Received: by 10.223.185.116 with SMTP id b49csp710107wrg; Wed, 21 Feb 2018 05:47:01 -0800 (PST) X-Google-Smtp-Source: AH8x225IGFRot6PhgdP8KbquTN1mnFmt5g5/Ad9O1S2pW3gLnYkUiDjPeqNk0TSQli4+i6JO0g7T X-Received: by 10.99.171.70 with SMTP id k6mr2839295pgp.355.1519220821855; Wed, 21 Feb 2018 05:47:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519220821; cv=none; d=google.com; s=arc-20160816; b=sRhZkeV2/BggfZhpfRpB8CdSJtlfWM/Ta7Z9F/ipxzfHJ7n9S98tDkUEZPVU4zs8u3 4I+hCCaebj9xJNq9DnaCR+N28z4OvbZ28BdVX11xCF0QvoyVFKgt/+47hOyBjzKFpzru 40wrbu2UGwcAO2POmajliIgF864gw/Tq9mcwqyBJD52MHQUUe9dzWxN+8igWYDNRvQSb ErMKuTBMCsexV4NM5xVv/w5ZiBhx0/pZsgsoRKMl7B1tS/ZJ5qJIlNvyKvACk+AkVjPT yUyI4Ll4h01qsb1N+2/YyABiVHFoCaQtmEYh2IrAGFz7kEOHokhltuKaCv5BV9QDvkAv 6G2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=neEJdL9vHzJ/Dx2afrVxL6ASr5Ed1fRbN28Xb2Am0PA=; b=XNdJReBKA6M5BLX839tVBIC+9/OD0G7/m5AEnEYhigbBMymzVshegVGURLlY7DT4qT 9DAYJeoD+a0jHIgsCwiC3eZzaZm+7LD01ThK5NDYL86LcXrcqyEHz2hX8N9jy20nhaO6 +tFLJx2SGTQk3meu+nLWgbKENVwF7fnBeRSz+klW1PC3AnEhDd+5iWydduD44t62DhXR jgi98zrBNBfM/i1RROkhlk5DPwcMSgsU07EcaEkTPCtt1YfzMnYXFwmmcvDE6X+ZZJlt uqz1BhZJ3+Pr96XxWWxbYZ0NO/iVSvt9IkDEhCEtGXLLaRH6nZqI08Quoy4NzE0zKQai XIfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s187si1535941pgc.47.2018.02.21.05.46.47; Wed, 21 Feb 2018 05:47:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936860AbeBUNbB (ORCPT + 99 others); Wed, 21 Feb 2018 08:31:01 -0500 Received: from mx2.suse.de ([195.135.220.15]:49091 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934892AbeBUN3p (ORCPT ); Wed, 21 Feb 2018 08:29:45 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 5F097AC79; Wed, 21 Feb 2018 13:29:44 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Jason Baron , Joe Lawrence , Jessica Yu , Evgenii Shatokhin , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH v8 4/8] livepatch: Allow to unpatch only functions of the given type Date: Wed, 21 Feb 2018 14:29:10 +0100 Message-Id: <20180221132914.4809-5-pmladek@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180221132914.4809-1-pmladek@suse.com> References: <20180221132914.4809-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Baron We are going to add a feature called atomic replace. It will allow to create a patch that would replace all already registered patches. For this, we will need to dynamically create funcs and objects for functions that are no longer patched. The dynamically allocated objects will not longer be needed once the patch is applied. This patch allows to unpatch functions of the given type. It might cause that the obj->patched flag is true even when some listed functions are not longer patched. This is fine as long as the unpatched funcs' structures are removed right after. It will be the case. Anyway, it is safe. In the worst case, it will not be possible to enable the disabled functions. Signed-off-by: Jason Baron [pmladek@suse.com: Split and modified to use the generic ftype] Signed-off-by: Petr Mladek Cc: Josh Poimboeuf Cc: Jessica Yu Cc: Jiri Kosina Cc: Miroslav Benes --- kernel/livepatch/core.c | 2 +- kernel/livepatch/patch.c | 26 +++++++++++++++++++------- kernel/livepatch/patch.h | 4 ++-- kernel/livepatch/transition.c | 2 +- 4 files changed, 23 insertions(+), 11 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index a47c26147c17..ab1f6a371fc8 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -1060,7 +1060,7 @@ static void klp_cleanup_module_patches_limited(struct module *mod, pr_notice("reverting patch '%s' on unloading module '%s'\n", patch->mod->name, obj->mod->name); - klp_unpatch_object(obj); + klp_unpatch_object(obj, KLP_FUNC_ANY); klp_post_unpatch_callback(obj); } diff --git a/kernel/livepatch/patch.c b/kernel/livepatch/patch.c index 82d584225dc6..54b3c379bb0f 100644 --- a/kernel/livepatch/patch.c +++ b/kernel/livepatch/patch.c @@ -236,15 +236,27 @@ static int klp_patch_func(struct klp_func *func) return ret; } -void klp_unpatch_object(struct klp_object *obj) +/* + * It keeps obj->patched flag true when any listed function is still patched. + * The caller is responsible for removing the unpatched functions to + * make the flag clean again. + */ +void klp_unpatch_object(struct klp_object *obj, enum klp_func_type ftype) { struct klp_func *func; + bool patched = false; - klp_for_each_func(obj, func) - if (func->patched) + klp_for_each_func(obj, func) { + if (!func->patched) + continue; + + if (klp_is_func_type(func, ftype)) klp_unpatch_func(func); + else + patched = true; + } - obj->patched = false; + obj->patched = patched; } int klp_patch_object(struct klp_object *obj) @@ -258,7 +270,7 @@ int klp_patch_object(struct klp_object *obj) klp_for_each_func(obj, func) { ret = klp_patch_func(func); if (ret) { - klp_unpatch_object(obj); + klp_unpatch_object(obj, KLP_FUNC_ANY); return ret; } } @@ -267,11 +279,11 @@ int klp_patch_object(struct klp_object *obj) return 0; } -void klp_unpatch_objects(struct klp_patch *patch) +void klp_unpatch_objects(struct klp_patch *patch, enum klp_func_type ftype) { struct klp_object *obj; klp_for_each_object(patch, obj) if (obj->patched) - klp_unpatch_object(obj); + klp_unpatch_object(obj, ftype); } diff --git a/kernel/livepatch/patch.h b/kernel/livepatch/patch.h index e72d8250d04b..885f644add4c 100644 --- a/kernel/livepatch/patch.h +++ b/kernel/livepatch/patch.h @@ -28,7 +28,7 @@ struct klp_ops { struct klp_ops *klp_find_ops(unsigned long old_addr); int klp_patch_object(struct klp_object *obj); -void klp_unpatch_object(struct klp_object *obj); -void klp_unpatch_objects(struct klp_patch *patch); +void klp_unpatch_object(struct klp_object *obj, enum klp_func_type ftype); +void klp_unpatch_objects(struct klp_patch *patch, enum klp_func_type ftype); #endif /* _LIVEPATCH_PATCH_H */ diff --git a/kernel/livepatch/transition.c b/kernel/livepatch/transition.c index 7c6631e693bc..6917100fbe79 100644 --- a/kernel/livepatch/transition.c +++ b/kernel/livepatch/transition.c @@ -92,7 +92,7 @@ static void klp_complete_transition(void) * All tasks have transitioned to KLP_UNPATCHED so we can now * remove the new functions from the func_stack. */ - klp_unpatch_objects(klp_transition_patch); + klp_unpatch_objects(klp_transition_patch, KLP_FUNC_ANY); /* * Make sure klp_ftrace_handler() can no longer see functions -- 2.13.6