plugins: Add patcher plugin and test

This patch adds a plugin that exercises the virtual and hardware memory
read-write API functions added in a previous patch. The plugin takes a
target and patch byte sequence, and will overwrite any instruction
matching the target byte sequence with the patch.

Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
Signed-off-by: Rowan Hart <rowanbhart@gmail.com>
Message-ID: <20250624175351.440780-8-rowanbhart@gmail.com>
[AJB: tweak Makefile, use uintptr_t for pointer stuffing]
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-ID: <20250627112512.1880708-12-alex.bennee@linaro.org>
This commit is contained in:
Rowan Hart 2025-06-27 12:25:07 +01:00 committed by Alex Bennée
parent 5ea2abf07c
commit 71d3379438
6 changed files with 328 additions and 2 deletions

View file

@ -151,7 +151,12 @@ ifeq ($(CONFIG_PLUGIN),y)
PLUGIN_SRC=$(SRC_PATH)/tests/tcg/plugins
PLUGIN_LIB=../plugins
VPATH+=$(PLUGIN_LIB)
PLUGINS=$(patsubst %.c, lib%.so, $(notdir $(wildcard $(PLUGIN_SRC)/*.c)))
# Some plugins need to be disabled for all tests to avoid exponential explosion.
# For example, libpatch.so only needs to run against the arch-specific patch
# target test, so we explicitly run it in the arch-specific Makefile.
DISABLE_PLUGINS=libpatch.so
PLUGINS=$(filter-out $(DISABLE_PLUGINS), \
$(patsubst %.c, lib%.so, $(notdir $(wildcard $(PLUGIN_SRC)/*.c))))
# We need to ensure expand the run-plugin-TEST-with-PLUGIN
# pre-requistes manually here as we can't use stems to handle it. We

View file

@ -1,6 +1,6 @@
t = []
if get_option('plugins')
foreach i : ['bb', 'empty', 'inline', 'insn', 'mem', 'reset', 'syscall']
foreach i : ['bb', 'empty', 'inline', 'insn', 'mem', 'reset', 'syscall', 'patch']
if host_os == 'windows'
t += shared_module(i, files(i + '.c') + '../../../contrib/plugins/win32_linker.c',
include_directories: '../../../include/qemu',

251
tests/tcg/plugins/patch.c Normal file
View file

@ -0,0 +1,251 @@
/*
* SPDX-License-Identifier: GPL-2.0-or-later
*
* This plugin patches instructions matching a pattern to a different
* instruction as they execute
*
*/
#include "glib.h"
#include "glibconfig.h"
#include <qemu-plugin.h>
#include <string.h>
#include <stdio.h>
QEMU_PLUGIN_EXPORT int qemu_plugin_version = QEMU_PLUGIN_VERSION;
static bool use_hwaddr;
static GByteArray *target_data;
static GByteArray *patch_data;
/**
* Parse a string of hexadecimal digits into a GByteArray. The string must be
* even length
*/
static GByteArray *str_to_bytes(const char *str)
{
size_t len = strlen(str);
if (len == 0 || len % 2 != 0) {
return NULL;
}
GByteArray *bytes = g_byte_array_new();
char byte[3] = {0};
guint8 value = 0;
for (size_t i = 0; i < len; i += 2) {
byte[0] = str[i];
byte[1] = str[i + 1];
value = (guint8)g_ascii_strtoull(byte, NULL, 16);
g_byte_array_append(bytes, &value, 1);
}
return bytes;
}
static void patch_hwaddr(unsigned int vcpu_index, void *userdata)
{
uintptr_t addr = (uintptr_t) userdata;
g_autoptr(GString) str = g_string_new(NULL);
g_string_printf(str, "patching: @0x%"
PRIxPTR "\n",
addr);
qemu_plugin_outs(str->str);
enum qemu_plugin_hwaddr_operation_result result =
qemu_plugin_write_memory_hwaddr(addr, patch_data);
if (result != QEMU_PLUGIN_HWADDR_OPERATION_OK) {
g_autoptr(GString) errmsg = g_string_new(NULL);
g_string_printf(errmsg, "Failed to write memory: %d\n", result);
qemu_plugin_outs(errmsg->str);
return;
}
GByteArray *read_data = g_byte_array_new();
result = qemu_plugin_read_memory_hwaddr(addr, read_data,
patch_data->len);
qemu_plugin_outs("Reading memory...\n");
if (result != QEMU_PLUGIN_HWADDR_OPERATION_OK) {
g_autoptr(GString) errmsg = g_string_new(NULL);
g_string_printf(errmsg, "Failed to read memory: %d\n", result);
qemu_plugin_outs(errmsg->str);
return;
}
if (memcmp(patch_data->data, read_data->data, patch_data->len) != 0) {
qemu_plugin_outs("Failed to read back written data\n");
}
qemu_plugin_outs("Success!\n");
return;
}
static void patch_vaddr(unsigned int vcpu_index, void *userdata)
{
uintptr_t addr = (uintptr_t) userdata;
uint64_t hwaddr = 0;
if (!qemu_plugin_translate_vaddr(addr, &hwaddr)) {
qemu_plugin_outs("Failed to translate vaddr\n");
return;
}
g_autoptr(GString) str = g_string_new(NULL);
g_string_printf(str, "patching: @0x%"
PRIxPTR " hw: @0x%" PRIx64 "\n",
addr, hwaddr);
qemu_plugin_outs(str->str);
qemu_plugin_outs("Writing memory (vaddr)...\n");
if (!qemu_plugin_write_memory_vaddr(addr, patch_data)) {
qemu_plugin_outs("Failed to write memory\n");
return;
}
qemu_plugin_outs("Reading memory (vaddr)...\n");
g_autoptr(GByteArray) read_data = g_byte_array_new();
if (!qemu_plugin_read_memory_vaddr(addr, read_data, patch_data->len)) {
qemu_plugin_outs("Failed to read memory\n");
return;
}
if (memcmp(patch_data->data, read_data->data, patch_data->len) != 0) {
qemu_plugin_outs("Failed to read back written data\n");
}
qemu_plugin_outs("Success!\n");
return;
}
/*
* Callback on translation of a translation block.
*/
static void vcpu_tb_trans_cb(qemu_plugin_id_t id, struct qemu_plugin_tb *tb)
{
g_autoptr(GByteArray) insn_data = g_byte_array_new();
uintptr_t addr = 0;
for (size_t i = 0; i < qemu_plugin_tb_n_insns(tb); i++) {
struct qemu_plugin_insn *insn = qemu_plugin_tb_get_insn(tb, i);
uint64_t vaddr = qemu_plugin_insn_vaddr(insn);
if (use_hwaddr) {
uint64_t hwaddr = 0;
if (!qemu_plugin_translate_vaddr(vaddr, &hwaddr)) {
qemu_plugin_outs("Failed to translate vaddr\n");
continue;
}
/*
* As we cannot emulate 64 bit systems on 32 bit hosts we
* should never see the top bits set, hence we can safely
* cast to uintptr_t.
*/
g_assert(hwaddr <= UINTPTR_MAX);
addr = (uintptr_t) hwaddr;
} else {
g_assert(vaddr <= UINTPTR_MAX);
addr = (uintptr_t) vaddr;
}
g_byte_array_set_size(insn_data, qemu_plugin_insn_size(insn));
qemu_plugin_insn_data(insn, insn_data->data, insn_data->len);
if (insn_data->len >= target_data->len &&
!memcmp(insn_data->data, target_data->data,
MIN(target_data->len, insn_data->len))) {
if (use_hwaddr) {
qemu_plugin_register_vcpu_tb_exec_cb(tb, patch_hwaddr,
QEMU_PLUGIN_CB_NO_REGS,
(void *) addr);
} else {
qemu_plugin_register_vcpu_tb_exec_cb(tb, patch_vaddr,
QEMU_PLUGIN_CB_NO_REGS,
(void *) addr);
}
}
}
}
static void usage(void)
{
fprintf(stderr, "Usage: <lib>,target=<bytes>,patch=<new_bytes>"
"[,use_hwaddr=true|false]");
}
/*
* Called when the plugin is installed
*/
QEMU_PLUGIN_EXPORT int qemu_plugin_install(qemu_plugin_id_t id,
const qemu_info_t *info, int argc,
char **argv)
{
use_hwaddr = true;
target_data = NULL;
patch_data = NULL;
if (argc > 4) {
usage();
return -1;
}
for (size_t i = 0; i < argc; i++) {
char *opt = argv[i];
g_auto(GStrv) tokens = g_strsplit(opt, "=", 2);
if (g_strcmp0(tokens[0], "use_hwaddr") == 0) {
if (!qemu_plugin_bool_parse(tokens[0], tokens[1], &use_hwaddr)) {
fprintf(stderr,
"Failed to parse boolean argument use_hwaddr\n");
return -1;
}
} else if (g_strcmp0(tokens[0], "target") == 0) {
target_data = str_to_bytes(tokens[1]);
if (!target_data) {
fprintf(stderr,
"Failed to parse target bytes.\n");
return -1;
}
} else if (g_strcmp0(tokens[0], "patch") == 0) {
patch_data = str_to_bytes(tokens[1]);
if (!patch_data) {
fprintf(stderr, "Failed to parse patch bytes.\n");
return -1;
}
} else {
fprintf(stderr, "Unknown argument: %s\n", tokens[0]);
usage();
return -1;
}
}
if (!target_data) {
fprintf(stderr, "target argument is required\n");
usage();
return -1;
}
if (!patch_data) {
fprintf(stderr, "patch argument is required\n");
usage();
return -1;
}
if (target_data->len != patch_data->len) {
fprintf(stderr, "Target and patch data must be the same length\n");
return -1;
}
qemu_plugin_register_vcpu_tb_trans_cb(id, vcpu_tb_trans_cb);
return 0;
}

View file

@ -33,3 +33,12 @@ memory: CFLAGS+=-DCHECK_UNALIGNED=1
# Running
QEMU_OPTS+=-device isa-debugcon,chardev=output -device isa-debug-exit,iobase=0xf4,iosize=0x4 -kernel
ifeq ($(CONFIG_PLUGIN),y)
run-plugin-patch-target-with-libpatch.so: \
PLUGIN_ARGS=$(COMMA)target=ffc0$(COMMA)patch=9090$(COMMA)use_hwaddr=true
run-plugin-patch-target-with-libpatch.so: \
CHECK_PLUGIN_OUTPUT_COMMAND=$(X64_SYSTEM_SRC)/validate-patch.py $@.out
run-plugin-patch-target-with-libpatch.so: patch-target libpatch.so
EXTRA_RUNS+=run-plugin-patch-target-with-libpatch.so
endif

View file

@ -0,0 +1,22 @@
/*
* SPDX-License-Identifier: GPL-2.0-or-later
*
* This test target increments a value 100 times. The patcher converts the
* inc instruction to a nop, so it only increments the value once.
*
*/
#include <minilib.h>
int main(void)
{
ml_printf("Running test...\n");
unsigned int x = 0;
for (int i = 0; i < 100; i++) {
asm volatile (
"inc %[x]"
: [x] "+a" (x)
);
}
ml_printf("Value: %d\n", x);
return 0;
}

View file

@ -0,0 +1,39 @@
#!/usr/bin/env python3
#
# validate-patch.py: check the patch applies
#
# This program takes two inputs:
# - the plugin output
# - the binary output
#
# Copyright (C) 2024
#
# SPDX-License-Identifier: GPL-2.0-or-later
import sys
from argparse import ArgumentParser
def main() -> None:
"""
Process the arguments, injest the program and plugin out and
verify they match up and report if they do not.
"""
parser = ArgumentParser(description="Validate patch")
parser.add_argument('test_output',
help="The output from the test itself")
parser.add_argument('plugin_output',
help="The output from plugin")
args = parser.parse_args()
with open(args.test_output, 'r') as f:
test_data = f.read()
with open(args.plugin_output, 'r') as f:
plugin_data = f.read()
if "Value: 1" in test_data:
sys.exit(0)
else:
sys.exit(1)
if __name__ == "__main__":
main()