Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4465087ybi; Tue, 11 Jun 2019 07:07:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqz7/UOKglLQ8Gu4PTkIvnPrn65eLUTo36CrMk6uBOY1rTpBqHO3rs5wb4bbd+TU43H0cpNM X-Received: by 2002:a17:90a:7107:: with SMTP id h7mr26615051pjk.38.1560262064081; Tue, 11 Jun 2019 07:07:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560262064; cv=none; d=google.com; s=arc-20160816; b=vAy5xYsKSt47j2UzvGNEChyUwBIRoewJ0DVjtbk1v4j89DZxcHRijcCTK5nCKSoGVq 9PHG4v1J/E8UjDzIp1uQ+Pn2gdaVyzn/lXbEADvB4nhG7iN8huDyerDHyoVzypUhVguA d+jcQMLyibBlDBYqCiRuRh8B6yEpdW7Pgmnn59v9QuJ2WCraoSp088TunEKdfv2TLVYi dRyEhgA0Eouwd/xEDG7wTk4OnQMRJq0sqUFJW+6WWgofHrxQPI0Uo6d1LOF26iEaKvyH AcyVfo18RR/7M9ar37Ne+Hn6Fk1AbrwxAFARZXjdlU3TYIpkczCHMW1uae/EZAT3SWOI 9uxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=UrAFm25EwpENqyM6+R80zW8xOyHZ4Cg1wYE4I16c2As=; b=lZbt4nj+2mEfUPOL0ja2sf4d32sziwukIVOiUTlxyFsByiPLoTijuBdB3SmUmqQBZk D3EQLDZzZodcpMzIAOciTMRy9Rz6l0vV3pgj570q25LdXZUh2zv4NJKjQti8U6JUfy1e 4k6ppmoFfD76AJS5s1IohFKXlIPb2Yi+F2qiKFG8GG6bJ/4FBHNlvXw0/XmECGcaBuOH ybikO3rOYf1skPoUluA16dBRtPPapvQXLdQpWn1V62PjcJXsiSGo8nZLtNaoO+NF1Fit eZXbOT6S5TfM2n3D3NmBWjp9q46VmSNtxOdP2ZMB0gYnc5J3tN6qph5feAXxVN+e3Y4W 32Fw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w125si13968174pfb.10.2019.06.11.07.07.27; Tue, 11 Jun 2019 07:07:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391481AbfFKN45 (ORCPT + 99 others); Tue, 11 Jun 2019 09:56:57 -0400 Received: from mx2.suse.de ([195.135.220.15]:40006 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2391441AbfFKN44 (ORCPT ); Tue, 11 Jun 2019 09:56:56 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B36B1AEE9; Tue, 11 Jun 2019 13:56:54 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , Nicolai Stange , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [RFC 3/5] livepatch: Allow to distinguish different version of system state changes Date: Tue, 11 Jun 2019 15:56:25 +0200 Message-Id: <20190611135627.15556-4-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20190611135627.15556-1-pmladek@suse.com> References: <20190611135627.15556-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The atomic replace runs pre/post (un)install callbacks only from the new livepatch. There are several reasons for this: + Simplicity: clear ordering of operations, no interactions between old and new callbacks. + Reliability: only new livepatch knows what changes can already be made by older livepatches and how to take over the state. + Testing: the atomic replace can be properly tested only when a newer livepatch is available. It might be too late to fix unwanted effect of callbacks from older livepatches. It might happen that an older change is not enough and the same system state has to be modified another way. Different changes need to get distinguished by a version number added to struct klp_state. The version can also be used to prevent loading incompatible livepatches. The check is done when the livepatch is enabled. The rules are: + Any completely new system state modification is allowed. + System state modifications with the same or higher version are allowed for already modified system states. + Cumulative livepatches must handle all system state modifications from already installed livepatches. + Non-cumulative livepatches are allowed to touch already modified system states. Signed-off-by: Petr Mladek --- include/linux/livepatch.h | 2 ++ kernel/livepatch/core.c | 8 ++++++++ kernel/livepatch/state.c | 40 +++++++++++++++++++++++++++++++++++++++- kernel/livepatch/state.h | 9 +++++++++ 4 files changed, 58 insertions(+), 1 deletion(-) create mode 100644 kernel/livepatch/state.h diff --git a/include/linux/livepatch.h b/include/linux/livepatch.h index 591abdee30d7..8bc4c6cc3f3f 100644 --- a/include/linux/livepatch.h +++ b/include/linux/livepatch.h @@ -135,10 +135,12 @@ struct klp_object { /** * struct klp_state - state of the system modified by the livepatch * @id: system state identifier (non zero) + * @version: version of the change (non-zero) * @data: custom data */ struct klp_state { int id; + int version; void *data; }; diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index 24c4a13bd26c..614642719825 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -21,6 +21,7 @@ #include #include "core.h" #include "patch.h" +#include "state.h" #include "transition.h" /* @@ -1003,6 +1004,13 @@ int klp_enable_patch(struct klp_patch *patch) mutex_lock(&klp_mutex); + if(!klp_is_patch_compatible(patch)) { + pr_err("Livepatch patch (%s) is not compatible with the already installed livepatches.\n", + patch->mod->name); + mutex_unlock(&klp_mutex); + return -EINVAL; + } + ret = klp_init_patch_early(patch); if (ret) { mutex_unlock(&klp_mutex); diff --git a/kernel/livepatch/state.c b/kernel/livepatch/state.c index f8822b71f96e..b54a69b9e4b4 100644 --- a/kernel/livepatch/state.c +++ b/kernel/livepatch/state.c @@ -12,7 +12,9 @@ #include "transition.h" #define klp_for_each_state(patch, state) \ - for (state = patch->states; state && state->id; state++) + for (state = patch->states; \ + state && state->id && state->version; \ + state++) /** * klp_get_state() - get information about system state modified by @@ -81,3 +83,39 @@ struct klp_state *klp_get_prev_state(int id) return last_state; } EXPORT_SYMBOL_GPL(klp_get_prev_state); + +/* Check if the patch is able to deal with the given system state. */ +static bool klp_is_state_compatible(struct klp_patch *patch, + struct klp_state *state) +{ + struct klp_state *new_state; + + new_state = klp_get_state(patch, state->id); + + if (new_state) + return new_state->version < state->version ? false : true; + + /* Cumulative livepatch must handle all already modified states. */ + return patch->replace ? false : true; +} + +/* + * Check if the new livepatch will not break the existing system states. + * Cumulative patches must handle all already modified states. + * Non-cumulative patches can touch already modified states. + */ +bool klp_is_patch_compatible(struct klp_patch *patch) +{ + struct klp_patch *old_patch; + struct klp_state *state; + + + klp_for_each_patch(old_patch) { + klp_for_each_state(old_patch, state) { + if (!klp_is_state_compatible(patch, state)) + return false; + } + } + + return true; +} diff --git a/kernel/livepatch/state.h b/kernel/livepatch/state.h new file mode 100644 index 000000000000..49d9c16e8762 --- /dev/null +++ b/kernel/livepatch/state.h @@ -0,0 +1,9 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef _LIVEPATCH_STATE_H +#define _LIVEPATCH_STATE_H + +#include + +bool klp_is_patch_compatible(struct klp_patch *patch); + +#endif /* _LIVEPATCH_STATE_H */ -- 2.16.4