Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp9149646ybl; Fri, 17 Jan 2020 07:08:31 -0800 (PST) X-Google-Smtp-Source: APXvYqwwsMiNwG/HYRfEdYS20kKscleGWq8MvB/3KgCznbgNp/9rChIXp34Ng4ttfb4UeiGw7vWu X-Received: by 2002:aca:cd92:: with SMTP id d140mr3674036oig.68.1579273711516; Fri, 17 Jan 2020 07:08:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579273711; cv=none; d=google.com; s=arc-20160816; b=k5t9v3Ppk9WK8Cd2cg3OusLx9owjImCPT8blzibgFV7Lie6jnyR9OfYFJi31KU8vex IHiy4EN/VTX7lik6fmbRHR9X8xTbwBv2n66Cxd2FngjteuXxszkgBfYRb3zp6u9mvcpI COP96gCMNFar9eOYvL3YszAh0AJ/DjMGifCdAua6a2KDSTsXYwYh2+tYferMa8R+Zk62 32VHSNwfXymLMfYpl428R5klAHvq7bLdyZ7kvSt3zqoi6hLvoDZVOjkuX3F3rN6tPyat L+3JXMMooiYPmLUg+SOM6k2WpdGThy2uRveLtrddGwgbr4IPzU5ebCXBIuen/DDQizW7 52Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=S6+gY2hrQtwZbNyc4vSDoeXzb20UT34xKZ7lknVIy4g=; b=cnHrc6D+trLtjAzQT6P+WlyxzjUybVgHSjbtOGlKmmal45KElVN9LOCM1nTEgI3EvG 8K7JilIr++xl0r+MpzCTjFfzcIQh5Qkd8EG+D4cV20ZwheQzonVFwCdt9Rpc/jWKp5cw rHYEV4xU5O3iKWNkF/IxxAg80r9pKWf2tbhkXY3bJQQ6NXO2T3RG4eVtWIpxvxyYpz8F LlzAzdqeuiAa5wHhjLXze040YNSUkk9qwE9lOhUBqHzwzItQOk8jRi5g1uRAD0ei7rNL MSJ59oY+rfMeG2aTz7VHjnIZKxm4kWGzZQGSIri9S8hBDtUYTQUexQMYoO2dw0GQr7lE OnGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z25si12237905oic.23.2020.01.17.07.08.19; Fri, 17 Jan 2020 07:08:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729423AbgAQPEw (ORCPT + 99 others); Fri, 17 Jan 2020 10:04:52 -0500 Received: from mx2.suse.de ([195.135.220.15]:46352 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729126AbgAQPEA (ORCPT ); Fri, 17 Jan 2020 10:04:00 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 8698EBBB1; Fri, 17 Jan 2020 15:03:59 +0000 (UTC) From: Petr Mladek To: Jiri Kosina , Josh Poimboeuf , Miroslav Benes Cc: Joe Lawrence , Kamalesh Babulal , Nicolai Stange , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Petr Mladek Subject: [POC 12/23] livepatch: Automatically remove livepatch module when the object is freed Date: Fri, 17 Jan 2020 16:03:12 +0100 Message-Id: <20200117150323.21801-13-pmladek@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20200117150323.21801-1-pmladek@suse.com> References: <20200117150323.21801-1-pmladek@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Make it easy to deal with the split livepatch modules. Remove the livepatch modules that livepatched modules when they are no longer used. It must be done from workqueue context to avoid deadlocks. It must not be done when klp_add_module() fails because is called from the livepatch module init callback. The module will not load at all in this case. Signed-off-by: Petr Mladek --- include/linux/livepatch.h | 4 ++++ kernel/livepatch/core.c | 19 ++++++++++++++++++- 2 files changed, 22 insertions(+), 1 deletion(-) diff --git a/include/linux/livepatch.h b/include/linux/livepatch.h index e021e512b207..4afb7f3a5a36 100644 --- a/include/linux/livepatch.h +++ b/include/linux/livepatch.h @@ -115,6 +115,8 @@ struct klp_callbacks { * @dynamic: temporary object for nop functions; dynamically allocated * @patched: the object's funcs have been added to the klp_ops list * @forced: was involved in a forced transition + * @add_err: failed to add the object when loading the livepatch module + * @remove_work: remove module from workqueue-context */ struct klp_object { /* external */ @@ -131,6 +133,8 @@ struct klp_object { bool dynamic; bool patched; bool forced; + bool add_err; + struct work_struct remove_work; }; /** diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index 2f15ff360676..6c51b194da57 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -556,8 +556,14 @@ static void klp_kobj_release_object(struct kobject *kobj) return; } - if (klp_is_module(obj) && !obj->forced) + if (obj->forced || !klp_is_module(obj)) + return; + + /* Must not explicitely remove module when adding failed. */ + if (obj->add_err) module_put(obj->mod); + else + schedule_work(&obj->remove_work); } static struct kobj_type klp_ktype_object = { @@ -677,6 +683,14 @@ static void klp_free_patch_finish(struct klp_patch *patch) module_put(patch->obj->mod); } +static void klp_remove_module_work_fn(struct work_struct *work) +{ + struct klp_object *obj = + container_of(work, struct klp_object, remove_work); + + module_put_and_delete(obj->mod); +} + /* * The livepatch might be freed from sysfs interface created by the patch. * This work allows to wait until the interface is destroyed in a separate @@ -835,6 +849,8 @@ static int klp_init_object_early(struct klp_patch *patch, kobject_init(&obj->kobj, &klp_ktype_object); list_add_tail(&obj->node, &patch->obj_list); obj->forced = false; + obj->add_err = false; + INIT_WORK(&obj->remove_work, klp_remove_module_work_fn); klp_for_each_func_static(obj, func) { klp_init_func_early(obj, func); @@ -1063,6 +1079,7 @@ int klp_add_object(struct klp_object *obj) return 0; err_free: + obj->add_err = true; klp_free_object(obj, false); err: /* -- 2.16.4