Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp92975ybn; Thu, 3 Oct 2019 02:02:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRwhl/X1jXcCFVhpR6uzPxuuk7L58Z2+z2Rn+6c1XMN78S2o1md/DW1manTkyIpkCDh/c5 X-Received: by 2002:aa7:dc49:: with SMTP id g9mr8319796edu.1.1570093362372; Thu, 03 Oct 2019 02:02:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570093362; cv=none; d=google.com; s=arc-20160816; b=jYBIT5Fxa6CbxEMmJGCE0LltYJUSX8ApiPPNC3Hrz1viJugpL/2SsxqSaRGZ++6gHF hCkGr4OrYXHLVsBJgBdfkCa0lH5n7R0miLO3PRE6ZE4ZG1duuM8534lUU0EdGn+Ro3/r 2BidwxV7Z075rKsNNy0uQm6VS85T0Oy8imR0tmiHQxPBlK6FhT90IPdv4qugNpMfS68p McaOYEkcBfUuJO1lazNQfsQs6dibp2BVL0zJTmyVGjeBjKy1ty/mrZBietKz1m81aaKo vvH9Qt0BaEok9kwrDF+CRlCWsVH8QVJqgcXP4Dxl+L391kG81EBU1VCudbLlC3XY3Hb3 0dFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=aMi3POQi3EmB0KUFx7N73d8tp5zvtTv3YBnDBarIaIw=; b=PmSMpp1ueepovb/QjPQeEX+XXKl/IuDbsmXHepf3/Gl+SPrlBvF7d06LniS8gf3jZV VsnFBwIZE35cGKrUP3VwkO1Uo8naxlyhnUSyUfBRtSRYBLHsyL/Fu05DnIP4FT+bKsYw SZqBh272OCbD5TW9G+sD6fXRrTu+elip20hyJKg/yNDLalAZuAhl5plDjKrITC4rYixh tqzxbmQSag7r3o/tgg9RBC9vo2B242nO4737mYQf3PpUqkrBRY6s/GG3QbH6jWa43z4N qV3GmGpbWGU1Ls4T+FZ99/0Uc7QCUZ5jWcKUkLC/CXQcOx7oAlS1lJ1zCZYbaf4ezuYw /4TA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j14si985294edt.298.2019.10.03.02.02.17; Thu, 03 Oct 2019 02:02:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729059AbfJCJCB (ORCPT + 99 others); Thu, 3 Oct 2019 05:02:01 -0400 Received: from mx2.suse.de ([195.135.220.15]:50334 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727611AbfJCJB7 (ORCPT ); Thu, 3 Oct 2019 05:01:59 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 488C2B144; Thu, 3 Oct 2019 09:01:57 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , Nicolai Stange , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [PATCH v3 3/5] livepatch: Allow to distinguish different version of system state changes Date: Thu, 3 Oct 2019 11:01:35 +0200 Message-Id: <20191003090137.6874-4-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20191003090137.6874-1-pmladek@suse.com> References: <20191003090137.6874-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The atomic replace runs pre/post (un)install callbacks only from the new livepatch. There are several reasons for this: + Simplicity: clear ordering of operations, no interactions between old and new callbacks. + Reliability: only new livepatch knows what changes can already be made by older livepatches and how to take over the state. + Testing: the atomic replace can be properly tested only when a newer livepatch is available. It might be too late to fix unwanted effect of callbacks from older livepatches. It might happen that an older change is not enough and the same system state has to be modified another way. Different changes need to get distinguished by a version number added to struct klp_state. The version can also be used to prevent loading incompatible livepatches. The check is done when the livepatch is enabled. The rules are: + Any completely new system state modification is allowed. + System state modifications with the same or higher version are allowed for already modified system states. + Cumulative livepatches must handle all system state modifications from already installed livepatches. + Non-cumulative livepatches are allowed to touch already modified system states. Signed-off-by: Petr Mladek Acked-by: Miroslav Benes --- include/linux/livepatch.h | 2 ++ kernel/livepatch/core.c | 8 ++++++++ kernel/livepatch/state.c | 39 ++++++++++++++++++++++++++++++++++++++- kernel/livepatch/state.h | 9 +++++++++ 4 files changed, 57 insertions(+), 1 deletion(-) create mode 100644 kernel/livepatch/state.h diff --git a/include/linux/livepatch.h b/include/linux/livepatch.h index 726947338fd5..42907c4a0ce8 100644 --- a/include/linux/livepatch.h +++ b/include/linux/livepatch.h @@ -133,10 +133,12 @@ struct klp_object { /** * struct klp_state - state of the system modified by the livepatch * @id: system state identifier (non-zero) + * @version: version of the change (non-zero) * @data: custom data */ struct klp_state { unsigned long id; + unsigned int version; void *data; }; diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index 1e1d87ead55c..495eafd07328 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -22,6 +22,7 @@ #include #include "core.h" #include "patch.h" +#include "state.h" #include "transition.h" /* @@ -1009,6 +1010,13 @@ int klp_enable_patch(struct klp_patch *patch) mutex_lock(&klp_mutex); + if(!klp_is_patch_compatible(patch)) { + pr_err("Livepatch patch (%s) is not compatible with the already installed livepatches.\n", + patch->mod->name); + mutex_unlock(&klp_mutex); + return -EINVAL; + } + ret = klp_init_patch_early(patch); if (ret) { mutex_unlock(&klp_mutex); diff --git a/kernel/livepatch/state.c b/kernel/livepatch/state.c index 0a7014c57478..54d9587d167f 100644 --- a/kernel/livepatch/state.c +++ b/kernel/livepatch/state.c @@ -9,11 +9,12 @@ #include #include "core.h" +#include "state.h" #include "transition.h" #define klp_for_each_state(patch, state) \ for (state = patch->states; \ - state && state->id; \ + state && state->id && state->version; \ state++) /** @@ -83,3 +84,39 @@ struct klp_state *klp_get_prev_state(unsigned long id) return last_state; } EXPORT_SYMBOL_GPL(klp_get_prev_state); + +/* Check if the patch is able to deal with the given system state. */ +static bool klp_is_state_compatible(struct klp_patch *patch, + struct klp_state *state) +{ + struct klp_state *new_state; + + new_state = klp_get_state(patch, state->id); + + if (new_state) + return new_state->version >= state->version; + + /* Cumulative livepatch must handle all already modified states. */ + return !patch->replace; +} + +/* + * Check that the new livepatch will not break the existing system states. + * Cumulative patches must handle all already modified states. + * Non-cumulative patches can touch already modified states. + */ +bool klp_is_patch_compatible(struct klp_patch *patch) +{ + struct klp_patch *old_patch; + struct klp_state *state; + + + klp_for_each_patch(old_patch) { + klp_for_each_state(old_patch, state) { + if (!klp_is_state_compatible(patch, state)) + return false; + } + } + + return true; +} diff --git a/kernel/livepatch/state.h b/kernel/livepatch/state.h new file mode 100644 index 000000000000..49d9c16e8762 --- /dev/null +++ b/kernel/livepatch/state.h @@ -0,0 +1,9 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef _LIVEPATCH_STATE_H +#define _LIVEPATCH_STATE_H + +#include + +bool klp_is_patch_compatible(struct klp_patch *patch); + +#endif /* _LIVEPATCH_STATE_H */ -- 2.16.4