Received: by 10.223.185.116 with SMTP id b49csp4778154wrg; Wed, 7 Mar 2018 00:24:16 -0800 (PST) X-Google-Smtp-Source: AG47ELtboOc/1bhNPJ31MEznGbP/0/LcFlzfzpCwLYVddvSrcsOEjRBhRnZUZTcG3xx1/DobLx6Q X-Received: by 10.101.97.175 with SMTP id i15mr17170396pgv.55.1520411056282; Wed, 07 Mar 2018 00:24:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520411056; cv=none; d=google.com; s=arc-20160816; b=E14sjF2H39+EkXl6AfAZojcy9L/3TCKeNy+eBpZ451dTBnFvqPWaDYS5jwNMrxn5rz YgFhwNK7gxp9rxF2a//VUooeuFW10tX+7D2EzuomY24kvDyMGWvpmpEHwpGnrHn23bRU +ztIYZvn5dkFjAm+fQn1taOj7ccHBWwCZBkLCMMn629T7G9+qLLC1KelAp2r2q8j4ed7 wG32xZyiEf5Mx3tbk64X6SbgB/CWzGPTeHlM3j5IyKPqJ8O6/TfTqdCFxAisasLe6sUD UdFpq3ZksMbZXL6trvzxZAVA9gb/MPlbTraLDP3tZcHA3yzc/cWbpPzUZj3pTmoXkfOb VlMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=iPfcBl0xdJGA+0ihBlsgL0D3ZKpYmVZN5NUTMM0eTSc=; b=O1xS14ExMWnrxFT7hgylScWVJNxVqDJfVY/SqrPRboKjQzxudR4oHUz8q6qzK4b7yX QfMYK/7kPSaNWtH9PXzQr4d2TnUJsTq2LFq7O18qXzZs2OGegWIKLpMWRzVEyaG4GTrc GpYHfjfCX8NkeNbYNCckuWNs4u81C4IVxoJYtmWZeXPU+qkIovK+1Cgg66OFOgDKEoTe tz94MRKi9voqfeFdz/P/6AXXKcOLH7ufU0+k0vqR5w0RKS4S2hGpx4Fm0kM0wKMfjWZ3 CWUZINeX7eJ8h37r0hFcCJjUVh4K3jchO3x27l/ON5ahNULKTUdxxN3fAfQls7EtJul+ dqzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h11si11047491pgq.28.2018.03.07.00.24.02; Wed, 07 Mar 2018 00:24:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751299AbeCGIWe (ORCPT + 99 others); Wed, 7 Mar 2018 03:22:34 -0500 Received: from mx2.suse.de ([195.135.220.15]:50140 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933106AbeCGIVB (ORCPT ); Wed, 7 Mar 2018 03:21:01 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id A67A0AF91; Wed, 7 Mar 2018 08:20:59 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Jason Baron , Joe Lawrence , Jessica Yu , Evgenii Shatokhin , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH v10 04/10] livepatch: Allow to unpatch only functions of the given type Date: Wed, 7 Mar 2018 09:20:33 +0100 Message-Id: <20180307082039.10196-5-pmladek@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180307082039.10196-1-pmladek@suse.com> References: <20180307082039.10196-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Baron We are going to add a feature called atomic replace. It will allow to create a patch that would replace all already registered patches. For this, we will need to dynamically create funcs and objects for functions that are no longer patched. The dynamically allocated objects will not longer be needed once the patch is applied. This patch allows to unpatch functions of the given type. It might cause that the obj->patched flag is true even when some listed functions are not longer patched. This is fine as long as the unpatched funcs' structures are removed right after. It will be the case. Anyway, it is safe. In the worst case, it will not be possible to enable the disabled functions. Signed-off-by: Jason Baron [pmladek@suse.com: Split and modified to use the generic ftype] Signed-off-by: Petr Mladek Cc: Josh Poimboeuf Cc: Jessica Yu Cc: Jiri Kosina Acked-by: Miroslav Benes --- kernel/livepatch/core.c | 2 +- kernel/livepatch/patch.c | 26 +++++++++++++++++++------- kernel/livepatch/patch.h | 4 ++-- kernel/livepatch/transition.c | 2 +- 4 files changed, 23 insertions(+), 11 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index a47c26147c17..ab1f6a371fc8 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -1060,7 +1060,7 @@ static void klp_cleanup_module_patches_limited(struct module *mod, pr_notice("reverting patch '%s' on unloading module '%s'\n", patch->mod->name, obj->mod->name); - klp_unpatch_object(obj); + klp_unpatch_object(obj, KLP_FUNC_ANY); klp_post_unpatch_callback(obj); } diff --git a/kernel/livepatch/patch.c b/kernel/livepatch/patch.c index 82d584225dc6..54b3c379bb0f 100644 --- a/kernel/livepatch/patch.c +++ b/kernel/livepatch/patch.c @@ -236,15 +236,27 @@ static int klp_patch_func(struct klp_func *func) return ret; } -void klp_unpatch_object(struct klp_object *obj) +/* + * It keeps obj->patched flag true when any listed function is still patched. + * The caller is responsible for removing the unpatched functions to + * make the flag clean again. + */ +void klp_unpatch_object(struct klp_object *obj, enum klp_func_type ftype) { struct klp_func *func; + bool patched = false; - klp_for_each_func(obj, func) - if (func->patched) + klp_for_each_func(obj, func) { + if (!func->patched) + continue; + + if (klp_is_func_type(func, ftype)) klp_unpatch_func(func); + else + patched = true; + } - obj->patched = false; + obj->patched = patched; } int klp_patch_object(struct klp_object *obj) @@ -258,7 +270,7 @@ int klp_patch_object(struct klp_object *obj) klp_for_each_func(obj, func) { ret = klp_patch_func(func); if (ret) { - klp_unpatch_object(obj); + klp_unpatch_object(obj, KLP_FUNC_ANY); return ret; } } @@ -267,11 +279,11 @@ int klp_patch_object(struct klp_object *obj) return 0; } -void klp_unpatch_objects(struct klp_patch *patch) +void klp_unpatch_objects(struct klp_patch *patch, enum klp_func_type ftype) { struct klp_object *obj; klp_for_each_object(patch, obj) if (obj->patched) - klp_unpatch_object(obj); + klp_unpatch_object(obj, ftype); } diff --git a/kernel/livepatch/patch.h b/kernel/livepatch/patch.h index e72d8250d04b..885f644add4c 100644 --- a/kernel/livepatch/patch.h +++ b/kernel/livepatch/patch.h @@ -28,7 +28,7 @@ struct klp_ops { struct klp_ops *klp_find_ops(unsigned long old_addr); int klp_patch_object(struct klp_object *obj); -void klp_unpatch_object(struct klp_object *obj); -void klp_unpatch_objects(struct klp_patch *patch); +void klp_unpatch_object(struct klp_object *obj, enum klp_func_type ftype); +void klp_unpatch_objects(struct klp_patch *patch, enum klp_func_type ftype); #endif /* _LIVEPATCH_PATCH_H */ diff --git a/kernel/livepatch/transition.c b/kernel/livepatch/transition.c index 7c6631e693bc..6917100fbe79 100644 --- a/kernel/livepatch/transition.c +++ b/kernel/livepatch/transition.c @@ -92,7 +92,7 @@ static void klp_complete_transition(void) * All tasks have transitioned to KLP_UNPATCHED so we can now * remove the new functions from the func_stack. */ - klp_unpatch_objects(klp_transition_patch); + klp_unpatch_objects(klp_transition_patch, KLP_FUNC_ANY); /* * Make sure klp_ftrace_handler() can no longer see functions -- 2.13.6