Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1859577imm; Thu, 18 Oct 2018 05:34:21 -0700 (PDT) X-Google-Smtp-Source: ACcGV628hrwFLm2AmO6EN4BJ7+ULLAJCU87nSDo+V21NXxwreBItORSHVDINXn+5P82OQgpIbZo/ X-Received: by 2002:a65:5083:: with SMTP id r3-v6mr27727319pgp.355.1539866061415; Thu, 18 Oct 2018 05:34:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539866061; cv=none; d=google.com; s=arc-20160816; b=mBak7pFxwnZm8t4zpeCTuTUJVVb51K2CRC0qRJvgbrDdXEVCUQ+DlSngzT80T5nMDr W/IiZEq1RyA7ILx4wTPZR6U2wmxKM56OGrYcZ2luLdINc9ACqg1d1zA6zes5eZAOV7QM HzilEr1l9k3NE++L99Vq1I3I7ltTWDqie7ZYSJEIgGexmoLreQ7QUR5aVthPmizfuA+0 jaUpIWg55y82YYSKUYKucKY+FDDw4AiPlOtEmM8t7XuBlq2GSlzrNMt8vgqAHinOBqXu cVmqxnQgwvDgf/XQrswXuD9f4KoAvyKRvEK/idDTMCr5vEgr1bAVgpbnf8qGdVUE9dZY EBQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=INQZR3L/39VLTeOzPicH9AGuSBOj3QK5R4lVLtaEwNI=; b=IgaOYE6OAeCWOB/5smgr0IOyAvYAwNTZNalKDMxfPgTMCpBtQy0JQa1gxxNi1ijFP7 je8TI6xBwLHGqg7fPA4gMw0WMuSk+86/dNIvgrkH80fEdhXNkdTFL2QCX0dXGxjpk5OJ PkB2Vx2L2Xa3BXVrpROTJXfgCzMGxXAytxOLnX1x6DAiMnYmHzRdG1U3QJJHhX8n8/WT lQZfE8Hw/uhfYcpFuoI2pqn6/O9hEyOtwJYwfU1O5sD546vmmsmZOm51UNvgFe33R3US NISVBM7SYcQzYISyflkbkfp3c7iFo4fyL6bVfNIKw7B4Uno4aOjNHr3XMavPg539Ksfy Q8Xg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bc11-v6si20954988plb.120.2018.10.18.05.34.05; Thu, 18 Oct 2018 05:34:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727031AbeJRUeU (ORCPT + 99 others); Thu, 18 Oct 2018 16:34:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:52716 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726417AbeJRUeU (ORCPT ); Thu, 18 Oct 2018 16:34:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id AB51FAE30; Thu, 18 Oct 2018 12:33:29 +0000 (UTC) Date: Thu, 18 Oct 2018 14:33:29 +0200 From: Petr Mladek To: Josh Poimboeuf Cc: Jiri Kosina , Miroslav Benes , Jason Baron , Joe Lawrence , Evgenii Shatokhin , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v13 06/12] livepatch: Simplify API by removing registration step Message-ID: <20181018123329.5xvo5hjtqpbih4d2@pathway.suse.cz> References: <20181015123713.25868-1-pmladek@suse.com> <20181015123713.25868-7-pmladek@suse.com> <20181017190657.dv3kwx467brzhdnz@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181017190657.dv3kwx467brzhdnz@treble> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 2018-10-17 14:06:57, Josh Poimboeuf wrote: > On Mon, Oct 15, 2018 at 02:37:07PM +0200, Petr Mladek wrote: > > @@ -319,96 +316,66 @@ forced it is guaranteed that no task sleeps or runs in the old code. > > 5. Livepatch life-cycle > > ======================= > > > > -Livepatching defines four basic operations that define the life cycle of each > > -live patch: registration, enabling, disabling and unregistration. There are > > -several reasons why it is done this way. > > +Livepatches get automatically enabled when the respective module is loaded. > > (only true if the module enables the patch in its init function) Great catch! Will fix it. > > @@ -502,6 +483,9 @@ static void klp_free_objects(struct klp_patch *patch) > > } > > > > /* > > + * The synchronous variant is needed when the patch is freed in > > + * the klp_enable_patch() error paths. > > + * > > Hm? This comment seems confusingly out of context. Ah, the comment is just a left over from the previous version. It does not longer make sense. I'll remove it. > > @@ -528,6 +512,23 @@ static void klp_free_patch_finish(struct klp_patch *patch) > > kobject_put(&patch->kobj); > > wait_for_completion(&patch->finish); > > } > > + > > + /* Put the module after the last access to struct klp_patch. */ > > + if (patch->module_put) > > + module_put(patch->mod); > > +} > > + > > +/* > > + * The livepatch might be freed from sysfs interface created by the patch. > > + * This work allows to wait until the interface is destroyed in a separate > > + * context. > > + */ > > +static void klp_free_patch_fn(struct work_struct *work) > > To clarify that it's a work function, how about calling it > "klp_free_patch_work_fn"? OK > > static int klp_init_func(struct klp_object *obj, struct klp_func *func) > > @@ -642,116 +643,38 @@ static int klp_init_patch(struct klp_patch *patch) > > struct klp_object *obj; > > int ret; > > > > - if (!patch->objs) > > - return -EINVAL; > > - > > - mutex_lock(&klp_mutex); > > - > > patch->enabled = false; > > - patch->forced = false; > > + patch->module_put = false; > > INIT_LIST_HEAD(&patch->list); > > + INIT_WORK(&patch->free_work, klp_free_patch_fn); > > init_completion(&patch->finish); > > > > + if (!patch->objs) > > + return -EINVAL; > > + > > + /* > > + * A reference is taken on the patch module to prevent it from being > > + * unloaded. > > + */ > > + if (!try_module_get(patch->mod)) > > + return -ENODEV; > > This comment isn't needed. It describes what try_module_get() does, > which is common kernel knowledge. Yup. I'll remove it. Note that it was there even before. I have just moved it with the code. > > + patch->module_put = true; > > The naming and semantics of the 'module_put' field are a little > confusing. It's false in two cases: > > 1) try_module_get() failure > 2) forced patch > > Maybe we can get rid of the need for the first case by moving the > try_module_get() call to klp_enable_patch(), before calling > klp_init_lists(). Then klp_free_patch_finish() will always be called > with a module reference, so it doesn't have to check the 'module_put' > field. > > We'd still need it for the force case, but then it can just be called > 'forced' again. Great idea! I'll do it in v14. > > --- a/samples/livepatch/livepatch-callbacks-demo.c > > +++ b/samples/livepatch/livepatch-callbacks-demo.c > > @@ -184,22 +184,11 @@ static struct klp_patch patch = { > > > > static int livepatch_callbacks_demo_init(void) > > { > > - int ret; > > - > > - ret = klp_register_patch(&patch); > > - if (ret) > > - return ret; > > - ret = klp_enable_patch(&patch); > > - if (ret) { > > - WARN_ON(klp_unregister_patch(&patch)); > > - return ret; > > - } > > - return 0; > > + return klp_enable_patch(&patch); > > } > > > > static void livepatch_callbacks_demo_exit(void) > > { > > - WARN_ON(klp_unregister_patch(&patch)); > > } > > This module exit function is no longer needed. I have been there ;-) It is required. Otherewise the module can't get removed. See the following code in kernel/module.c: SYSCALL_DEFINE2(delete_module, const char __user *, name_user, unsigned int, flags) { [...] /* If it has an init func, it must have an exit func to unload */ if (mod->init && !mod->exit) { forced = try_force_unload(flags); if (!forced) { /* This module can't be removed */ ret = -EBUSY; goto out; } } Best Regards, Petr