. ^ ^^ ^ ^ ^ ^
  229. |_______||_____| |_________| |
  230. [A] [B] [C] [D]
  231. [A] The symbol name is prefixed with the string ".klp.sym."
  232. [B] The name of the object (i.e. "vmlinux" or name of module) to
  233. which the symbol belongs follows immediately after the prefix.
  234. [C] The actual name of the symbol.
  235. [D] The position of the symbol in the object (as according to kallsyms)
  236. This is used to differentiate duplicate symbols within the same
  237. object. The symbol position is expressed numerically (0, 1, 2...).
  238. The symbol position of a unique symbol is 0.
  239. 3.3.3 Example livepatch symbol names:
  240. -------------------------------------
  241. .klp.sym.vmlinux.snprintf,0
  242. .klp.sym.vmlinux.printk,0
  243. .klp.sym.btrfs.btrfs_ktype,0
  244. 3.3.4 Example `readelf --symbols` output for a patch module:
  245. ------------------------------------------------------------
  246. Symbol table '.symtab' contains 127 entries:
  247. Num: Value Size Type Bind Vis Ndx Name
  248. [ snip ]
  249. 73: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.snprintf,0
  250. 74: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.capable,0
  251. 75: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.find_next_bit,0
  252. 76: 0000000000000000 0 NOTYPE GLOBAL DEFAULT OS [0xff20] .klp.sym.vmlinux.si_swapinfo,0
  253. [ snip ] ^
  254. |
  255. [*]
  256. [*] Note that the 'Ndx' (Section index) for these symbols is SHN_LIVEPATCH (0xff20).
  257. "OS" means OS-specific.
  258. ---------------------------------
  259. 4. Architecture-specific sections
  260. ---------------------------------
  261. Architectures may override arch_klp_init_object_loaded() to perform
  262. additional arch-specific tasks when a target module loads, such as applying
  263. arch-specific sections. On x86 for example, we must apply per-object
  264. .altinstructions and .parainstructions sections when a target module loads.
  265. These sections must be prefixed with ".klp.arch.$objname." so that they can
  266. be easily identified when iterating through a patch module's Elf sections
  267. (See arch/x86/kernel/livepatch.c for a complete example).
  268. --------------------------------------
  269. 5. Symbol table and Elf section access
  270. --------------------------------------
  271. A livepatch module's symbol table is accessible through module->symtab.
  272. Since apply_relocate_add() requires access to a module's section headers,
  273. symbol table, and relocation section indices, Elf information is preserved for
  274. livepatch modules and is made accessible by the module loader through
  275. module->klp_info, which is a klp_modinfo struct. When a livepatch module loads,
  276. this struct is filled in by the module loader. Its fields are documented below:
  277. struct klp_modinfo {
  278. Elf_Ehdr hdr; /* Elf header */
  279. Elf_Shdr *sechdrs; /* Section header table */
  280. char *secstrings; /* String table for the section headers */
  281. unsigned int symndx; /* The symbol table section index */
  282. };