[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140520125923.GA3771@treble.redhat.com>
Date: Tue, 20 May 2014 07:59:23 -0500
From: Josh Poimboeuf <jpoimboe@...hat.com>
To: Jiri Kosina <jkosina@...e.cz>
Cc: Steven Rostedt <rostedt@...dmis.org>,
Masami Hiramatsu <masami.hiramatsu.pt@...achi.com>,
Ingo Molnar <mingo@...nel.org>,
Frederic Weisbecker <fweisbec@...il.com>,
Seth Jennings <sjenning@...hat.com>,
Ingo Molnar <mingo@...hat.com>, Jiri Slaby <jslaby@...e.cz>,
linux-kernel@...r.kernel.org,
Peter Zijlstra <a.p.zijlstra@...llo.nl>,
Andrew Morton <akpm@...ux-foundation.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Thomas Gleixner <tglx@...utronix.de>
Subject: Re: [RFC PATCH 0/2] kpatch: dynamic kernel patching
On Tue, May 20, 2014 at 11:37:16AM +0200, Jiri Kosina wrote:
> On Fri, 16 May 2014, Josh Poimboeuf wrote:
>
> > > Consider this scenario:
> > >
> > > void foo()
> > > {
> > > for (i=0; i<10000; i++) {
> > > bar(i);
> > > something_else(i);
> > > }
> > > }
> > >
> > > Let's say you want to live-patch bar(). With stop_machine()-based aproach,
> > > you can easily end-up with old bar() and new bar() being called in two
> > > consecutive iterations before the loop is even exited, right? (especially
> > > on preemptible kernel, or if something_else() goes to sleep).
> >
> > Can you clarify why this would be a problem? Is it because the new
> > bar() changed some data semantics which confused foo() or
> > something_else()?
>
> I guess the example I used wasn't really completely illustrative, sorry
> for that. But I guess this has been answered later in the thread already;
> the thing is that you don't have a complete callgraph available (at least
> I believe you don't ...?), so you don't really know where your patched
> function will be called from, and thus you can't change function arguments
> or return value semantics; with lazy aproach, you can do that.
If the patch changes return semantics, it would also need to change all
the affected callers to handle the new semantics. But I think that's a
general statement for all patches, not just for the live patching case.
Otherwise it's just a bad patch in general.
For changed function arguments, the compiler will catch that and
recompile all the callers, so the kpatch tooling would detect that the
callers changed and patch them too.
But to be fair, here's an example where kGraft does better:
foo = bar();
something_else();
baz(foo);
Let's say that bar()'s return semantics change, and baz() is also
patched to handle the new semantics. If the stop_machine occurs in
something_else(), then the new baz() will be called with the old
"version" of foo.
If the user were smart enough to be aware of this potential scenario, it
could be solved with a kGraft-esque approach for data semantic changes,
where the patched baz() would need to handle both versions of foo.
This is another example of why changing return or data semantics is
tricky and should be avoided.
BTW, this is also an example of why the stop_machine and lazy approaches
aren't interchangeable. The patch creator has to know which method will
be used to apply the patch in order to be able to determine whether a
patch is "safe".
--
Josh
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists