lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <af90531e-219c-3515-1dc8-d86191902ea4@redhat.com>
Date:   Tue, 21 Jan 2020 11:11:45 +0000
From:   Julien Thierry <jthierry@...hat.com>
To:     Petr Mladek <pmladek@...e.com>, Jiri Kosina <jikos@...nel.org>,
        Josh Poimboeuf <jpoimboe@...hat.com>,
        Miroslav Benes <mbenes@...e.cz>
Cc:     Joe Lawrence <joe.lawrence@...hat.com>,
        Kamalesh Babulal <kamalesh@...ux.vnet.ibm.com>,
        Nicolai Stange <nstange@...e.de>,
        live-patching@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [POC 02/23] livepatch: Split livepatch modules per livepatched
 object

Hi Petr,

On 1/17/20 3:03 PM, Petr Mladek wrote:
> One livepatch module allows to fix vmlinux and any number of modules
> while providing some guarantees defined by the consistency model.
> 
> The patched modules can be loaded at any time: before, during,
> or after the livepatch module gets loaded. They can even get
> removed and loaded again. This variety of scenarios bring some
> troubles. For example, some livepatch symbols could be relocated
> only after the related module gets loaded. These changes need
> to get cleared when the module gets unloaded so that it can
> get eventually loaded again.
> 
> As a result some functionality needs to be duplicated by
> the livepatching code. Some elf sections need to be preserved
> even when they normally can be removed during the module load.
> Architecture specific code is involved which makes harder
> adding support for new architectures and the maintainace.
> 
> The solution is to split the livepatch module per livepatched
> object (vmlinux or module). Then both livepatch module and
> the livepatched modules could get loaded and removed at the
> same time.
> 
> This require many changes in the livepatch subsystem, module
> loader, sample livepatches and livepatches needed for selftests.
> 
> The bad news is that bisection will not work by definition.
> The good news is that it allows to do the changes in smaller
> steps.
> 
> The first step allows to split the existing sample and testing
> modules so that they can be later user. It is done by
> the following changes:
> 
> 1. struct klp_patch:
> 
>    + Add "patch_name" and "obj_names" to match all the related
>      livepatch modules.
> 
>    + Replace "objs" array with a pointer to a single struct object.
> 
>    + move "mod" to struct object.
> 
> 2. struct klp_object:
> 
>    + Add "patch_name" to match all the related livepatch modules.
> 
>    + "mod" points to the livepatch module instead of the livepatched
>      one. The pointer to the livepatched module was used only to
>      detect whether it was loaded. It will be always loaded
>      with related livepatch module now.
> 
> 3. klp_find_object_module() and klp_is_object_loaded() are no longer
>     needed. Livepatch module is loaded only when the related livepatched
>     module is loaded.
> 
> 4. Add klp_add_object() function that will need to initialize
>     struct object, link it into the related struct klp_patch,
>     and patch the functions. It will get implemented later.
> 
> The livepatches for modules are put into separate source files
> that define only struct klp_object() and call the new klp_add_object()
> in the init() callback. The name of the module follows the pattern:
> 
>    <patch_name>__<object_name>
> 

Is that a requirement? Or is it just the convention followed for the 
current tests?

> Signed-off-by: Petr Mladek <pmladek@...e.com>
> ---
>   arch/x86/kernel/livepatch.c                        |   5 +-
>   include/linux/livepatch.h                          |  20 +--
>   kernel/livepatch/core.c                            | 139 +++++++-----------
>   kernel/livepatch/core.h                            |   5 -
>   kernel/livepatch/transition.c                      |  14 +-
>   lib/livepatch/Makefile                             |   2 +
>   lib/livepatch/test_klp_atomic_replace.c            |  18 ++-
>   lib/livepatch/test_klp_callbacks_demo.c            |  90 ++++++------
>   lib/livepatch/test_klp_callbacks_demo.h            |  11 ++
>   lib/livepatch/test_klp_callbacks_demo2.c           |  62 ++++++---
>   lib/livepatch/test_klp_callbacks_demo2.h           |  11 ++
>   ...t_klp_callbacks_demo__test_klp_callbacks_busy.c |  50 +++++++
>   ...st_klp_callbacks_demo__test_klp_callbacks_mod.c |  42 ++++++
>   lib/livepatch/test_klp_livepatch.c                 |  18 ++-
>   lib/livepatch/test_klp_state.c                     |  53 ++++---
>   lib/livepatch/test_klp_state2.c                    |  53 ++++---
>   samples/livepatch/Makefile                         |   4 +
>   samples/livepatch/livepatch-callbacks-demo.c       |  90 ++++++------
>   samples/livepatch/livepatch-callbacks-demo.h       |  11 ++
>   ...h-callbacks-demo__livepatch-callbacks-busymod.c |  54 +++++++
>   ...patch-callbacks-demo__livepatch-callbacks-mod.c |  46 ++++++
>   samples/livepatch/livepatch-sample.c               |  18 ++-
>   samples/livepatch/livepatch-shadow-fix1.c          | 120 ++--------------
>   .../livepatch-shadow-fix1__livepatch-shadow-mod.c  | 155 +++++++++++++++++++++
>   samples/livepatch/livepatch-shadow-fix2.c          |  92 ++----------
>   .../livepatch-shadow-fix2__livepatch-shadow-mod.c  | 127 +++++++++++++++++
>   .../testing/selftests/livepatch/test-callbacks.sh  |  16 +--
>   27 files changed, 841 insertions(+), 485 deletions(-)
>   create mode 100644 lib/livepatch/test_klp_callbacks_demo.h
>   create mode 100644 lib/livepatch/test_klp_callbacks_demo2.h
>   create mode 100644 lib/livepatch/test_klp_callbacks_demo__test_klp_callbacks_busy.c
>   create mode 100644 lib/livepatch/test_klp_callbacks_demo__test_klp_callbacks_mod.c
>   create mode 100644 samples/livepatch/livepatch-callbacks-demo.h
>   create mode 100644 samples/livepatch/livepatch-callbacks-demo__livepatch-callbacks-busymod.c
>   create mode 100644 samples/livepatch/livepatch-callbacks-demo__livepatch-callbacks-mod.c
>   create mode 100644 samples/livepatch/livepatch-shadow-fix1__livepatch-shadow-mod.c
>   create mode 100644 samples/livepatch/livepatch-shadow-fix2__livepatch-shadow-mod.c
> 
> diff --git a/arch/x86/kernel/livepatch.c b/arch/x86/kernel/livepatch.c
> index 6a68e41206e7..728b44eaa168 100644
> --- a/arch/x86/kernel/livepatch.c
> +++ b/arch/x86/kernel/livepatch.c
> @@ -9,8 +9,7 @@
>   #include <asm/text-patching.h>
>   
>   /* Apply per-object alternatives. Based on x86 module_finalize() */
> -void arch_klp_init_object_loaded(struct klp_patch *patch,
> -				 struct klp_object *obj)
> +void arch_klp_init_object_loaded(struct klp_object *obj)
>   {
>   	int cnt;
>   	struct klp_modinfo *info;
> @@ -20,7 +19,7 @@ void arch_klp_init_object_loaded(struct klp_patch *patch,
>   	char sec_objname[MODULE_NAME_LEN];
>   	char secname[KSYM_NAME_LEN];
>   
> -	info = patch->mod->klp_info;
> +	info = obj->mod->klp_info;
>   	objname = obj->name ? obj->name : "vmlinux";
>   
>   	/* See livepatch core code for BUILD_BUG_ON() explanation */
> diff --git a/include/linux/livepatch.h b/include/linux/livepatch.h
> index e894e74905f3..a4567c17a9f2 100644
> --- a/include/linux/livepatch.h
> +++ b/include/linux/livepatch.h
> @@ -105,19 +105,21 @@ struct klp_callbacks {
>   /**
>    * struct klp_object - kernel object structure for live patching
>    * @name:	module name (or NULL for vmlinux)
> + * @patch_name:	module name for  vmlinux
> + * @mod:	reference to the live patch module for this object
>    * @funcs:	function entries for functions to be patched in the object
>    * @callbacks:	functions to be executed pre/post (un)patching
>    * @kobj:	kobject for sysfs resources
>    * @func_list:	dynamic list of the function entries
>    * @node:	list node for klp_patch obj_list
> - * @mod:	kernel module associated with the patched object
> - *		(NULL for vmlinux)
>    * @dynamic:    temporary object for nop functions; dynamically allocated
>    * @patched:	the object's funcs have been added to the klp_ops list
>    */
>   struct klp_object {
>   	/* external */
>   	const char *name;
> +	const char *patch_name;
> +	struct module *mod;
>   	struct klp_func *funcs;
>   	struct klp_callbacks callbacks;
>   
> @@ -125,7 +127,6 @@ struct klp_object {
>   	struct kobject kobj;
>   	struct list_head func_list;
>   	struct list_head node;
> -	struct module *mod;
>   	bool dynamic;
>   	bool patched;
>   };
> @@ -144,8 +145,9 @@ struct klp_state {
>   
>   /**
>    * struct klp_patch - patch structure for live patching
> - * @mod:	reference to the live patch module
> - * @objs:	object entries for kernel objects to be patched
> + * @patch_name: livepatch name; same for related livepatch against other objects

You forgot to add that to the structure.

> + * @objs:	object entry for vmlinux object

Nit: s/objs/obj/

> + * @obj_names:	names of modules synchronously livepatched with this patch

Not sure I understand the purpose of this. Is it to check that the 
klp_object that will get linked to this patch are part of a 
pre-established set?

>    * @states:	system states that can get modified
>    * @replace:	replace all actively used patches
>    * @list:	list node for global list of actively used patches
> @@ -158,9 +160,9 @@ struct klp_state {
>    */
>   struct klp_patch {
>   	/* external */
> -	struct module *mod;
> -	struct klp_object *objs;
>   	struct klp_state *states;
> +	struct klp_object *obj;
> +	char **obj_names;
>   	bool replace;
>   
>   	/* internal */
> @@ -194,9 +196,9 @@ struct klp_patch {
>   	list_for_each_entry(func, &obj->func_list, node)
>   
>   int klp_enable_patch(struct klp_patch *);
> +int klp_add_object(struct klp_object *);
>   
> -void arch_klp_init_object_loaded(struct klp_patch *patch,
> -				 struct klp_object *obj);
> +void arch_klp_init_object_loaded(struct klp_object *obj);
>   
>   /* Called from the module loader during module coming/going states */
>   int klp_module_coming(struct module *mod);
> diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c
> index c3512e7e0801..bb62c5407b75 100644
> --- a/kernel/livepatch/core.c
> +++ b/kernel/livepatch/core.c
> @@ -49,34 +49,6 @@ static bool klp_is_module(struct klp_object *obj)
>   	return obj->name;
>   }
>   
> -/* sets obj->mod if object is not vmlinux and module is found */
> -static void klp_find_object_module(struct klp_object *obj)
> -{
> -	struct module *mod;
> -
> -	if (!klp_is_module(obj))
> -		return;
> -
> -	mutex_lock(&module_mutex);
> -	/*
> -	 * We do not want to block removal of patched modules and therefore
> -	 * we do not take a reference here. The patches are removed by
> -	 * klp_module_going() instead.
> -	 */
> -	mod = find_module(obj->name);
> -	/*
> -	 * Do not mess work of klp_module_coming() and klp_module_going().
> -	 * Note that the patch might still be needed before klp_module_going()
> -	 * is called. Module functions can be called even in the GOING state
> -	 * until mod->exit() finishes. This is especially important for
> -	 * patches that modify semantic of the functions.
> -	 */
> -	if (mod && mod->klp_alive)
> -		obj->mod = mod;
> -
> -	mutex_unlock(&module_mutex);
> -}
> -
>   static bool klp_initialized(void)
>   {
>   	return !!klp_root_kobj;
> @@ -246,18 +218,16 @@ static int klp_resolve_symbols(Elf_Shdr *relasec, struct module *pmod)
>   	return 0;
>   }
>   
> -static int klp_write_object_relocations(struct module *pmod,
> -					struct klp_object *obj)
> +static int klp_write_object_relocations(struct klp_object *obj)
>   {
>   	int i, cnt, ret = 0;
>   	const char *objname, *secname;
>   	char sec_objname[MODULE_NAME_LEN];
> +	struct module *pmod;
>   	Elf_Shdr *sec;
>   
> -	if (WARN_ON(!klp_is_object_loaded(obj)))
> -		return -EINVAL;
> -
>   	objname = klp_is_module(obj) ? obj->name : "vmlinux";
> +	pmod = obj->mod;
>   
>   	/* For each klp relocation section */
>   	for (i = 1; i < pmod->klp_info->hdr.e_shnum; i++) {
> @@ -419,8 +389,8 @@ static void klp_free_object_dynamic(struct klp_object *obj)
>   
>   static void klp_init_func_early(struct klp_object *obj,
>   				struct klp_func *func);
> -static void klp_init_object_early(struct klp_patch *patch,
> -				  struct klp_object *obj);
> +static int klp_init_object_early(struct klp_patch *patch,
> +				 struct klp_object *obj);
>   
>   static struct klp_object *klp_alloc_object_dynamic(const char *name,
>   						   struct klp_patch *patch)
> @@ -662,7 +632,7 @@ static void klp_free_patch_finish(struct klp_patch *patch)
>   
>   	/* Put the module after the last access to struct klp_patch. */
>   	if (!patch->forced)
> -		module_put(patch->mod);
> +		module_put(patch->obj->mod);
>   }
>   
>   /*
> @@ -725,30 +695,28 @@ static int klp_init_func(struct klp_object *obj, struct klp_func *func)
>   }
>   
>   /* Arches may override this to finish any remaining arch-specific tasks */
> -void __weak arch_klp_init_object_loaded(struct klp_patch *patch,
> -					struct klp_object *obj)
> +void __weak arch_klp_init_object_loaded(struct klp_object *obj)
>   {
>   }
>   
>   /* parts of the initialization that is done only when the object is loaded */
> -static int klp_init_object_loaded(struct klp_patch *patch,
> -				  struct klp_object *obj)
> +static int klp_init_object_loaded(struct klp_object *obj)
>   {
>   	struct klp_func *func;
>   	int ret;
>   
>   	mutex_lock(&text_mutex);
>   
> -	module_disable_ro(patch->mod);
> -	ret = klp_write_object_relocations(patch->mod, obj);
> +	module_disable_ro(obj->mod);
> +	ret = klp_write_object_relocations(obj);
>   	if (ret) {
> -		module_enable_ro(patch->mod, true);
> +		module_enable_ro(obj->mod, true);
>   		mutex_unlock(&text_mutex);
>   		return ret;
>   	}
>   
> -	arch_klp_init_object_loaded(patch, obj);
> -	module_enable_ro(patch->mod, true);
> +	arch_klp_init_object_loaded(obj);
> +	module_enable_ro(obj->mod, true);
>   
>   	mutex_unlock(&text_mutex);
>   
> @@ -792,11 +760,8 @@ static int klp_init_object(struct klp_patch *patch, struct klp_object *obj)
>   		return -EINVAL;
>   
>   	obj->patched = false;
> -	obj->mod = NULL;
>   
> -	klp_find_object_module(obj);
> -
> -	name = klp_is_module(obj) ? obj->name : "vmlinux";
> +	name = obj->name ? obj->name : "vmlinux";
>   	ret = kobject_add(&obj->kobj, &patch->kobj, "%s", name);
>   	if (ret)
>   		return ret;
> @@ -807,8 +772,7 @@ static int klp_init_object(struct klp_patch *patch, struct klp_object *obj)
>   			return ret;
>   	}
>   
> -	if (klp_is_object_loaded(obj))
> -		ret = klp_init_object_loaded(patch, obj);
> +	ret = klp_init_object_loaded(obj);
>   
>   	return ret;
>   }
> @@ -820,20 +784,34 @@ static void klp_init_func_early(struct klp_object *obj,
>   	list_add_tail(&func->node, &obj->func_list);
>   }
>   
> -static void klp_init_object_early(struct klp_patch *patch,
> +static int klp_init_object_early(struct klp_patch *patch,
>   				  struct klp_object *obj)
>   {
> +	struct klp_func *func;
> +
> +	if (!obj->funcs)
> +		return -EINVAL;
> +
>   	INIT_LIST_HEAD(&obj->func_list);
>   	kobject_init(&obj->kobj, &klp_ktype_object);
>   	list_add_tail(&obj->node, &patch->obj_list);
> +
> +	klp_for_each_func_static(obj, func) {
> +		klp_init_func_early(obj, func);
> +	}
> +
> +	if (obj->dynamic || try_module_get(obj->mod))
> +		return 0;
> +
> +	return -ENODEV;
>   }
>   
>   static int klp_init_patch_early(struct klp_patch *patch)
>   {
> -	struct klp_object *obj;
> -	struct klp_func *func;
> +	struct klp_object *obj = patch->obj;
>   
> -	if (!patch->objs)
> +	/* Main patch module is always for vmlinux */
> +	if (obj->name)
>   		return -EINVAL;
>   
>   	INIT_LIST_HEAD(&patch->list);
> @@ -844,21 +822,7 @@ static int klp_init_patch_early(struct klp_patch *patch)
>   	INIT_WORK(&patch->free_work, klp_free_patch_work_fn);
>   	init_completion(&patch->finish);
>   
> -	klp_for_each_object_static(patch, obj) {

I think we can get rid of klp_for_each_object_static(), no? Now the 
klp_patch is only associated to a single klp_object, so everything will 
be dynamic. Is this correct?

> -		if (!obj->funcs)
> -			return -EINVAL;
> -
> -		klp_init_object_early(patch, obj);
> -
> -		klp_for_each_func_static(obj, func) {
> -			klp_init_func_early(obj, func);
> -		}
> -	}
> -
> -	if (!try_module_get(patch->mod))
> -		return -ENODEV;
> -
> -	return 0;
> +	return klp_init_object_early(patch, obj);
>   }
>   
>   static int klp_init_patch(struct klp_patch *patch)
> @@ -866,7 +830,7 @@ static int klp_init_patch(struct klp_patch *patch)
>   	struct klp_object *obj;
>   	int ret;
>   
> -	ret = kobject_add(&patch->kobj, klp_root_kobj, "%s", patch->mod->name);
> +	ret = kobject_add(&patch->kobj, klp_root_kobj, "%s", patch->obj->mod->name);
>   	if (ret)
>   		return ret;
>   
> @@ -887,6 +851,12 @@ static int klp_init_patch(struct klp_patch *patch)
>   	return 0;
>   }
>   
> +int klp_add_object(struct klp_object *obj)
> +{
> +	return 0;
> +}
> +EXPORT_SYMBOL_GPL(klp_add_object);
> +
>   static int __klp_disable_patch(struct klp_patch *patch)
>   {
>   	struct klp_object *obj;
> @@ -930,7 +900,7 @@ static int __klp_enable_patch(struct klp_patch *patch)
>   	if (WARN_ON(patch->enabled))
>   		return -EINVAL;
>   
> -	pr_notice("enabling patch '%s'\n", patch->mod->name);
> +	pr_notice("enabling patch '%s'\n", patch->obj->patch_name);
>   
>   	klp_init_transition(patch, KLP_PATCHED);
>   
> @@ -944,9 +914,6 @@ static int __klp_enable_patch(struct klp_patch *patch)
>   	smp_wmb();
>   
>   	klp_for_each_object(patch, obj) {
> -		if (!klp_is_object_loaded(obj))
> -			continue;
> -
>   		ret = klp_pre_patch_callback(obj);
>   		if (ret) {
>   			pr_warn("pre-patch callback failed for object '%s'\n",
> @@ -968,7 +935,7 @@ static int __klp_enable_patch(struct klp_patch *patch)
>   
>   	return 0;
>   err:
> -	pr_warn("failed to enable patch '%s'\n", patch->mod->name);
> +	pr_warn("failed to enable patch '%s'\n", patch->obj->patch_name);
>   
>   	klp_cancel_transition();
>   	return ret;
> @@ -991,12 +958,12 @@ int klp_enable_patch(struct klp_patch *patch)
>   {
>   	int ret;
>   
> -	if (!patch || !patch->mod)
> +	if (!patch || !patch->obj || !patch->obj->mod)
>   		return -EINVAL;
>   
> -	if (!is_livepatch_module(patch->mod)) {
> +	if (!is_livepatch_module(patch->obj->mod)) {
>   		pr_err("module %s is not marked as a livepatch module\n",
> -		       patch->mod->name);
> +		       patch->obj->patch_name);

Shouldn't that be "patch->obj->mod->name" ?

>   		return -EINVAL;
>   	}
>   
> @@ -1012,7 +979,7 @@ int klp_enable_patch(struct klp_patch *patch)
>   
>   	if (!klp_is_patch_compatible(patch)) {
>   		pr_err("Livepatch patch (%s) is not compatible with the already installed livepatches.\n",
> -			patch->mod->name);
> +			patch->obj->mod->name);
>   		mutex_unlock(&klp_mutex);
>   		return -EINVAL;
>   	}
> @@ -1119,7 +1086,7 @@ static void klp_cleanup_module_patches_limited(struct module *mod,
>   				klp_pre_unpatch_callback(obj);
>   
>   			pr_notice("reverting patch '%s' on unloading module '%s'\n",
> -				  patch->mod->name, obj->mod->name);
> +				  patch->obj->patch_name, obj->name);
>   			klp_unpatch_object(obj);
>   
>   			klp_post_unpatch_callback(obj);
> @@ -1154,15 +1121,15 @@ int klp_module_coming(struct module *mod)
>   
>   			obj->mod = mod;
>   
> -			ret = klp_init_object_loaded(patch, obj);
> +			ret = klp_init_object_loaded(obj);
>   			if (ret) {
>   				pr_warn("failed to initialize patch '%s' for module '%s' (%d)\n",
> -					patch->mod->name, obj->mod->name, ret);
> +					patch->obj->patch_name, obj->name, ret);
>   				goto err;
>   			}
>   
>   			pr_notice("applying patch '%s' to loading module '%s'\n",
> -				  patch->mod->name, obj->mod->name);
> +				  patch->obj->patch_name, obj->name);
>   
>   			ret = klp_pre_patch_callback(obj);
>   			if (ret) {
> @@ -1174,7 +1141,7 @@ int klp_module_coming(struct module *mod)
>   			ret = klp_patch_object(obj);
>   			if (ret) {
>   				pr_warn("failed to apply patch '%s' to module '%s' (%d)\n",
> -					patch->mod->name, obj->mod->name, ret);
> +					patch->obj->patch_name, obj->name, ret);
>   
>   				klp_post_unpatch_callback(obj);
>   				goto err;
> @@ -1197,7 +1164,7 @@ int klp_module_coming(struct module *mod)
>   	 * error to the module loader.
>   	 */
>   	pr_warn("patch '%s' failed for module '%s', refusing to load module '%s'\n",
> -		patch->mod->name, obj->mod->name, obj->mod->name);
> +		patch->obj->patch_name, obj->name, obj->name);
>   	mod->klp_alive = false;
>   	obj->mod = NULL;
>   	klp_cleanup_module_patches_limited(mod, patch);
> diff --git a/kernel/livepatch/core.h b/kernel/livepatch/core.h
> index 38209c7361b6..01980cc0509b 100644
> --- a/kernel/livepatch/core.h
> +++ b/kernel/livepatch/core.h
> @@ -18,11 +18,6 @@ void klp_free_replaced_patches_async(struct klp_patch *new_patch);
>   void klp_unpatch_replaced_patches(struct klp_patch *new_patch);
>   void klp_discard_nops(struct klp_patch *new_patch);
>   
> -static inline bool klp_is_object_loaded(struct klp_object *obj)
> -{
> -	return !obj->name || obj->mod;
> -}
> -
>   static inline int klp_pre_patch_callback(struct klp_object *obj)
>   {
>   	int ret = 0;
> diff --git a/kernel/livepatch/transition.c b/kernel/livepatch/transition.c
> index f6310f848f34..78e3280560cd 100644
> --- a/kernel/livepatch/transition.c
> +++ b/kernel/livepatch/transition.c
> @@ -74,7 +74,7 @@ static void klp_complete_transition(void)
>   	unsigned int cpu;
>   
>   	pr_debug("'%s': completing %s transition\n",
> -		 klp_transition_patch->mod->name,
> +		 klp_transition_patch->obj->patch_name,
>   		 klp_target_state == KLP_PATCHED ? "patching" : "unpatching");
>   
>   	if (klp_transition_patch->replace && klp_target_state == KLP_PATCHED) {
> @@ -120,15 +120,13 @@ static void klp_complete_transition(void)
>   	}
>   
>   	klp_for_each_object(klp_transition_patch, obj) {
> -		if (!klp_is_object_loaded(obj))
> -			continue;
>   		if (klp_target_state == KLP_PATCHED)
>   			klp_post_patch_callback(obj);
>   		else if (klp_target_state == KLP_UNPATCHED)
>   			klp_post_unpatch_callback(obj);
>   	}
>   
> -	pr_notice("'%s': %s complete\n", klp_transition_patch->mod->name,
> +	pr_notice("'%s': %s complete\n", klp_transition_patch->obj->patch_name,
>   		  klp_target_state == KLP_PATCHED ? "patching" : "unpatching");
>   
>   	klp_target_state = KLP_UNDEFINED;
> @@ -147,7 +145,7 @@ void klp_cancel_transition(void)
>   		return;
>   
>   	pr_debug("'%s': canceling patching transition, going to unpatch\n",
> -		 klp_transition_patch->mod->name);
> +		 klp_transition_patch->obj->patch_name);
>   
>   	klp_target_state = KLP_UNPATCHED;
>   	klp_complete_transition();
> @@ -468,7 +466,7 @@ void klp_start_transition(void)
>   	WARN_ON_ONCE(klp_target_state == KLP_UNDEFINED);
>   
>   	pr_notice("'%s': starting %s transition\n",
> -		  klp_transition_patch->mod->name,
> +		  klp_transition_patch->obj->patch_name,

Isn't the transition per livepatched module rather than per-patch now?
If so, would it make more sense to display also the name of the module 
being patched/unpatched?

>   		  klp_target_state == KLP_PATCHED ? "patching" : "unpatching");
>   
>   	/*
> @@ -519,7 +517,7 @@ void klp_init_transition(struct klp_patch *patch, int state)
>   	 */
>   	klp_target_state = state;
>   
> -	pr_debug("'%s': initializing %s transition\n", patch->mod->name,
> +	pr_debug("'%s': initializing %s transition\n", patch->obj->patch_name,

Ditto.

>   		 klp_target_state == KLP_PATCHED ? "patching" : "unpatching");
>   
>   	/*
> @@ -581,7 +579,7 @@ void klp_reverse_transition(void)
>   	struct task_struct *g, *task;
>   
>   	pr_debug("'%s': reversing transition from %s\n",
> -		 klp_transition_patch->mod->name,
> +		 klp_transition_patch->obj->patch_name,

Ditto.

>   		 klp_target_state == KLP_PATCHED ? "patching to unpatching" :
>   						   "unpatching to patching");
>   

[...]

Cheers,

-- 
Julien Thierry

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ