Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp9148615ybl; Fri, 17 Jan 2020 07:07:37 -0800 (PST) X-Google-Smtp-Source: APXvYqxBbmhhqOfLG6y/eWPzvKWV4kiiQNisvPfr51ETc//7GkBMICBi0IVLQbVCNpu53MiScvVc X-Received: by 2002:a05:6830:2099:: with SMTP id y25mr6063019otq.87.1579273657190; Fri, 17 Jan 2020 07:07:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579273657; cv=none; d=google.com; s=arc-20160816; b=zJQ7qn9gZTPJhQYp30uz1FNVD9tu4pgq8LGy/sLKx2UMJqDUTrtH2kuGRkgHjeqoXC 0HIdq480nMuGTAjaksAq5fJNo7I0vEyFtnhw9RUGdDapZpbdEZotX8YSqOuqsV7tzcOX eSs/LKcKyer6BTqQ3Bo1KxDFNDkpXT/POuLrJIoh86RMYpCiehKRat0hhQhkB7uhz7uK b5j9dJMzANfagT9xfxR70T9252DC9BfnnzBwbJAwBz31xMwy41djvu5xDJCnlR0AE/eZ PB4wg/Hpp4jtp5ZszgDbUwstBsDHldsig+LsfRRHY+NO6U3e+5XtAgA9KsEV95Ni2PY8 A0ZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=b626l6MKUrr3I+8FckV78Chlm8JMrt64bc0Bqa3UcLU=; b=iI6B768sWdHc7knXZxpED9il0y5LGd2zSmcy8QZtEq6ump93kHFm2D4dN3DjPQdiRW 44BxaYOjMz17BEcQCFddQIlB88SjZYU1IIE/JUwFbdVV1obALsf9sDERu9rL7AbjJpw9 JEzTRrIgeaKzBRG4KmkSLVGRxZPjQRiqxVea2DPj9lLwayUDwezqqKls3T4mv34crq6s pQcxtuHSYvbWpf9c8qXFnuZ6IBWJPzoSNjY62zon42fr8Y1A7z6MAGAQfHsyGT/dgQ5i 6heRkibrXVBwayERNV/9tzT6ITC0iyK8MXMglY+E5fGoIunrGdib7YYUeZw9IV0rBkxj dGbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f194si14329428oig.243.2020.01.17.07.07.23; Fri, 17 Jan 2020 07:07:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729473AbgAQPFH (ORCPT + 99 others); Fri, 17 Jan 2020 10:05:07 -0500 Received: from mx2.suse.de ([195.135.220.15]:46202 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729080AbgAQPD7 (ORCPT ); Fri, 17 Jan 2020 10:03:59 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 72B9DBB97; Fri, 17 Jan 2020 15:03:57 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , Nicolai Stange , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [POC 07/23] livepatch: Remove obsolete functionality from klp_module_coming() Date: Fri, 17 Jan 2020 16:03:07 +0100 Message-Id: <20200117150323.21801-8-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20200117150323.21801-1-pmladek@suse.com> References: <20200117150323.21801-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org klp_module_coming() could not operate on the livepatch structures. Instead it has to load the livepatch module that will call klp_add_object(). The functionality has been migrated to klp_add_object() in the previous commits and the code can be finally removed. The only exception is mod->klp_alive flag. It will still be needed to decide who is responsible for loading/removing the eventual livepatch modules. It is done this way to make the changes manageable and easier to review. Signed-off-by: Petr Mladek --- kernel/livepatch/core.c | 59 ------------------------------------------------- 1 file changed, 59 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index c21bd9ec2012..bb851f916182 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -1290,10 +1290,6 @@ static void klp_cleanup_module_patches_limited(struct module *mod, int klp_module_coming(struct module *mod) { - int ret; - struct klp_patch *patch; - struct klp_object *obj; - if (WARN_ON(mod->state != MODULE_STATE_COMING)) return -EINVAL; @@ -1304,64 +1300,9 @@ int klp_module_coming(struct module *mod) * get patched by a new patch. */ mod->klp_alive = true; - - klp_for_each_patch(patch) { - klp_for_each_object(patch, obj) { - if (!klp_is_module(obj) || strcmp(obj->name, mod->name)) - continue; - - obj->mod = mod; - - ret = klp_init_object_loaded(obj); - if (ret) { - pr_warn("failed to initialize patch '%s' for module '%s' (%d)\n", - patch->obj->patch_name, obj->name, ret); - goto err; - } - - pr_notice("applying patch '%s' to loading module '%s'\n", - patch->obj->patch_name, obj->name); - - ret = klp_pre_patch_callback(obj); - if (ret) { - pr_warn("pre-patch callback failed for object '%s'\n", - obj->name); - goto err; - } - - ret = klp_patch_object(obj); - if (ret) { - pr_warn("failed to apply patch '%s' to module '%s' (%d)\n", - patch->obj->patch_name, obj->name, ret); - - klp_post_unpatch_callback(obj); - goto err; - } - - if (patch != klp_transition_patch) - klp_post_patch_callback(obj); - - break; - } - } - mutex_unlock(&klp_mutex); return 0; - -err: - /* - * If a patch is unsuccessfully applied, return - * error to the module loader. - */ - pr_warn("patch '%s' failed for module '%s', refusing to load module '%s'\n", - patch->obj->patch_name, obj->name, obj->name); - mod->klp_alive = false; - obj->mod = NULL; - klp_cleanup_module_patches_limited(mod, patch); - mutex_unlock(&klp_mutex); - - return ret; } void klp_module_going(struct module *mod) -- 2.16.4