Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3290523ybi; Fri, 19 Jul 2019 00:41:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRL2Yk+N+REYsS8MXPlY7ewPW3V3GzHxdxl/AfR+nveyc0XJJO001646giEKYoa2t1iV7i X-Received: by 2002:a17:902:9b81:: with SMTP id y1mr57545243plp.194.1563522100131; Fri, 19 Jul 2019 00:41:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563522100; cv=none; d=google.com; s=arc-20160816; b=oktWU7owhcX4vpUqv49DfNBOKZ8s/25Kyjo2F0YLqplWSml27B4ucJevFjkXTPHXHU zPoYLTzQfQndnx4RldcuZJ4+CexUN09IfNVcAIR+dHuw9SQsd6hmK9xF15Hni5CSzbRu 4Rg4wV51oJyaXXo9DCXr7rr2E9RZkyqi6mwqbDUg5zC5xdw0NVKIxlDAPEe1CQPUgxCu LHUkgp/ubuWpnztotOgMf2SG4AqxKyg5wcbgzhI8l2ssaIbrOhZCUTdJ2ZuLBMxUX8ml hVh/4bSHAMZ5d+IKs9CfoIo9KjiM1Bd8fZ5ucanH1ZC7FSn7PtTcyENlgVUtz04NxVqA QnjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=X8JS7qA0hfMe1CPiYdyfd0STQcFDlMbDStxEByiV6ZQ=; b=Eq2Gl6+vgrVGcXfPlcadVN19mkt9BAYqRfl4gzrkpzsx6JuFqpchUw2KgWalbq8bF6 vzKT6qsurHjtf57ShYf247yBN7nZEZx0eEizHCpruuqpQ62T6UGZGkk+vzkKxhrAmwbS gYqQwIgVh0FlnRL18vP3OJZUZHfcJDZrYHUOhpvFt8KoIQH6DlvTTXwE9NCf5cy5ErTQ HktXQdSmJRjZMudc8QuiWXG64p/4ORWxuXXgA5l9og9eGRYhKqXNg8vXybYWoyIzL6hH NeKrnztHo/2SLznSlJozKNXHRo6Ny5LmhwDvH/AS5DY9ytu8SNI5noNSRKNtcoF4av8W rn6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l35si220847plb.186.2019.07.19.00.41.24; Fri, 19 Jul 2019 00:41:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727177AbfGSHk6 (ORCPT + 99 others); Fri, 19 Jul 2019 03:40:58 -0400 Received: from mx2.suse.de ([195.135.220.15]:49994 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726247AbfGSHk6 (ORCPT ); Fri, 19 Jul 2019 03:40:58 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 69042AC91; Fri, 19 Jul 2019 07:40:56 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , Nicolai Stange , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH v2 2/5] livepatch: Basic API to track system state changes Date: Fri, 19 Jul 2019 09:40:31 +0200 Message-Id: <20190719074034.29761-3-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20190719074034.29761-1-pmladek@suse.com> References: <20190719074034.29761-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is another step how to help maintaining more livepatches. One big help was the atomic replace and cumulative livepatches. These livepatches replace the already installed ones. Therefore it should be enough when each cumulative livepatch is consistent. The problems might come with shadow variables and callbacks. They might change the system behavior or state so that it is no longer safe to go back and use an older livepatch or the original kernel code. Also any new livepatch must be able to detect what changes have already been done by the already installed livepatches. This is where the livepatch system state tracking gets useful. It allows to: - find whether a system state has already been modified by previous livepatches - store data needed to manipulate and restore the system state The information about the manipulated system states is stored in an array of struct klp_state. It can be searched by two new functions klp_get_state() and klp_get_prev_state(). The dependencies are going to be solved by a version field added later. The only important information is that it will be allowed to modify the same state by more non-cumulative livepatches. It is the same logic as that it is allowed to modify the same function several times. The livepatch author is responsible for preventing incompatible changes. Signed-off-by: Petr Mladek --- include/linux/livepatch.h | 15 +++++++++ kernel/livepatch/Makefile | 2 +- kernel/livepatch/state.c | 85 +++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 101 insertions(+), 1 deletion(-) create mode 100644 kernel/livepatch/state.c diff --git a/include/linux/livepatch.h b/include/linux/livepatch.h index 273400814020..9c8b637f17cd 100644 --- a/include/linux/livepatch.h +++ b/include/linux/livepatch.h @@ -130,10 +130,21 @@ struct klp_object { bool patched; }; +/** + * struct klp_state - state of the system modified by the livepatch + * @id: system state identifier (non zero) + * @data: custom data + */ +struct klp_state { + unsigned long id; + void *data; +}; + /** * struct klp_patch - patch structure for live patching * @mod: reference to the live patch module * @objs: object entries for kernel objects to be patched + * @states: system states that can get modified * @replace: replace all actively used patches * @list: list node for global list of actively used patches * @kobj: kobject for sysfs resources @@ -147,6 +158,7 @@ struct klp_patch { /* external */ struct module *mod; struct klp_object *objs; + struct klp_state *states; bool replace; /* internal */ @@ -217,6 +229,9 @@ void *klp_shadow_get_or_alloc(void *obj, unsigned long id, void klp_shadow_free(void *obj, unsigned long id, klp_shadow_dtor_t dtor); void klp_shadow_free_all(unsigned long id, klp_shadow_dtor_t dtor); +struct klp_state *klp_get_state(struct klp_patch *patch, unsigned long id); +struct klp_state *klp_get_prev_state(unsigned long id); + #else /* !CONFIG_LIVEPATCH */ static inline int klp_module_coming(struct module *mod) { return 0; } diff --git a/kernel/livepatch/Makefile b/kernel/livepatch/Makefile index cf9b5bcdb952..cf03d4bdfc66 100644 --- a/kernel/livepatch/Makefile +++ b/kernel/livepatch/Makefile @@ -1,4 +1,4 @@ # SPDX-License-Identifier: GPL-2.0-only obj-$(CONFIG_LIVEPATCH) += livepatch.o -livepatch-objs := core.o patch.o shadow.o transition.o +livepatch-objs := core.o patch.o shadow.o state.o transition.o diff --git a/kernel/livepatch/state.c b/kernel/livepatch/state.c new file mode 100644 index 000000000000..f76d90e856b1 --- /dev/null +++ b/kernel/livepatch/state.c @@ -0,0 +1,85 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * system_state.c - State of the system modified by livepatches + * + * Copyright (C) 2019 SUSE + */ + +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt + +#include +#include "core.h" +#include "transition.h" + +#define klp_for_each_state(patch, state) \ + for (state = patch->states; \ + state && state->id; \ + state++) + +/** + * klp_get_state() - get information about system state modified by + * the given patch + * @patch: livepatch that modifies the given system state + * @id: custom identifier of the modified system state + * + * Checks whether the given patch modifies to given system state. + * + * The function can be called either from pre/post (un)patch + * callbacks or from the kernel code added by the livepatch. + * + * Return: pointer to struct klp_state when found, otherwise NULL. + */ +struct klp_state *klp_get_state(struct klp_patch *patch, unsigned long id) +{ + struct klp_state *state; + + klp_for_each_state(patch, state) { + if (state->id == id) + return state; + } + + return NULL; +} +EXPORT_SYMBOL_GPL(klp_get_state); + +/** + * klp_get_prev_state() - get information about system state modified by + * the already installed livepatches + * @id: custom identifier of the modified system state + * + * Checks whether already installed livepatches modify the given + * system state. + * + * The same system state can be modified by more non-cumulative + * livepatches. It is expected that the latest livepatch has + * the most up-to-date information. + * + * The function can be called only during transition when a new + * livepatch is being enabled or when such a transition is reverted. + * It is typically called only from from pre/post (un)patch + * callbacks. + * + * Return: pointer to the latest struct klp_state from already + * installed livepatches, NULL when not found. + */ +struct klp_state *klp_get_prev_state(unsigned long id) +{ + struct klp_patch *patch; + struct klp_state *state, *last_state = NULL; + + if (WARN_ON_ONCE(!klp_transition_patch)) + return NULL; + + klp_for_each_patch(patch) { + if (patch == klp_transition_patch) + goto out; + + state = klp_get_state(patch, id); + if (state) + last_state = state; + } + +out: + return last_state; +} +EXPORT_SYMBOL_GPL(klp_get_prev_state); -- 2.16.4