Received: by 10.223.185.116 with SMTP id b49csp4777676wrg; Wed, 7 Mar 2018 00:23:33 -0800 (PST) X-Google-Smtp-Source: AG47ELuW4JDanZlU3FRxym1nNQu7mZHG9Lp6t6C9xgE8fEph49XSqktcPmN7p1LEh47IyP8XYW+P X-Received: by 2002:a17:902:b691:: with SMTP id c17-v6mr19468304pls.308.1520411013629; Wed, 07 Mar 2018 00:23:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520411013; cv=none; d=google.com; s=arc-20160816; b=dBXpHT/24o3vSRAD3BBCWCXoKJ49/tbkXzYWoD2D2pICEG5pqEeMb4KZrI0Kvc8knn nFFz2pi5i+fMT5mE+bk89/TQRMKY+A77tg7yMXywrqoaekn7xxc6+9dPgiusot4fG9zZ OfIe+4s3ncRM4NViaT37XHCulnp0LYSUwjwnKyJFhDfArQCwhPhzX7gVLAF6b6/48Cpb S1CDb4xQfd1YP1YBvwSK/ofjwupQhp8NMUoAlkvjIF7TmaQcD3q3Xb/crr1Lg2I1RF5g 12IhcVklwbHFSBt9p9GFRI/LRnZFJw3LWdvlW2RCBNAI3AIR/txnQTAgntNttqrBsklE zKFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=kvSoQlGHhvHAforpr6B8xu9bLyUGql54wM9ZZc+zM8s=; b=KL4DsILqOQCY3rNxX96JasYQ29u/H560VPtmiNTJdPViamsVNhOvEaZAvxxpDd6Y5D b3uoFdiNOSL6pJFQ9MVPajJlR0VaXaMqPAeKuJGy+ZkRp4XIOfo8+9E72s+9rGFlH2kc xqiSIsbZTrPktqn0wX2rJ04RqB+7rwA7mJBHSa928YTgGEeTRIhrw1UW18EtcQe2e6wK MJPtsreAXHNuBkpUTUoqvX/30YLU64d0H+rR15tAGMaB2OorvO89UdwIrJj1XFPRm1XZ 0bOyxk2EJ0oGh55ZyGkQCMYgo6xy91PeJlO9MfqODbtLlKe49pA6WFWZFRSgvhDc5E5B JwsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u9si11017830pgp.670.2018.03.07.00.23.19; Wed, 07 Mar 2018 00:23:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933445AbeCGIVQ (ORCPT + 99 others); Wed, 7 Mar 2018 03:21:16 -0500 Received: from mx2.suse.de ([195.135.220.15]:50149 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933270AbeCGIVJ (ORCPT ); Wed, 7 Mar 2018 03:21:09 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 080E6AF91; Wed, 7 Mar 2018 08:21:08 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Jason Baron , Joe Lawrence , Jessica Yu , Evgenii Shatokhin , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH v10 10/10] livepatch: Atomic replace and cumulative patches documentation Date: Wed, 7 Mar 2018 09:20:39 +0100 Message-Id: <20180307082039.10196-11-pmladek@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180307082039.10196-1-pmladek@suse.com> References: <20180307082039.10196-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org User documentation for the atomic replace feature. It makes it easier to maintain livepatches using so-called cumulative patches. Signed-off-by: Petr Mladek Acked-by: Miroslav Benes --- Documentation/livepatch/cumulative-patches.txt | 83 ++++++++++++++++++++++++++ 1 file changed, 83 insertions(+) create mode 100644 Documentation/livepatch/cumulative-patches.txt diff --git a/Documentation/livepatch/cumulative-patches.txt b/Documentation/livepatch/cumulative-patches.txt new file mode 100644 index 000000000000..c041fc1bd259 --- /dev/null +++ b/Documentation/livepatch/cumulative-patches.txt @@ -0,0 +1,83 @@ +=================================== +Atomic Replace & Cumulative Patches +=================================== + +There might be dependencies between livepatches. If multiple patches need +to do different changes to the same function(s) then we need to define +an order in which the patches will be installed. And function implementations +from any newer livepatch must be done on top of the older ones. + +This might become a maintenance nightmare. Especially if anyone would want +to remove a patch that is in the middle of the stack. + +An elegant solution comes with the feature called "Atomic Replace". It allows +to create so called "Cumulative Patches". They include all wanted changes +from all older livepatches and completely replace them in one transition. + +Usage +----- + +The atomic replace can be enabled by setting "replace" flag in struct klp_patch, +for example: + + static struct klp_patch patch = { + .mod = THIS_MODULE, + .objs = objs, + .replace = true, + }; + +Such a patch is added on top of the livepatch stack when registered. It can +be enabled even when some earlier patches have not been enabled yet. + +All processes are then migrated to use the code only from the new patch. +Once the transition is finished, all older patches are removed from the stack +of patches. Even the older not-enabled patches mentioned above. + +Ftrace handlers are transparently removed from functions that are no +longer modified by the new cumulative patch. + +As a result, the livepatch author might maintain sources only for one +cumulative patch. It helps to keep the patch consistent while adding or +removing various fixes or features. + + +Limitations: +------------ + + + Replaced patches can no longer be enabled. But if the transition + to the cumulative patch was not forced, the kernel modules with + the older livepatches can be removed and eventually added again. + + A good practice is to set .replace flag in any released livepatch. + Then re-adding an older livepatch is equivalent to downgrading + to that patch. This is safe as long as the livepatches do _not_ do + extra modifications in (un)patching callbacks or in the module_init() + or module_exit() functions, see below. + + + + Only the (un)patching callbacks from the _new_ cumulative livepatch are + executed. Any callbacks from the replaced patches are ignored. + + By other words, the cumulative patch is responsible for doing any actions + that are necessary to properly replace any older patch. + + As a result, it might be dangerous to replace newer cumulative patches by + older ones. The old livepatches might not provide the necessary callbacks. + + This might be seen as a limitation in some scenarios. But it makes the life + easier in many others. Only the new cumulative livepatch knows what + fixes/features are added/removed and what special actions are necessary + for a smooth transition. + + In each case, it would be a nightmare to think about the order of + the various callbacks and their interactions if the callbacks from all + enabled patches were called. + + + + There is no special handling of shadow variables. Livepatch authors + must create their own rules how to pass them from one cumulative + patch to the other. Especially they should not blindly remove them + in module_exit() functions. + + A good practice might be to remove shadow variables in the post-unpatch + callback. It is called only when the livepatch is properly disabled. -- 2.13.6