Received: by 10.223.176.46 with SMTP id f43csp2316045wra; Thu, 25 Jan 2018 08:04:58 -0800 (PST) X-Google-Smtp-Source: AH8x227MQ6g+6pH97cnXPpeSXoWWVCUVb/GI0icpDFAquWoiytW/B6qqbg1eaPb+J3pPuvc3mYpG X-Received: by 2002:a17:902:6e88:: with SMTP id v8-v6mr11868639plk.374.1516896298614; Thu, 25 Jan 2018 08:04:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516896298; cv=none; d=google.com; s=arc-20160816; b=SxilyQ38Ewr1vDtCVTnKd9oQfIqRXqwaLoqOSiPcviO0B0dG7xeWyGkF54djqqQWv2 C//9RMQNso+j99gWHDYnYweO6KwDt+UHGR+YRhmBMFKWQEIACNZbcxhKeneeKxljq44a eHVO8/oBhtdayEZ3FXyU3fVu2MEXC8kvatAzLrNxFP8rhZxwpSgTQuP26gI9yg/VAY3p lKxqPIj16xtr3k9heCi+XW6Q6FmHQY8jHCwP/IOjBeRxeFRYM5Yh8jzmk1abHSeWMDnr 2FlER2oQRKOaWvaweyQibGZCKjkrG5MEgU4RQ2x448pXZW8LRxjquGGT5l1rK1ImZ51U hP3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=mO5SPQZ+BzZyBeNUPkcA4VHbJsdWtx5/Jg/yQp+gXFw=; b=gdjeKZUqPdTJgT5nsx5awP+c8OYN3gIm9VyxZ1qk5MG0ZuO4/E6SilbFiaw1sGE8+G ckaodu9lLqn1mrVgvA6twx9/gWLdTSTJHQX9AZRIxNfIW8FJD8sjLBdKXbH7mYKFNsHf olo/GwY7N+xugaEWAwOjcu8tI/CP41U3Bmio/o+SpgNpUB3jqanmeXlzo8XabLrMOZvT fSoYteVHRDpKTNjBDsQ1T50WLL52OolvqPqyOiL+5uKhWEw8BtKiGWg88zlc/0zBiLFR bRaMwzJhsYTJWyprwEm2ilkux/zaPjDyJ3glZOK3+RI+aTa7YRLKPrxv0UpfzY+HUkx7 MJyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g124si1705441pgc.114.2018.01.25.08.04.44; Thu, 25 Jan 2018 08:04:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751452AbeAYQC7 (ORCPT + 99 others); Thu, 25 Jan 2018 11:02:59 -0500 Received: from mx2.suse.de ([195.135.220.15]:59792 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751347AbeAYQC3 (ORCPT ); Thu, 25 Jan 2018 11:02:29 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 5A437AE1E; Thu, 25 Jan 2018 16:02:28 +0000 (UTC) From: Petr Mladek To: jpoimboe@redhat.com, jikos@kernel.org, mbenes@suse.cz Cc: Jason Baron , jeyu@kernel.org, Evgenii Shatokhin , linux-kernel@vger.kernel.org, live-patching@vger.kernel.org, Petr Mladek Subject: PATCH v6 5/6] livepatch: Support separate list for replaced patches. Date: Thu, 25 Jan 2018 17:02:02 +0100 Message-Id: <20180125160203.28959-6-pmladek@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180125160203.28959-1-pmladek@suse.com> References: <20180125160203.28959-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Baron We are going to add a feature called atomic replace. It will allow to create a patch that would replace all already registered patches. The replaced patches will stay registered because they are typically unregistered by some package uninstall scripts. But we will remove these patches from @klp_patches list to keep the enabled patch on the bottom of the stack. Otherwise, we would need to implement rather complex logic for moving the patches on the stack. Also it would complicate implementation of the atomic replace feature. It is not worth it. As a result, we will have patches that are registered but that are not longer usable. Let's get prepared for this and use a better descriptive name for klp_is_patch_registered() function. Also create separate list for the replaced patches and allow to unregister them. Alternative solution would be to add a flag into struct klp_patch. Note that patch->kobj.state_initialized is not safe because it can be cleared outside klp_mutex. This patch does not change the existing behavior. Signed-off-by: Jason Baron [pmladek@suse.com: Split and renamed klp_is_patch_usable()] Signed-off-by: Petr Mladek Cc: Josh Poimboeuf Cc: Jessica Yu Cc: Jiri Kosina Cc: Miroslav Benes --- kernel/livepatch/core.c | 30 ++++++++++++++++++++++++------ 1 file changed, 24 insertions(+), 6 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index 407bbc714ced..6ad3195d995a 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -47,6 +47,13 @@ DEFINE_MUTEX(klp_mutex); static LIST_HEAD(klp_patches); +/* + * List of 'replaced' patches that have been replaced by a patch that has the + * 'replace' bit set. When they are added to this list, they are disabled and + * can not be re-enabled, but they can be unregistered(). + */ +LIST_HEAD(klp_replaced_patches); + static struct kobject *klp_root_kobj; static void klp_init_func_list(struct klp_object *obj, struct klp_func *func) @@ -108,17 +115,28 @@ static void klp_find_object_module(struct klp_object *obj) mutex_unlock(&module_mutex); } -static bool klp_is_patch_registered(struct klp_patch *patch) +static bool klp_is_patch_in_list(struct klp_patch *patch, + struct list_head *head) { struct klp_patch *mypatch; - list_for_each_entry(mypatch, &klp_patches, list) + list_for_each_entry(mypatch, head, list) if (mypatch == patch) return true; return false; } +static bool klp_is_patch_usable(struct klp_patch *patch) +{ + return klp_is_patch_in_list(patch, &klp_patches); +} + +static bool klp_is_patch_replaced(struct klp_patch *patch) +{ + return klp_is_patch_in_list(patch, &klp_replaced_patches); +} + static bool klp_initialized(void) { return !!klp_root_kobj; @@ -375,7 +393,7 @@ int klp_disable_patch(struct klp_patch *patch) mutex_lock(&klp_mutex); - if (!klp_is_patch_registered(patch)) { + if (!klp_is_patch_usable(patch)) { ret = -EINVAL; goto err; } @@ -475,7 +493,7 @@ int klp_enable_patch(struct klp_patch *patch) mutex_lock(&klp_mutex); - if (!klp_is_patch_registered(patch)) { + if (!klp_is_patch_usable(patch)) { ret = -EINVAL; goto err; } @@ -516,7 +534,7 @@ static ssize_t enabled_store(struct kobject *kobj, struct kobj_attribute *attr, mutex_lock(&klp_mutex); - if (!klp_is_patch_registered(patch)) { + if (!klp_is_patch_usable(patch)) { /* * Module with the patch could either disappear meanwhile or is * not properly initialized yet. @@ -971,7 +989,7 @@ int klp_unregister_patch(struct klp_patch *patch) mutex_lock(&klp_mutex); - if (!klp_is_patch_registered(patch)) { + if (!klp_is_patch_usable(patch) && !klp_is_patch_replaced(patch)) { ret = -EINVAL; goto err; } -- 2.13.6