Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp335081yba; Wed, 24 Apr 2019 01:57:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3r3nYnggDYntA0RaBl9OE2I2WTXWhMItY99CRRAk/ydOIy1Ff4OGzGOLyVUruE/i0Ze3K X-Received: by 2002:a17:902:7e05:: with SMTP id b5mr32134599plm.127.1556096244949; Wed, 24 Apr 2019 01:57:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556096244; cv=none; d=google.com; s=arc-20160816; b=F+V1Hq1rP2RI+co1x5R9HsekTbceXXkwWcZek0iGIxWuV6H4IOlGnBxXlSPw/3KEsB KF45ETFsV1tCMkzPptFa8gERZgbbSRttOOQ5cJTttKS9His85imnWiRXuce5DFw+TmHb b+OdDcv6T1cJHkjX67QqKJFTG/Oxqv1sQGaovV+pp0NP9dCf8Sc8qBWY9Yot8vopeeVG Po8qPz6mNTL0Hwj8balle2E0iERr1S9JrMbu8MvxU1QYQlzm9docf8HG5IaspYrKmeOk lV7oCbvsDgUFNGPutcbtvoS+iGmtTJH4vcrhghosxUzcR6wg8Hv+cAmLRZwX9rMO6DmF kNFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=iAuDF9bqDjvxRHbg/vc3FTNHqtGIw496gNzBGfQ8PiQ=; b=FstVnF/PzbiBBF3u8eUBHhDEHCS6Bbgxxbim0lKduCs6zlOLmWYr8fp+3BZJZJNtD6 pkoshWGH0BNbsrRadqy8P9siKEBvu8t7fXIVabUYPZegGGkUTSp8cP5NDqiC/ssNNMuq BsZTGSXy4TRzsp21vfss9jxDT3vTkfjeZvue3FDZJ6CK8GOoi55LkQwMkS8VRm+bxyoV GjmlTtLbH3zQ7uF3kgKMgjlAHVJRRt9VrY9l4MflbFcMCJMUPY3R5UKBdTRYSfpFYXd2 d5tl1vjp4GmuxXQx11dpcBb64GH6XADUC1X/ynfnU5yGPs5Om00ceWSc0ouXt9+hTr8w +RUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b8si19038676pla.153.2019.04.24.01.57.09; Wed, 24 Apr 2019 01:57:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728860AbfDXI4F (ORCPT + 99 others); Wed, 24 Apr 2019 04:56:05 -0400 Received: from mx2.suse.de ([195.135.220.15]:40094 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728580AbfDXI4D (ORCPT ); Wed, 24 Apr 2019 04:56:03 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id A78E3AECB; Wed, 24 Apr 2019 08:56:02 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH 1/3] livepatch: Convert error about unsupported reliable stacktrace into a warning Date: Wed, 24 Apr 2019 10:55:48 +0200 Message-Id: <20190424085550.29612-2-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20190424085550.29612-1-pmladek@suse.com> References: <20190424085550.29612-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The commit d0807da78e11d46f ("livepatch: Remove immediate feature") caused that any livepatch was refused when reliable stacktraces were not supported on the given architecture. The limitation is too strong. User space processes are safely migrated even when entering or leaving the kernel. Kthreads transition would need to get forced. But it is safe when: + The livepatch does not change the semantic of the code. + Callbacks do not depend on a safely finished transition. Suggested-by: Josh Poimboeuf Signed-off-by: Petr Mladek --- kernel/livepatch/core.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index eb0ee10a1981..14f33ab6c583 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -1003,11 +1003,10 @@ int klp_enable_patch(struct klp_patch *patch) return -ENODEV; if (!klp_have_reliable_stack()) { - pr_err("This architecture doesn't have support for the livepatch consistency model.\n"); - return -EOPNOTSUPP; + pr_warn("This architecture doesn't have support for the livepatch consistency model.\n"); + pr_warn("The livepatch transition may never complete.\n"); } - mutex_lock(&klp_mutex); ret = klp_init_patch_early(patch); -- 2.16.4