Received: by 10.213.65.68 with SMTP id h4csp298463imn; Fri, 23 Mar 2018 05:02:35 -0700 (PDT) X-Google-Smtp-Source: AG47ELuPjG6E3T1L+UisKooMehGS6p1Ve9GeEZUx1ZRZKcnn2GWtZcSEENJa2NwMEpOG2Ca/mmX3 X-Received: by 10.98.225.9 with SMTP id q9mr12136951pfh.23.1521806555444; Fri, 23 Mar 2018 05:02:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521806555; cv=none; d=google.com; s=arc-20160816; b=LQ0K7CiN5veeZcJUG0TND8jT7AmJu9nEYNB8YvQA2/zmcbBjPo6gDULTJT+X2wiFGR QWarvCVzA5F77cyHFHEpWGmcal07QOVSOmAYmge2CLL2YeM9mbOyXhfUSgFEyvBVQscT p2okWLXPdJP2Dqn2ezUuRpjU+P5KefneqbplJNTNP4nZ8MJIN950n+Ac5QrtHmlyE0Ux IRtn3L6UFDczfIED+poM5yt00CQL6bjq933oT0yHeOHj0DE9qQ2ES7Tri+9ufUVZ1WpE 9biyhr06efc9VdPVx9S+u1U5/owXBLrU5nFcbMkGKWTDVbbbrhrAsoHICpmmT8VmSG+w XlGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=X0TZ1eADHpGIy6oTrtS6YeT52gzD0tymN244VFbhHxQ=; b=ssUYnfTtcxAHcKrTh779XoxbCiiUzsJ/ugRbS1CnJ/xIxFNlV52eCp1I8OlOKtR5TH WwQdmtK34jYh5TbtmGfss9W2JYJDKf5EP3+4JpqAi3ElVS0Mlq7BZYm7IT7KhSjWyAzh C3nZUZJ0sLBf9ElM7I91VCQ6Jl2MUR8S7FxFQNbmWUyF06BotX3X7OlwKDtSHlYIw1ez lRhZXwa9UHl6Odg9OiE8r8OjEXWhQaX0AXA1taIg8G8AKimM12DOji4ip7NdrX4WSYDj ew+wfxlpUwUTDCrwtpF4LAkti0z+1BSN5CyzK2ex+wSc5fDq4LgAIm2KW7UZ8WNhsuvu hv8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 186si520625pgi.107.2018.03.23.05.02.16; Fri, 23 Mar 2018 05:02:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754176AbeCWMBJ (ORCPT + 99 others); Fri, 23 Mar 2018 08:01:09 -0400 Received: from mx2.suse.de ([195.135.220.15]:39665 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754111AbeCWMBF (ORCPT ); Fri, 23 Mar 2018 08:01:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 06EADAEA4; Fri, 23 Mar 2018 12:01:04 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Jason Baron , Joe Lawrence , Jessica Yu , Evgenii Shatokhin , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH 8/8] livepatch: Atomic replace and cumulative patches documentation Date: Fri, 23 Mar 2018 13:00:28 +0100 Message-Id: <20180323120028.31451-9-pmladek@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180323120028.31451-1-pmladek@suse.com> References: <20180323120028.31451-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org User documentation for the atomic replace feature. It makes it easier to maintain livepatches using so-called cumulative patches. Signed-off-by: Petr Mladek --- Documentation/livepatch/cumulative-patches.txt | 105 +++++++++++++++++++++++++ 1 file changed, 105 insertions(+) create mode 100644 Documentation/livepatch/cumulative-patches.txt diff --git a/Documentation/livepatch/cumulative-patches.txt b/Documentation/livepatch/cumulative-patches.txt new file mode 100644 index 000000000000..206b7f98d270 --- /dev/null +++ b/Documentation/livepatch/cumulative-patches.txt @@ -0,0 +1,105 @@ +=================================== +Atomic Replace & Cumulative Patches +=================================== + +There might be dependencies between livepatches. If multiple patches need +to do different changes to the same function(s) then we need to define +an order in which the patches will be installed. And function implementations +from any newer livepatch must be done on top of the older ones. + +This might become a maintenance nightmare. Especially if anyone would want +to remove a patch that is in the middle of the stack. + +An elegant solution comes with the feature called "Atomic Replace". It allows +to create so called "Cumulative Patches". They include all wanted changes +from all older livepatches and completely replace them in one transition. + +Usage +----- + +The atomic replace can be enabled by setting "replace" flag in struct klp_patch, +for example: + + static struct klp_patch patch = { + .mod = THIS_MODULE, + .objs = objs, + .replace = true, + }; + +Such a patch is added on top of the livepatch stack when registered. It can +be enabled even when some earlier patches have not been enabled yet. + +All processes are then migrated to use the code only from the new patch. +Once the transition is finished, all older patches are removed from the stack +of patches. Even the older not-enabled patches mentioned above. They can +even be unregistered and the related modules unloaded. + +Ftrace handlers are transparently removed from functions that are no +longer modified by the new cumulative patch. + +As a result, the livepatch authors might maintain sources only for one +cumulative patch. It helps to keep the patch consistent while adding or +removing various fixes or features. + +Users could keep only the last patch installed on the system after +the transition to has finished. It helps to clearly see what code is +actually in use. Also the livepatch might then be seen as a "normal" +module that modifies the kernel behavior. The only difference is that +it can be updated at runtime without breaking its functionality. + + +Features +-------- + +The atomic replace allows: + + + Atomically revert some functions in a previous patch while + upgrading other functions. + + + Remove eventual performance impact caused by core redirection + for functions that are no longer patched. + + + Decrease user confusion about stacking order and what patches are + currently in effect. + + +Limitations: +------------ + + + Replaced patches can no longer be enabled. But if the transition + to the cumulative patch was not forced, the kernel modules with + the older livepatches can be removed and eventually added again. + + A good practice is to set .replace flag in any released livepatch. + Then re-adding an older livepatch is equivalent to downgrading + to that patch. This is safe as long as the livepatches do _not_ do + extra modifications in (un)patching callbacks or in the module_init() + or module_exit() functions, see below. + + + + Only the (un)patching callbacks from the _new_ cumulative livepatch are + executed. Any callbacks from the replaced patches are ignored. + + By other words, the cumulative patch is responsible for doing any actions + that are necessary to properly replace any older patch. + + As a result, it might be dangerous to replace newer cumulative patches by + older ones. The old livepatches might not provide the necessary callbacks. + + This might be seen as a limitation in some scenarios. But it makes the life + easier in many others. Only the new cumulative livepatch knows what + fixes/features are added/removed and what special actions are necessary + for a smooth transition. + + In each case, it would be a nightmare to think about the order of + the various callbacks and their interactions if the callbacks from all + enabled patches were called. + + + + There is no special handling of shadow variables. Livepatch authors + must create their own rules how to pass them from one cumulative + patch to the other. Especially they should not blindly remove them + in module_exit() functions. + + A good practice might be to remove shadow variables in the post-unpatch + callback. It is called only when the livepatch is properly disabled. -- 2.13.6