1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * core.c - Kernel Live Patching Core
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright (C) 2014 Seth Jennings <sjenning@redhat.com>
6*4882a593Smuzhiyun * Copyright (C) 2014 SUSE
7*4882a593Smuzhiyun */
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10*4882a593Smuzhiyun
11*4882a593Smuzhiyun #include <linux/module.h>
12*4882a593Smuzhiyun #include <linux/kernel.h>
13*4882a593Smuzhiyun #include <linux/mutex.h>
14*4882a593Smuzhiyun #include <linux/slab.h>
15*4882a593Smuzhiyun #include <linux/list.h>
16*4882a593Smuzhiyun #include <linux/kallsyms.h>
17*4882a593Smuzhiyun #include <linux/livepatch.h>
18*4882a593Smuzhiyun #include <linux/elf.h>
19*4882a593Smuzhiyun #include <linux/moduleloader.h>
20*4882a593Smuzhiyun #include <linux/completion.h>
21*4882a593Smuzhiyun #include <linux/memory.h>
22*4882a593Smuzhiyun #include <asm/cacheflush.h>
23*4882a593Smuzhiyun #include "core.h"
24*4882a593Smuzhiyun #include "patch.h"
25*4882a593Smuzhiyun #include "state.h"
26*4882a593Smuzhiyun #include "transition.h"
27*4882a593Smuzhiyun
28*4882a593Smuzhiyun /*
29*4882a593Smuzhiyun * klp_mutex is a coarse lock which serializes access to klp data. All
30*4882a593Smuzhiyun * accesses to klp-related variables and structures must have mutex protection,
31*4882a593Smuzhiyun * except within the following functions which carefully avoid the need for it:
32*4882a593Smuzhiyun *
33*4882a593Smuzhiyun * - klp_ftrace_handler()
34*4882a593Smuzhiyun * - klp_update_patch_state()
35*4882a593Smuzhiyun */
36*4882a593Smuzhiyun DEFINE_MUTEX(klp_mutex);
37*4882a593Smuzhiyun
38*4882a593Smuzhiyun /*
39*4882a593Smuzhiyun * Actively used patches: enabled or in transition. Note that replaced
40*4882a593Smuzhiyun * or disabled patches are not listed even though the related kernel
41*4882a593Smuzhiyun * module still can be loaded.
42*4882a593Smuzhiyun */
43*4882a593Smuzhiyun LIST_HEAD(klp_patches);
44*4882a593Smuzhiyun
45*4882a593Smuzhiyun static struct kobject *klp_root_kobj;
46*4882a593Smuzhiyun
klp_is_module(struct klp_object * obj)47*4882a593Smuzhiyun static bool klp_is_module(struct klp_object *obj)
48*4882a593Smuzhiyun {
49*4882a593Smuzhiyun return obj->name;
50*4882a593Smuzhiyun }
51*4882a593Smuzhiyun
52*4882a593Smuzhiyun /* sets obj->mod if object is not vmlinux and module is found */
klp_find_object_module(struct klp_object * obj)53*4882a593Smuzhiyun static void klp_find_object_module(struct klp_object *obj)
54*4882a593Smuzhiyun {
55*4882a593Smuzhiyun struct module *mod;
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun if (!klp_is_module(obj))
58*4882a593Smuzhiyun return;
59*4882a593Smuzhiyun
60*4882a593Smuzhiyun mutex_lock(&module_mutex);
61*4882a593Smuzhiyun /*
62*4882a593Smuzhiyun * We do not want to block removal of patched modules and therefore
63*4882a593Smuzhiyun * we do not take a reference here. The patches are removed by
64*4882a593Smuzhiyun * klp_module_going() instead.
65*4882a593Smuzhiyun */
66*4882a593Smuzhiyun mod = find_module(obj->name);
67*4882a593Smuzhiyun /*
68*4882a593Smuzhiyun * Do not mess work of klp_module_coming() and klp_module_going().
69*4882a593Smuzhiyun * Note that the patch might still be needed before klp_module_going()
70*4882a593Smuzhiyun * is called. Module functions can be called even in the GOING state
71*4882a593Smuzhiyun * until mod->exit() finishes. This is especially important for
72*4882a593Smuzhiyun * patches that modify semantic of the functions.
73*4882a593Smuzhiyun */
74*4882a593Smuzhiyun if (mod && mod->klp_alive)
75*4882a593Smuzhiyun obj->mod = mod;
76*4882a593Smuzhiyun
77*4882a593Smuzhiyun mutex_unlock(&module_mutex);
78*4882a593Smuzhiyun }
79*4882a593Smuzhiyun
klp_initialized(void)80*4882a593Smuzhiyun static bool klp_initialized(void)
81*4882a593Smuzhiyun {
82*4882a593Smuzhiyun return !!klp_root_kobj;
83*4882a593Smuzhiyun }
84*4882a593Smuzhiyun
klp_find_func(struct klp_object * obj,struct klp_func * old_func)85*4882a593Smuzhiyun static struct klp_func *klp_find_func(struct klp_object *obj,
86*4882a593Smuzhiyun struct klp_func *old_func)
87*4882a593Smuzhiyun {
88*4882a593Smuzhiyun struct klp_func *func;
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun klp_for_each_func(obj, func) {
91*4882a593Smuzhiyun if ((strcmp(old_func->old_name, func->old_name) == 0) &&
92*4882a593Smuzhiyun (old_func->old_sympos == func->old_sympos)) {
93*4882a593Smuzhiyun return func;
94*4882a593Smuzhiyun }
95*4882a593Smuzhiyun }
96*4882a593Smuzhiyun
97*4882a593Smuzhiyun return NULL;
98*4882a593Smuzhiyun }
99*4882a593Smuzhiyun
klp_find_object(struct klp_patch * patch,struct klp_object * old_obj)100*4882a593Smuzhiyun static struct klp_object *klp_find_object(struct klp_patch *patch,
101*4882a593Smuzhiyun struct klp_object *old_obj)
102*4882a593Smuzhiyun {
103*4882a593Smuzhiyun struct klp_object *obj;
104*4882a593Smuzhiyun
105*4882a593Smuzhiyun klp_for_each_object(patch, obj) {
106*4882a593Smuzhiyun if (klp_is_module(old_obj)) {
107*4882a593Smuzhiyun if (klp_is_module(obj) &&
108*4882a593Smuzhiyun strcmp(old_obj->name, obj->name) == 0) {
109*4882a593Smuzhiyun return obj;
110*4882a593Smuzhiyun }
111*4882a593Smuzhiyun } else if (!klp_is_module(obj)) {
112*4882a593Smuzhiyun return obj;
113*4882a593Smuzhiyun }
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun
116*4882a593Smuzhiyun return NULL;
117*4882a593Smuzhiyun }
118*4882a593Smuzhiyun
119*4882a593Smuzhiyun struct klp_find_arg {
120*4882a593Smuzhiyun const char *objname;
121*4882a593Smuzhiyun const char *name;
122*4882a593Smuzhiyun unsigned long addr;
123*4882a593Smuzhiyun unsigned long count;
124*4882a593Smuzhiyun unsigned long pos;
125*4882a593Smuzhiyun };
126*4882a593Smuzhiyun
klp_find_callback(void * data,const char * name,struct module * mod,unsigned long addr)127*4882a593Smuzhiyun static int klp_find_callback(void *data, const char *name,
128*4882a593Smuzhiyun struct module *mod, unsigned long addr)
129*4882a593Smuzhiyun {
130*4882a593Smuzhiyun struct klp_find_arg *args = data;
131*4882a593Smuzhiyun
132*4882a593Smuzhiyun if ((mod && !args->objname) || (!mod && args->objname))
133*4882a593Smuzhiyun return 0;
134*4882a593Smuzhiyun
135*4882a593Smuzhiyun if (strcmp(args->name, name))
136*4882a593Smuzhiyun return 0;
137*4882a593Smuzhiyun
138*4882a593Smuzhiyun if (args->objname && strcmp(args->objname, mod->name))
139*4882a593Smuzhiyun return 0;
140*4882a593Smuzhiyun
141*4882a593Smuzhiyun args->addr = addr;
142*4882a593Smuzhiyun args->count++;
143*4882a593Smuzhiyun
144*4882a593Smuzhiyun /*
145*4882a593Smuzhiyun * Finish the search when the symbol is found for the desired position
146*4882a593Smuzhiyun * or the position is not defined for a non-unique symbol.
147*4882a593Smuzhiyun */
148*4882a593Smuzhiyun if ((args->pos && (args->count == args->pos)) ||
149*4882a593Smuzhiyun (!args->pos && (args->count > 1)))
150*4882a593Smuzhiyun return 1;
151*4882a593Smuzhiyun
152*4882a593Smuzhiyun return 0;
153*4882a593Smuzhiyun }
154*4882a593Smuzhiyun
klp_find_object_symbol(const char * objname,const char * name,unsigned long sympos,unsigned long * addr)155*4882a593Smuzhiyun static int klp_find_object_symbol(const char *objname, const char *name,
156*4882a593Smuzhiyun unsigned long sympos, unsigned long *addr)
157*4882a593Smuzhiyun {
158*4882a593Smuzhiyun struct klp_find_arg args = {
159*4882a593Smuzhiyun .objname = objname,
160*4882a593Smuzhiyun .name = name,
161*4882a593Smuzhiyun .addr = 0,
162*4882a593Smuzhiyun .count = 0,
163*4882a593Smuzhiyun .pos = sympos,
164*4882a593Smuzhiyun };
165*4882a593Smuzhiyun
166*4882a593Smuzhiyun mutex_lock(&module_mutex);
167*4882a593Smuzhiyun if (objname)
168*4882a593Smuzhiyun module_kallsyms_on_each_symbol(klp_find_callback, &args);
169*4882a593Smuzhiyun else
170*4882a593Smuzhiyun kallsyms_on_each_symbol(klp_find_callback, &args);
171*4882a593Smuzhiyun mutex_unlock(&module_mutex);
172*4882a593Smuzhiyun
173*4882a593Smuzhiyun /*
174*4882a593Smuzhiyun * Ensure an address was found. If sympos is 0, ensure symbol is unique;
175*4882a593Smuzhiyun * otherwise ensure the symbol position count matches sympos.
176*4882a593Smuzhiyun */
177*4882a593Smuzhiyun if (args.addr == 0)
178*4882a593Smuzhiyun pr_err("symbol '%s' not found in symbol table\n", name);
179*4882a593Smuzhiyun else if (args.count > 1 && sympos == 0) {
180*4882a593Smuzhiyun pr_err("unresolvable ambiguity for symbol '%s' in object '%s'\n",
181*4882a593Smuzhiyun name, objname);
182*4882a593Smuzhiyun } else if (sympos != args.count && sympos > 0) {
183*4882a593Smuzhiyun pr_err("symbol position %lu for symbol '%s' in object '%s' not found\n",
184*4882a593Smuzhiyun sympos, name, objname ? objname : "vmlinux");
185*4882a593Smuzhiyun } else {
186*4882a593Smuzhiyun *addr = args.addr;
187*4882a593Smuzhiyun return 0;
188*4882a593Smuzhiyun }
189*4882a593Smuzhiyun
190*4882a593Smuzhiyun *addr = 0;
191*4882a593Smuzhiyun return -EINVAL;
192*4882a593Smuzhiyun }
193*4882a593Smuzhiyun
klp_resolve_symbols(Elf_Shdr * sechdrs,const char * strtab,unsigned int symndx,Elf_Shdr * relasec,const char * sec_objname)194*4882a593Smuzhiyun static int klp_resolve_symbols(Elf_Shdr *sechdrs, const char *strtab,
195*4882a593Smuzhiyun unsigned int symndx, Elf_Shdr *relasec,
196*4882a593Smuzhiyun const char *sec_objname)
197*4882a593Smuzhiyun {
198*4882a593Smuzhiyun int i, cnt, ret;
199*4882a593Smuzhiyun char sym_objname[MODULE_NAME_LEN];
200*4882a593Smuzhiyun char sym_name[KSYM_NAME_LEN];
201*4882a593Smuzhiyun Elf_Rela *relas;
202*4882a593Smuzhiyun Elf_Sym *sym;
203*4882a593Smuzhiyun unsigned long sympos, addr;
204*4882a593Smuzhiyun bool sym_vmlinux;
205*4882a593Smuzhiyun bool sec_vmlinux = !strcmp(sec_objname, "vmlinux");
206*4882a593Smuzhiyun
207*4882a593Smuzhiyun /*
208*4882a593Smuzhiyun * Since the field widths for sym_objname and sym_name in the sscanf()
209*4882a593Smuzhiyun * call are hard-coded and correspond to MODULE_NAME_LEN and
210*4882a593Smuzhiyun * KSYM_NAME_LEN respectively, we must make sure that MODULE_NAME_LEN
211*4882a593Smuzhiyun * and KSYM_NAME_LEN have the values we expect them to have.
212*4882a593Smuzhiyun *
213*4882a593Smuzhiyun * Because the value of MODULE_NAME_LEN can differ among architectures,
214*4882a593Smuzhiyun * we use the smallest/strictest upper bound possible (56, based on
215*4882a593Smuzhiyun * the current definition of MODULE_NAME_LEN) to prevent overflows.
216*4882a593Smuzhiyun */
217*4882a593Smuzhiyun BUILD_BUG_ON(MODULE_NAME_LEN < 56 || KSYM_NAME_LEN != 128);
218*4882a593Smuzhiyun
219*4882a593Smuzhiyun relas = (Elf_Rela *) relasec->sh_addr;
220*4882a593Smuzhiyun /* For each rela in this klp relocation section */
221*4882a593Smuzhiyun for (i = 0; i < relasec->sh_size / sizeof(Elf_Rela); i++) {
222*4882a593Smuzhiyun sym = (Elf_Sym *)sechdrs[symndx].sh_addr + ELF_R_SYM(relas[i].r_info);
223*4882a593Smuzhiyun if (sym->st_shndx != SHN_LIVEPATCH) {
224*4882a593Smuzhiyun pr_err("symbol %s is not marked as a livepatch symbol\n",
225*4882a593Smuzhiyun strtab + sym->st_name);
226*4882a593Smuzhiyun return -EINVAL;
227*4882a593Smuzhiyun }
228*4882a593Smuzhiyun
229*4882a593Smuzhiyun /* Format: .klp.sym.sym_objname.sym_name,sympos */
230*4882a593Smuzhiyun cnt = sscanf(strtab + sym->st_name,
231*4882a593Smuzhiyun ".klp.sym.%55[^.].%127[^,],%lu",
232*4882a593Smuzhiyun sym_objname, sym_name, &sympos);
233*4882a593Smuzhiyun if (cnt != 3) {
234*4882a593Smuzhiyun pr_err("symbol %s has an incorrectly formatted name\n",
235*4882a593Smuzhiyun strtab + sym->st_name);
236*4882a593Smuzhiyun return -EINVAL;
237*4882a593Smuzhiyun }
238*4882a593Smuzhiyun
239*4882a593Smuzhiyun sym_vmlinux = !strcmp(sym_objname, "vmlinux");
240*4882a593Smuzhiyun
241*4882a593Smuzhiyun /*
242*4882a593Smuzhiyun * Prevent module-specific KLP rela sections from referencing
243*4882a593Smuzhiyun * vmlinux symbols. This helps prevent ordering issues with
244*4882a593Smuzhiyun * module special section initializations. Presumably such
245*4882a593Smuzhiyun * symbols are exported and normal relas can be used instead.
246*4882a593Smuzhiyun */
247*4882a593Smuzhiyun if (!sec_vmlinux && sym_vmlinux) {
248*4882a593Smuzhiyun pr_err("invalid access to vmlinux symbol '%s' from module-specific livepatch relocation section",
249*4882a593Smuzhiyun sym_name);
250*4882a593Smuzhiyun return -EINVAL;
251*4882a593Smuzhiyun }
252*4882a593Smuzhiyun
253*4882a593Smuzhiyun /* klp_find_object_symbol() treats a NULL objname as vmlinux */
254*4882a593Smuzhiyun ret = klp_find_object_symbol(sym_vmlinux ? NULL : sym_objname,
255*4882a593Smuzhiyun sym_name, sympos, &addr);
256*4882a593Smuzhiyun if (ret)
257*4882a593Smuzhiyun return ret;
258*4882a593Smuzhiyun
259*4882a593Smuzhiyun sym->st_value = addr;
260*4882a593Smuzhiyun }
261*4882a593Smuzhiyun
262*4882a593Smuzhiyun return 0;
263*4882a593Smuzhiyun }
264*4882a593Smuzhiyun
265*4882a593Smuzhiyun /*
266*4882a593Smuzhiyun * At a high-level, there are two types of klp relocation sections: those which
267*4882a593Smuzhiyun * reference symbols which live in vmlinux; and those which reference symbols
268*4882a593Smuzhiyun * which live in other modules. This function is called for both types:
269*4882a593Smuzhiyun *
270*4882a593Smuzhiyun * 1) When a klp module itself loads, the module code calls this function to
271*4882a593Smuzhiyun * write vmlinux-specific klp relocations (.klp.rela.vmlinux.* sections).
272*4882a593Smuzhiyun * These relocations are written to the klp module text to allow the patched
273*4882a593Smuzhiyun * code/data to reference unexported vmlinux symbols. They're written as
274*4882a593Smuzhiyun * early as possible to ensure that other module init code (.e.g.,
275*4882a593Smuzhiyun * jump_label_apply_nops) can access any unexported vmlinux symbols which
276*4882a593Smuzhiyun * might be referenced by the klp module's special sections.
277*4882a593Smuzhiyun *
278*4882a593Smuzhiyun * 2) When a to-be-patched module loads -- or is already loaded when a
279*4882a593Smuzhiyun * corresponding klp module loads -- klp code calls this function to write
280*4882a593Smuzhiyun * module-specific klp relocations (.klp.rela.{module}.* sections). These
281*4882a593Smuzhiyun * are written to the klp module text to allow the patched code/data to
282*4882a593Smuzhiyun * reference symbols which live in the to-be-patched module or one of its
283*4882a593Smuzhiyun * module dependencies. Exported symbols are supported, in addition to
284*4882a593Smuzhiyun * unexported symbols, in order to enable late module patching, which allows
285*4882a593Smuzhiyun * the to-be-patched module to be loaded and patched sometime *after* the
286*4882a593Smuzhiyun * klp module is loaded.
287*4882a593Smuzhiyun */
klp_apply_section_relocs(struct module * pmod,Elf_Shdr * sechdrs,const char * shstrtab,const char * strtab,unsigned int symndx,unsigned int secndx,const char * objname)288*4882a593Smuzhiyun int klp_apply_section_relocs(struct module *pmod, Elf_Shdr *sechdrs,
289*4882a593Smuzhiyun const char *shstrtab, const char *strtab,
290*4882a593Smuzhiyun unsigned int symndx, unsigned int secndx,
291*4882a593Smuzhiyun const char *objname)
292*4882a593Smuzhiyun {
293*4882a593Smuzhiyun int cnt, ret;
294*4882a593Smuzhiyun char sec_objname[MODULE_NAME_LEN];
295*4882a593Smuzhiyun Elf_Shdr *sec = sechdrs + secndx;
296*4882a593Smuzhiyun
297*4882a593Smuzhiyun /*
298*4882a593Smuzhiyun * Format: .klp.rela.sec_objname.section_name
299*4882a593Smuzhiyun * See comment in klp_resolve_symbols() for an explanation
300*4882a593Smuzhiyun * of the selected field width value.
301*4882a593Smuzhiyun */
302*4882a593Smuzhiyun cnt = sscanf(shstrtab + sec->sh_name, ".klp.rela.%55[^.]",
303*4882a593Smuzhiyun sec_objname);
304*4882a593Smuzhiyun if (cnt != 1) {
305*4882a593Smuzhiyun pr_err("section %s has an incorrectly formatted name\n",
306*4882a593Smuzhiyun shstrtab + sec->sh_name);
307*4882a593Smuzhiyun return -EINVAL;
308*4882a593Smuzhiyun }
309*4882a593Smuzhiyun
310*4882a593Smuzhiyun if (strcmp(objname ? objname : "vmlinux", sec_objname))
311*4882a593Smuzhiyun return 0;
312*4882a593Smuzhiyun
313*4882a593Smuzhiyun ret = klp_resolve_symbols(sechdrs, strtab, symndx, sec, sec_objname);
314*4882a593Smuzhiyun if (ret)
315*4882a593Smuzhiyun return ret;
316*4882a593Smuzhiyun
317*4882a593Smuzhiyun return apply_relocate_add(sechdrs, strtab, symndx, secndx, pmod);
318*4882a593Smuzhiyun }
319*4882a593Smuzhiyun
320*4882a593Smuzhiyun /*
321*4882a593Smuzhiyun * Sysfs Interface
322*4882a593Smuzhiyun *
323*4882a593Smuzhiyun * /sys/kernel/livepatch
324*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>
325*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>/enabled
326*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>/transition
327*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>/force
328*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>/<object>
329*4882a593Smuzhiyun * /sys/kernel/livepatch/<patch>/<object>/<function,sympos>
330*4882a593Smuzhiyun */
331*4882a593Smuzhiyun static int __klp_disable_patch(struct klp_patch *patch);
332*4882a593Smuzhiyun
enabled_store(struct kobject * kobj,struct kobj_attribute * attr,const char * buf,size_t count)333*4882a593Smuzhiyun static ssize_t enabled_store(struct kobject *kobj, struct kobj_attribute *attr,
334*4882a593Smuzhiyun const char *buf, size_t count)
335*4882a593Smuzhiyun {
336*4882a593Smuzhiyun struct klp_patch *patch;
337*4882a593Smuzhiyun int ret;
338*4882a593Smuzhiyun bool enabled;
339*4882a593Smuzhiyun
340*4882a593Smuzhiyun ret = kstrtobool(buf, &enabled);
341*4882a593Smuzhiyun if (ret)
342*4882a593Smuzhiyun return ret;
343*4882a593Smuzhiyun
344*4882a593Smuzhiyun patch = container_of(kobj, struct klp_patch, kobj);
345*4882a593Smuzhiyun
346*4882a593Smuzhiyun mutex_lock(&klp_mutex);
347*4882a593Smuzhiyun
348*4882a593Smuzhiyun if (patch->enabled == enabled) {
349*4882a593Smuzhiyun /* already in requested state */
350*4882a593Smuzhiyun ret = -EINVAL;
351*4882a593Smuzhiyun goto out;
352*4882a593Smuzhiyun }
353*4882a593Smuzhiyun
354*4882a593Smuzhiyun /*
355*4882a593Smuzhiyun * Allow to reverse a pending transition in both ways. It might be
356*4882a593Smuzhiyun * necessary to complete the transition without forcing and breaking
357*4882a593Smuzhiyun * the system integrity.
358*4882a593Smuzhiyun *
359*4882a593Smuzhiyun * Do not allow to re-enable a disabled patch.
360*4882a593Smuzhiyun */
361*4882a593Smuzhiyun if (patch == klp_transition_patch)
362*4882a593Smuzhiyun klp_reverse_transition();
363*4882a593Smuzhiyun else if (!enabled)
364*4882a593Smuzhiyun ret = __klp_disable_patch(patch);
365*4882a593Smuzhiyun else
366*4882a593Smuzhiyun ret = -EINVAL;
367*4882a593Smuzhiyun
368*4882a593Smuzhiyun out:
369*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
370*4882a593Smuzhiyun
371*4882a593Smuzhiyun if (ret)
372*4882a593Smuzhiyun return ret;
373*4882a593Smuzhiyun return count;
374*4882a593Smuzhiyun }
375*4882a593Smuzhiyun
enabled_show(struct kobject * kobj,struct kobj_attribute * attr,char * buf)376*4882a593Smuzhiyun static ssize_t enabled_show(struct kobject *kobj,
377*4882a593Smuzhiyun struct kobj_attribute *attr, char *buf)
378*4882a593Smuzhiyun {
379*4882a593Smuzhiyun struct klp_patch *patch;
380*4882a593Smuzhiyun
381*4882a593Smuzhiyun patch = container_of(kobj, struct klp_patch, kobj);
382*4882a593Smuzhiyun return snprintf(buf, PAGE_SIZE-1, "%d\n", patch->enabled);
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun
transition_show(struct kobject * kobj,struct kobj_attribute * attr,char * buf)385*4882a593Smuzhiyun static ssize_t transition_show(struct kobject *kobj,
386*4882a593Smuzhiyun struct kobj_attribute *attr, char *buf)
387*4882a593Smuzhiyun {
388*4882a593Smuzhiyun struct klp_patch *patch;
389*4882a593Smuzhiyun
390*4882a593Smuzhiyun patch = container_of(kobj, struct klp_patch, kobj);
391*4882a593Smuzhiyun return snprintf(buf, PAGE_SIZE-1, "%d\n",
392*4882a593Smuzhiyun patch == klp_transition_patch);
393*4882a593Smuzhiyun }
394*4882a593Smuzhiyun
force_store(struct kobject * kobj,struct kobj_attribute * attr,const char * buf,size_t count)395*4882a593Smuzhiyun static ssize_t force_store(struct kobject *kobj, struct kobj_attribute *attr,
396*4882a593Smuzhiyun const char *buf, size_t count)
397*4882a593Smuzhiyun {
398*4882a593Smuzhiyun struct klp_patch *patch;
399*4882a593Smuzhiyun int ret;
400*4882a593Smuzhiyun bool val;
401*4882a593Smuzhiyun
402*4882a593Smuzhiyun ret = kstrtobool(buf, &val);
403*4882a593Smuzhiyun if (ret)
404*4882a593Smuzhiyun return ret;
405*4882a593Smuzhiyun
406*4882a593Smuzhiyun if (!val)
407*4882a593Smuzhiyun return count;
408*4882a593Smuzhiyun
409*4882a593Smuzhiyun mutex_lock(&klp_mutex);
410*4882a593Smuzhiyun
411*4882a593Smuzhiyun patch = container_of(kobj, struct klp_patch, kobj);
412*4882a593Smuzhiyun if (patch != klp_transition_patch) {
413*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
414*4882a593Smuzhiyun return -EINVAL;
415*4882a593Smuzhiyun }
416*4882a593Smuzhiyun
417*4882a593Smuzhiyun klp_force_transition();
418*4882a593Smuzhiyun
419*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
420*4882a593Smuzhiyun
421*4882a593Smuzhiyun return count;
422*4882a593Smuzhiyun }
423*4882a593Smuzhiyun
424*4882a593Smuzhiyun static struct kobj_attribute enabled_kobj_attr = __ATTR_RW(enabled);
425*4882a593Smuzhiyun static struct kobj_attribute transition_kobj_attr = __ATTR_RO(transition);
426*4882a593Smuzhiyun static struct kobj_attribute force_kobj_attr = __ATTR_WO(force);
427*4882a593Smuzhiyun static struct attribute *klp_patch_attrs[] = {
428*4882a593Smuzhiyun &enabled_kobj_attr.attr,
429*4882a593Smuzhiyun &transition_kobj_attr.attr,
430*4882a593Smuzhiyun &force_kobj_attr.attr,
431*4882a593Smuzhiyun NULL
432*4882a593Smuzhiyun };
433*4882a593Smuzhiyun ATTRIBUTE_GROUPS(klp_patch);
434*4882a593Smuzhiyun
klp_free_object_dynamic(struct klp_object * obj)435*4882a593Smuzhiyun static void klp_free_object_dynamic(struct klp_object *obj)
436*4882a593Smuzhiyun {
437*4882a593Smuzhiyun kfree(obj->name);
438*4882a593Smuzhiyun kfree(obj);
439*4882a593Smuzhiyun }
440*4882a593Smuzhiyun
441*4882a593Smuzhiyun static void klp_init_func_early(struct klp_object *obj,
442*4882a593Smuzhiyun struct klp_func *func);
443*4882a593Smuzhiyun static void klp_init_object_early(struct klp_patch *patch,
444*4882a593Smuzhiyun struct klp_object *obj);
445*4882a593Smuzhiyun
klp_alloc_object_dynamic(const char * name,struct klp_patch * patch)446*4882a593Smuzhiyun static struct klp_object *klp_alloc_object_dynamic(const char *name,
447*4882a593Smuzhiyun struct klp_patch *patch)
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun struct klp_object *obj;
450*4882a593Smuzhiyun
451*4882a593Smuzhiyun obj = kzalloc(sizeof(*obj), GFP_KERNEL);
452*4882a593Smuzhiyun if (!obj)
453*4882a593Smuzhiyun return NULL;
454*4882a593Smuzhiyun
455*4882a593Smuzhiyun if (name) {
456*4882a593Smuzhiyun obj->name = kstrdup(name, GFP_KERNEL);
457*4882a593Smuzhiyun if (!obj->name) {
458*4882a593Smuzhiyun kfree(obj);
459*4882a593Smuzhiyun return NULL;
460*4882a593Smuzhiyun }
461*4882a593Smuzhiyun }
462*4882a593Smuzhiyun
463*4882a593Smuzhiyun klp_init_object_early(patch, obj);
464*4882a593Smuzhiyun obj->dynamic = true;
465*4882a593Smuzhiyun
466*4882a593Smuzhiyun return obj;
467*4882a593Smuzhiyun }
468*4882a593Smuzhiyun
klp_free_func_nop(struct klp_func * func)469*4882a593Smuzhiyun static void klp_free_func_nop(struct klp_func *func)
470*4882a593Smuzhiyun {
471*4882a593Smuzhiyun kfree(func->old_name);
472*4882a593Smuzhiyun kfree(func);
473*4882a593Smuzhiyun }
474*4882a593Smuzhiyun
klp_alloc_func_nop(struct klp_func * old_func,struct klp_object * obj)475*4882a593Smuzhiyun static struct klp_func *klp_alloc_func_nop(struct klp_func *old_func,
476*4882a593Smuzhiyun struct klp_object *obj)
477*4882a593Smuzhiyun {
478*4882a593Smuzhiyun struct klp_func *func;
479*4882a593Smuzhiyun
480*4882a593Smuzhiyun func = kzalloc(sizeof(*func), GFP_KERNEL);
481*4882a593Smuzhiyun if (!func)
482*4882a593Smuzhiyun return NULL;
483*4882a593Smuzhiyun
484*4882a593Smuzhiyun if (old_func->old_name) {
485*4882a593Smuzhiyun func->old_name = kstrdup(old_func->old_name, GFP_KERNEL);
486*4882a593Smuzhiyun if (!func->old_name) {
487*4882a593Smuzhiyun kfree(func);
488*4882a593Smuzhiyun return NULL;
489*4882a593Smuzhiyun }
490*4882a593Smuzhiyun }
491*4882a593Smuzhiyun
492*4882a593Smuzhiyun klp_init_func_early(obj, func);
493*4882a593Smuzhiyun /*
494*4882a593Smuzhiyun * func->new_func is same as func->old_func. These addresses are
495*4882a593Smuzhiyun * set when the object is loaded, see klp_init_object_loaded().
496*4882a593Smuzhiyun */
497*4882a593Smuzhiyun func->old_sympos = old_func->old_sympos;
498*4882a593Smuzhiyun func->nop = true;
499*4882a593Smuzhiyun
500*4882a593Smuzhiyun return func;
501*4882a593Smuzhiyun }
502*4882a593Smuzhiyun
klp_add_object_nops(struct klp_patch * patch,struct klp_object * old_obj)503*4882a593Smuzhiyun static int klp_add_object_nops(struct klp_patch *patch,
504*4882a593Smuzhiyun struct klp_object *old_obj)
505*4882a593Smuzhiyun {
506*4882a593Smuzhiyun struct klp_object *obj;
507*4882a593Smuzhiyun struct klp_func *func, *old_func;
508*4882a593Smuzhiyun
509*4882a593Smuzhiyun obj = klp_find_object(patch, old_obj);
510*4882a593Smuzhiyun
511*4882a593Smuzhiyun if (!obj) {
512*4882a593Smuzhiyun obj = klp_alloc_object_dynamic(old_obj->name, patch);
513*4882a593Smuzhiyun if (!obj)
514*4882a593Smuzhiyun return -ENOMEM;
515*4882a593Smuzhiyun }
516*4882a593Smuzhiyun
517*4882a593Smuzhiyun klp_for_each_func(old_obj, old_func) {
518*4882a593Smuzhiyun func = klp_find_func(obj, old_func);
519*4882a593Smuzhiyun if (func)
520*4882a593Smuzhiyun continue;
521*4882a593Smuzhiyun
522*4882a593Smuzhiyun func = klp_alloc_func_nop(old_func, obj);
523*4882a593Smuzhiyun if (!func)
524*4882a593Smuzhiyun return -ENOMEM;
525*4882a593Smuzhiyun }
526*4882a593Smuzhiyun
527*4882a593Smuzhiyun return 0;
528*4882a593Smuzhiyun }
529*4882a593Smuzhiyun
530*4882a593Smuzhiyun /*
531*4882a593Smuzhiyun * Add 'nop' functions which simply return to the caller to run
532*4882a593Smuzhiyun * the original function. The 'nop' functions are added to a
533*4882a593Smuzhiyun * patch to facilitate a 'replace' mode.
534*4882a593Smuzhiyun */
klp_add_nops(struct klp_patch * patch)535*4882a593Smuzhiyun static int klp_add_nops(struct klp_patch *patch)
536*4882a593Smuzhiyun {
537*4882a593Smuzhiyun struct klp_patch *old_patch;
538*4882a593Smuzhiyun struct klp_object *old_obj;
539*4882a593Smuzhiyun
540*4882a593Smuzhiyun klp_for_each_patch(old_patch) {
541*4882a593Smuzhiyun klp_for_each_object(old_patch, old_obj) {
542*4882a593Smuzhiyun int err;
543*4882a593Smuzhiyun
544*4882a593Smuzhiyun err = klp_add_object_nops(patch, old_obj);
545*4882a593Smuzhiyun if (err)
546*4882a593Smuzhiyun return err;
547*4882a593Smuzhiyun }
548*4882a593Smuzhiyun }
549*4882a593Smuzhiyun
550*4882a593Smuzhiyun return 0;
551*4882a593Smuzhiyun }
552*4882a593Smuzhiyun
klp_kobj_release_patch(struct kobject * kobj)553*4882a593Smuzhiyun static void klp_kobj_release_patch(struct kobject *kobj)
554*4882a593Smuzhiyun {
555*4882a593Smuzhiyun struct klp_patch *patch;
556*4882a593Smuzhiyun
557*4882a593Smuzhiyun patch = container_of(kobj, struct klp_patch, kobj);
558*4882a593Smuzhiyun complete(&patch->finish);
559*4882a593Smuzhiyun }
560*4882a593Smuzhiyun
561*4882a593Smuzhiyun static struct kobj_type klp_ktype_patch = {
562*4882a593Smuzhiyun .release = klp_kobj_release_patch,
563*4882a593Smuzhiyun .sysfs_ops = &kobj_sysfs_ops,
564*4882a593Smuzhiyun .default_groups = klp_patch_groups,
565*4882a593Smuzhiyun };
566*4882a593Smuzhiyun
klp_kobj_release_object(struct kobject * kobj)567*4882a593Smuzhiyun static void klp_kobj_release_object(struct kobject *kobj)
568*4882a593Smuzhiyun {
569*4882a593Smuzhiyun struct klp_object *obj;
570*4882a593Smuzhiyun
571*4882a593Smuzhiyun obj = container_of(kobj, struct klp_object, kobj);
572*4882a593Smuzhiyun
573*4882a593Smuzhiyun if (obj->dynamic)
574*4882a593Smuzhiyun klp_free_object_dynamic(obj);
575*4882a593Smuzhiyun }
576*4882a593Smuzhiyun
577*4882a593Smuzhiyun static struct kobj_type klp_ktype_object = {
578*4882a593Smuzhiyun .release = klp_kobj_release_object,
579*4882a593Smuzhiyun .sysfs_ops = &kobj_sysfs_ops,
580*4882a593Smuzhiyun };
581*4882a593Smuzhiyun
klp_kobj_release_func(struct kobject * kobj)582*4882a593Smuzhiyun static void klp_kobj_release_func(struct kobject *kobj)
583*4882a593Smuzhiyun {
584*4882a593Smuzhiyun struct klp_func *func;
585*4882a593Smuzhiyun
586*4882a593Smuzhiyun func = container_of(kobj, struct klp_func, kobj);
587*4882a593Smuzhiyun
588*4882a593Smuzhiyun if (func->nop)
589*4882a593Smuzhiyun klp_free_func_nop(func);
590*4882a593Smuzhiyun }
591*4882a593Smuzhiyun
592*4882a593Smuzhiyun static struct kobj_type klp_ktype_func = {
593*4882a593Smuzhiyun .release = klp_kobj_release_func,
594*4882a593Smuzhiyun .sysfs_ops = &kobj_sysfs_ops,
595*4882a593Smuzhiyun };
596*4882a593Smuzhiyun
__klp_free_funcs(struct klp_object * obj,bool nops_only)597*4882a593Smuzhiyun static void __klp_free_funcs(struct klp_object *obj, bool nops_only)
598*4882a593Smuzhiyun {
599*4882a593Smuzhiyun struct klp_func *func, *tmp_func;
600*4882a593Smuzhiyun
601*4882a593Smuzhiyun klp_for_each_func_safe(obj, func, tmp_func) {
602*4882a593Smuzhiyun if (nops_only && !func->nop)
603*4882a593Smuzhiyun continue;
604*4882a593Smuzhiyun
605*4882a593Smuzhiyun list_del(&func->node);
606*4882a593Smuzhiyun kobject_put(&func->kobj);
607*4882a593Smuzhiyun }
608*4882a593Smuzhiyun }
609*4882a593Smuzhiyun
610*4882a593Smuzhiyun /* Clean up when a patched object is unloaded */
klp_free_object_loaded(struct klp_object * obj)611*4882a593Smuzhiyun static void klp_free_object_loaded(struct klp_object *obj)
612*4882a593Smuzhiyun {
613*4882a593Smuzhiyun struct klp_func *func;
614*4882a593Smuzhiyun
615*4882a593Smuzhiyun obj->mod = NULL;
616*4882a593Smuzhiyun
617*4882a593Smuzhiyun klp_for_each_func(obj, func) {
618*4882a593Smuzhiyun func->old_func = NULL;
619*4882a593Smuzhiyun
620*4882a593Smuzhiyun if (func->nop)
621*4882a593Smuzhiyun func->new_func = NULL;
622*4882a593Smuzhiyun }
623*4882a593Smuzhiyun }
624*4882a593Smuzhiyun
__klp_free_objects(struct klp_patch * patch,bool nops_only)625*4882a593Smuzhiyun static void __klp_free_objects(struct klp_patch *patch, bool nops_only)
626*4882a593Smuzhiyun {
627*4882a593Smuzhiyun struct klp_object *obj, *tmp_obj;
628*4882a593Smuzhiyun
629*4882a593Smuzhiyun klp_for_each_object_safe(patch, obj, tmp_obj) {
630*4882a593Smuzhiyun __klp_free_funcs(obj, nops_only);
631*4882a593Smuzhiyun
632*4882a593Smuzhiyun if (nops_only && !obj->dynamic)
633*4882a593Smuzhiyun continue;
634*4882a593Smuzhiyun
635*4882a593Smuzhiyun list_del(&obj->node);
636*4882a593Smuzhiyun kobject_put(&obj->kobj);
637*4882a593Smuzhiyun }
638*4882a593Smuzhiyun }
639*4882a593Smuzhiyun
klp_free_objects(struct klp_patch * patch)640*4882a593Smuzhiyun static void klp_free_objects(struct klp_patch *patch)
641*4882a593Smuzhiyun {
642*4882a593Smuzhiyun __klp_free_objects(patch, false);
643*4882a593Smuzhiyun }
644*4882a593Smuzhiyun
klp_free_objects_dynamic(struct klp_patch * patch)645*4882a593Smuzhiyun static void klp_free_objects_dynamic(struct klp_patch *patch)
646*4882a593Smuzhiyun {
647*4882a593Smuzhiyun __klp_free_objects(patch, true);
648*4882a593Smuzhiyun }
649*4882a593Smuzhiyun
650*4882a593Smuzhiyun /*
651*4882a593Smuzhiyun * This function implements the free operations that can be called safely
652*4882a593Smuzhiyun * under klp_mutex.
653*4882a593Smuzhiyun *
654*4882a593Smuzhiyun * The operation must be completed by calling klp_free_patch_finish()
655*4882a593Smuzhiyun * outside klp_mutex.
656*4882a593Smuzhiyun */
klp_free_patch_start(struct klp_patch * patch)657*4882a593Smuzhiyun static void klp_free_patch_start(struct klp_patch *patch)
658*4882a593Smuzhiyun {
659*4882a593Smuzhiyun if (!list_empty(&patch->list))
660*4882a593Smuzhiyun list_del(&patch->list);
661*4882a593Smuzhiyun
662*4882a593Smuzhiyun klp_free_objects(patch);
663*4882a593Smuzhiyun }
664*4882a593Smuzhiyun
665*4882a593Smuzhiyun /*
666*4882a593Smuzhiyun * This function implements the free part that must be called outside
667*4882a593Smuzhiyun * klp_mutex.
668*4882a593Smuzhiyun *
669*4882a593Smuzhiyun * It must be called after klp_free_patch_start(). And it has to be
670*4882a593Smuzhiyun * the last function accessing the livepatch structures when the patch
671*4882a593Smuzhiyun * gets disabled.
672*4882a593Smuzhiyun */
klp_free_patch_finish(struct klp_patch * patch)673*4882a593Smuzhiyun static void klp_free_patch_finish(struct klp_patch *patch)
674*4882a593Smuzhiyun {
675*4882a593Smuzhiyun /*
676*4882a593Smuzhiyun * Avoid deadlock with enabled_store() sysfs callback by
677*4882a593Smuzhiyun * calling this outside klp_mutex. It is safe because
678*4882a593Smuzhiyun * this is called when the patch gets disabled and it
679*4882a593Smuzhiyun * cannot get enabled again.
680*4882a593Smuzhiyun */
681*4882a593Smuzhiyun kobject_put(&patch->kobj);
682*4882a593Smuzhiyun wait_for_completion(&patch->finish);
683*4882a593Smuzhiyun
684*4882a593Smuzhiyun /* Put the module after the last access to struct klp_patch. */
685*4882a593Smuzhiyun if (!patch->forced)
686*4882a593Smuzhiyun module_put(patch->mod);
687*4882a593Smuzhiyun }
688*4882a593Smuzhiyun
689*4882a593Smuzhiyun /*
690*4882a593Smuzhiyun * The livepatch might be freed from sysfs interface created by the patch.
691*4882a593Smuzhiyun * This work allows to wait until the interface is destroyed in a separate
692*4882a593Smuzhiyun * context.
693*4882a593Smuzhiyun */
klp_free_patch_work_fn(struct work_struct * work)694*4882a593Smuzhiyun static void klp_free_patch_work_fn(struct work_struct *work)
695*4882a593Smuzhiyun {
696*4882a593Smuzhiyun struct klp_patch *patch =
697*4882a593Smuzhiyun container_of(work, struct klp_patch, free_work);
698*4882a593Smuzhiyun
699*4882a593Smuzhiyun klp_free_patch_finish(patch);
700*4882a593Smuzhiyun }
701*4882a593Smuzhiyun
klp_free_patch_async(struct klp_patch * patch)702*4882a593Smuzhiyun void klp_free_patch_async(struct klp_patch *patch)
703*4882a593Smuzhiyun {
704*4882a593Smuzhiyun klp_free_patch_start(patch);
705*4882a593Smuzhiyun schedule_work(&patch->free_work);
706*4882a593Smuzhiyun }
707*4882a593Smuzhiyun
klp_free_replaced_patches_async(struct klp_patch * new_patch)708*4882a593Smuzhiyun void klp_free_replaced_patches_async(struct klp_patch *new_patch)
709*4882a593Smuzhiyun {
710*4882a593Smuzhiyun struct klp_patch *old_patch, *tmp_patch;
711*4882a593Smuzhiyun
712*4882a593Smuzhiyun klp_for_each_patch_safe(old_patch, tmp_patch) {
713*4882a593Smuzhiyun if (old_patch == new_patch)
714*4882a593Smuzhiyun return;
715*4882a593Smuzhiyun klp_free_patch_async(old_patch);
716*4882a593Smuzhiyun }
717*4882a593Smuzhiyun }
718*4882a593Smuzhiyun
klp_init_func(struct klp_object * obj,struct klp_func * func)719*4882a593Smuzhiyun static int klp_init_func(struct klp_object *obj, struct klp_func *func)
720*4882a593Smuzhiyun {
721*4882a593Smuzhiyun if (!func->old_name)
722*4882a593Smuzhiyun return -EINVAL;
723*4882a593Smuzhiyun
724*4882a593Smuzhiyun /*
725*4882a593Smuzhiyun * NOPs get the address later. The patched module must be loaded,
726*4882a593Smuzhiyun * see klp_init_object_loaded().
727*4882a593Smuzhiyun */
728*4882a593Smuzhiyun if (!func->new_func && !func->nop)
729*4882a593Smuzhiyun return -EINVAL;
730*4882a593Smuzhiyun
731*4882a593Smuzhiyun if (strlen(func->old_name) >= KSYM_NAME_LEN)
732*4882a593Smuzhiyun return -EINVAL;
733*4882a593Smuzhiyun
734*4882a593Smuzhiyun INIT_LIST_HEAD(&func->stack_node);
735*4882a593Smuzhiyun func->patched = false;
736*4882a593Smuzhiyun func->transition = false;
737*4882a593Smuzhiyun
738*4882a593Smuzhiyun /* The format for the sysfs directory is <function,sympos> where sympos
739*4882a593Smuzhiyun * is the nth occurrence of this symbol in kallsyms for the patched
740*4882a593Smuzhiyun * object. If the user selects 0 for old_sympos, then 1 will be used
741*4882a593Smuzhiyun * since a unique symbol will be the first occurrence.
742*4882a593Smuzhiyun */
743*4882a593Smuzhiyun return kobject_add(&func->kobj, &obj->kobj, "%s,%lu",
744*4882a593Smuzhiyun func->old_name,
745*4882a593Smuzhiyun func->old_sympos ? func->old_sympos : 1);
746*4882a593Smuzhiyun }
747*4882a593Smuzhiyun
klp_apply_object_relocs(struct klp_patch * patch,struct klp_object * obj)748*4882a593Smuzhiyun static int klp_apply_object_relocs(struct klp_patch *patch,
749*4882a593Smuzhiyun struct klp_object *obj)
750*4882a593Smuzhiyun {
751*4882a593Smuzhiyun int i, ret;
752*4882a593Smuzhiyun struct klp_modinfo *info = patch->mod->klp_info;
753*4882a593Smuzhiyun
754*4882a593Smuzhiyun for (i = 1; i < info->hdr.e_shnum; i++) {
755*4882a593Smuzhiyun Elf_Shdr *sec = info->sechdrs + i;
756*4882a593Smuzhiyun
757*4882a593Smuzhiyun if (!(sec->sh_flags & SHF_RELA_LIVEPATCH))
758*4882a593Smuzhiyun continue;
759*4882a593Smuzhiyun
760*4882a593Smuzhiyun ret = klp_apply_section_relocs(patch->mod, info->sechdrs,
761*4882a593Smuzhiyun info->secstrings,
762*4882a593Smuzhiyun patch->mod->core_kallsyms.strtab,
763*4882a593Smuzhiyun info->symndx, i, obj->name);
764*4882a593Smuzhiyun if (ret)
765*4882a593Smuzhiyun return ret;
766*4882a593Smuzhiyun }
767*4882a593Smuzhiyun
768*4882a593Smuzhiyun return 0;
769*4882a593Smuzhiyun }
770*4882a593Smuzhiyun
771*4882a593Smuzhiyun /* parts of the initialization that is done only when the object is loaded */
klp_init_object_loaded(struct klp_patch * patch,struct klp_object * obj)772*4882a593Smuzhiyun static int klp_init_object_loaded(struct klp_patch *patch,
773*4882a593Smuzhiyun struct klp_object *obj)
774*4882a593Smuzhiyun {
775*4882a593Smuzhiyun struct klp_func *func;
776*4882a593Smuzhiyun int ret;
777*4882a593Smuzhiyun
778*4882a593Smuzhiyun if (klp_is_module(obj)) {
779*4882a593Smuzhiyun /*
780*4882a593Smuzhiyun * Only write module-specific relocations here
781*4882a593Smuzhiyun * (.klp.rela.{module}.*). vmlinux-specific relocations were
782*4882a593Smuzhiyun * written earlier during the initialization of the klp module
783*4882a593Smuzhiyun * itself.
784*4882a593Smuzhiyun */
785*4882a593Smuzhiyun ret = klp_apply_object_relocs(patch, obj);
786*4882a593Smuzhiyun if (ret)
787*4882a593Smuzhiyun return ret;
788*4882a593Smuzhiyun }
789*4882a593Smuzhiyun
790*4882a593Smuzhiyun klp_for_each_func(obj, func) {
791*4882a593Smuzhiyun ret = klp_find_object_symbol(obj->name, func->old_name,
792*4882a593Smuzhiyun func->old_sympos,
793*4882a593Smuzhiyun (unsigned long *)&func->old_func);
794*4882a593Smuzhiyun if (ret)
795*4882a593Smuzhiyun return ret;
796*4882a593Smuzhiyun
797*4882a593Smuzhiyun ret = kallsyms_lookup_size_offset((unsigned long)func->old_func,
798*4882a593Smuzhiyun &func->old_size, NULL);
799*4882a593Smuzhiyun if (!ret) {
800*4882a593Smuzhiyun pr_err("kallsyms size lookup failed for '%s'\n",
801*4882a593Smuzhiyun func->old_name);
802*4882a593Smuzhiyun return -ENOENT;
803*4882a593Smuzhiyun }
804*4882a593Smuzhiyun
805*4882a593Smuzhiyun if (func->nop)
806*4882a593Smuzhiyun func->new_func = func->old_func;
807*4882a593Smuzhiyun
808*4882a593Smuzhiyun ret = kallsyms_lookup_size_offset((unsigned long)func->new_func,
809*4882a593Smuzhiyun &func->new_size, NULL);
810*4882a593Smuzhiyun if (!ret) {
811*4882a593Smuzhiyun pr_err("kallsyms size lookup failed for '%s' replacement\n",
812*4882a593Smuzhiyun func->old_name);
813*4882a593Smuzhiyun return -ENOENT;
814*4882a593Smuzhiyun }
815*4882a593Smuzhiyun }
816*4882a593Smuzhiyun
817*4882a593Smuzhiyun return 0;
818*4882a593Smuzhiyun }
819*4882a593Smuzhiyun
klp_init_object(struct klp_patch * patch,struct klp_object * obj)820*4882a593Smuzhiyun static int klp_init_object(struct klp_patch *patch, struct klp_object *obj)
821*4882a593Smuzhiyun {
822*4882a593Smuzhiyun struct klp_func *func;
823*4882a593Smuzhiyun int ret;
824*4882a593Smuzhiyun const char *name;
825*4882a593Smuzhiyun
826*4882a593Smuzhiyun if (klp_is_module(obj) && strlen(obj->name) >= MODULE_NAME_LEN)
827*4882a593Smuzhiyun return -EINVAL;
828*4882a593Smuzhiyun
829*4882a593Smuzhiyun obj->patched = false;
830*4882a593Smuzhiyun obj->mod = NULL;
831*4882a593Smuzhiyun
832*4882a593Smuzhiyun klp_find_object_module(obj);
833*4882a593Smuzhiyun
834*4882a593Smuzhiyun name = klp_is_module(obj) ? obj->name : "vmlinux";
835*4882a593Smuzhiyun ret = kobject_add(&obj->kobj, &patch->kobj, "%s", name);
836*4882a593Smuzhiyun if (ret)
837*4882a593Smuzhiyun return ret;
838*4882a593Smuzhiyun
839*4882a593Smuzhiyun klp_for_each_func(obj, func) {
840*4882a593Smuzhiyun ret = klp_init_func(obj, func);
841*4882a593Smuzhiyun if (ret)
842*4882a593Smuzhiyun return ret;
843*4882a593Smuzhiyun }
844*4882a593Smuzhiyun
845*4882a593Smuzhiyun if (klp_is_object_loaded(obj))
846*4882a593Smuzhiyun ret = klp_init_object_loaded(patch, obj);
847*4882a593Smuzhiyun
848*4882a593Smuzhiyun return ret;
849*4882a593Smuzhiyun }
850*4882a593Smuzhiyun
klp_init_func_early(struct klp_object * obj,struct klp_func * func)851*4882a593Smuzhiyun static void klp_init_func_early(struct klp_object *obj,
852*4882a593Smuzhiyun struct klp_func *func)
853*4882a593Smuzhiyun {
854*4882a593Smuzhiyun kobject_init(&func->kobj, &klp_ktype_func);
855*4882a593Smuzhiyun list_add_tail(&func->node, &obj->func_list);
856*4882a593Smuzhiyun }
857*4882a593Smuzhiyun
klp_init_object_early(struct klp_patch * patch,struct klp_object * obj)858*4882a593Smuzhiyun static void klp_init_object_early(struct klp_patch *patch,
859*4882a593Smuzhiyun struct klp_object *obj)
860*4882a593Smuzhiyun {
861*4882a593Smuzhiyun INIT_LIST_HEAD(&obj->func_list);
862*4882a593Smuzhiyun kobject_init(&obj->kobj, &klp_ktype_object);
863*4882a593Smuzhiyun list_add_tail(&obj->node, &patch->obj_list);
864*4882a593Smuzhiyun }
865*4882a593Smuzhiyun
klp_init_patch_early(struct klp_patch * patch)866*4882a593Smuzhiyun static int klp_init_patch_early(struct klp_patch *patch)
867*4882a593Smuzhiyun {
868*4882a593Smuzhiyun struct klp_object *obj;
869*4882a593Smuzhiyun struct klp_func *func;
870*4882a593Smuzhiyun
871*4882a593Smuzhiyun if (!patch->objs)
872*4882a593Smuzhiyun return -EINVAL;
873*4882a593Smuzhiyun
874*4882a593Smuzhiyun INIT_LIST_HEAD(&patch->list);
875*4882a593Smuzhiyun INIT_LIST_HEAD(&patch->obj_list);
876*4882a593Smuzhiyun kobject_init(&patch->kobj, &klp_ktype_patch);
877*4882a593Smuzhiyun patch->enabled = false;
878*4882a593Smuzhiyun patch->forced = false;
879*4882a593Smuzhiyun INIT_WORK(&patch->free_work, klp_free_patch_work_fn);
880*4882a593Smuzhiyun init_completion(&patch->finish);
881*4882a593Smuzhiyun
882*4882a593Smuzhiyun klp_for_each_object_static(patch, obj) {
883*4882a593Smuzhiyun if (!obj->funcs)
884*4882a593Smuzhiyun return -EINVAL;
885*4882a593Smuzhiyun
886*4882a593Smuzhiyun klp_init_object_early(patch, obj);
887*4882a593Smuzhiyun
888*4882a593Smuzhiyun klp_for_each_func_static(obj, func) {
889*4882a593Smuzhiyun klp_init_func_early(obj, func);
890*4882a593Smuzhiyun }
891*4882a593Smuzhiyun }
892*4882a593Smuzhiyun
893*4882a593Smuzhiyun if (!try_module_get(patch->mod))
894*4882a593Smuzhiyun return -ENODEV;
895*4882a593Smuzhiyun
896*4882a593Smuzhiyun return 0;
897*4882a593Smuzhiyun }
898*4882a593Smuzhiyun
klp_init_patch(struct klp_patch * patch)899*4882a593Smuzhiyun static int klp_init_patch(struct klp_patch *patch)
900*4882a593Smuzhiyun {
901*4882a593Smuzhiyun struct klp_object *obj;
902*4882a593Smuzhiyun int ret;
903*4882a593Smuzhiyun
904*4882a593Smuzhiyun ret = kobject_add(&patch->kobj, klp_root_kobj, "%s", patch->mod->name);
905*4882a593Smuzhiyun if (ret)
906*4882a593Smuzhiyun return ret;
907*4882a593Smuzhiyun
908*4882a593Smuzhiyun if (patch->replace) {
909*4882a593Smuzhiyun ret = klp_add_nops(patch);
910*4882a593Smuzhiyun if (ret)
911*4882a593Smuzhiyun return ret;
912*4882a593Smuzhiyun }
913*4882a593Smuzhiyun
914*4882a593Smuzhiyun klp_for_each_object(patch, obj) {
915*4882a593Smuzhiyun ret = klp_init_object(patch, obj);
916*4882a593Smuzhiyun if (ret)
917*4882a593Smuzhiyun return ret;
918*4882a593Smuzhiyun }
919*4882a593Smuzhiyun
920*4882a593Smuzhiyun list_add_tail(&patch->list, &klp_patches);
921*4882a593Smuzhiyun
922*4882a593Smuzhiyun return 0;
923*4882a593Smuzhiyun }
924*4882a593Smuzhiyun
__klp_disable_patch(struct klp_patch * patch)925*4882a593Smuzhiyun static int __klp_disable_patch(struct klp_patch *patch)
926*4882a593Smuzhiyun {
927*4882a593Smuzhiyun struct klp_object *obj;
928*4882a593Smuzhiyun
929*4882a593Smuzhiyun if (WARN_ON(!patch->enabled))
930*4882a593Smuzhiyun return -EINVAL;
931*4882a593Smuzhiyun
932*4882a593Smuzhiyun if (klp_transition_patch)
933*4882a593Smuzhiyun return -EBUSY;
934*4882a593Smuzhiyun
935*4882a593Smuzhiyun klp_init_transition(patch, KLP_UNPATCHED);
936*4882a593Smuzhiyun
937*4882a593Smuzhiyun klp_for_each_object(patch, obj)
938*4882a593Smuzhiyun if (obj->patched)
939*4882a593Smuzhiyun klp_pre_unpatch_callback(obj);
940*4882a593Smuzhiyun
941*4882a593Smuzhiyun /*
942*4882a593Smuzhiyun * Enforce the order of the func->transition writes in
943*4882a593Smuzhiyun * klp_init_transition() and the TIF_PATCH_PENDING writes in
944*4882a593Smuzhiyun * klp_start_transition(). In the rare case where klp_ftrace_handler()
945*4882a593Smuzhiyun * is called shortly after klp_update_patch_state() switches the task,
946*4882a593Smuzhiyun * this ensures the handler sees that func->transition is set.
947*4882a593Smuzhiyun */
948*4882a593Smuzhiyun smp_wmb();
949*4882a593Smuzhiyun
950*4882a593Smuzhiyun klp_start_transition();
951*4882a593Smuzhiyun patch->enabled = false;
952*4882a593Smuzhiyun klp_try_complete_transition();
953*4882a593Smuzhiyun
954*4882a593Smuzhiyun return 0;
955*4882a593Smuzhiyun }
956*4882a593Smuzhiyun
__klp_enable_patch(struct klp_patch * patch)957*4882a593Smuzhiyun static int __klp_enable_patch(struct klp_patch *patch)
958*4882a593Smuzhiyun {
959*4882a593Smuzhiyun struct klp_object *obj;
960*4882a593Smuzhiyun int ret;
961*4882a593Smuzhiyun
962*4882a593Smuzhiyun if (klp_transition_patch)
963*4882a593Smuzhiyun return -EBUSY;
964*4882a593Smuzhiyun
965*4882a593Smuzhiyun if (WARN_ON(patch->enabled))
966*4882a593Smuzhiyun return -EINVAL;
967*4882a593Smuzhiyun
968*4882a593Smuzhiyun pr_notice("enabling patch '%s'\n", patch->mod->name);
969*4882a593Smuzhiyun
970*4882a593Smuzhiyun klp_init_transition(patch, KLP_PATCHED);
971*4882a593Smuzhiyun
972*4882a593Smuzhiyun /*
973*4882a593Smuzhiyun * Enforce the order of the func->transition writes in
974*4882a593Smuzhiyun * klp_init_transition() and the ops->func_stack writes in
975*4882a593Smuzhiyun * klp_patch_object(), so that klp_ftrace_handler() will see the
976*4882a593Smuzhiyun * func->transition updates before the handler is registered and the
977*4882a593Smuzhiyun * new funcs become visible to the handler.
978*4882a593Smuzhiyun */
979*4882a593Smuzhiyun smp_wmb();
980*4882a593Smuzhiyun
981*4882a593Smuzhiyun klp_for_each_object(patch, obj) {
982*4882a593Smuzhiyun if (!klp_is_object_loaded(obj))
983*4882a593Smuzhiyun continue;
984*4882a593Smuzhiyun
985*4882a593Smuzhiyun ret = klp_pre_patch_callback(obj);
986*4882a593Smuzhiyun if (ret) {
987*4882a593Smuzhiyun pr_warn("pre-patch callback failed for object '%s'\n",
988*4882a593Smuzhiyun klp_is_module(obj) ? obj->name : "vmlinux");
989*4882a593Smuzhiyun goto err;
990*4882a593Smuzhiyun }
991*4882a593Smuzhiyun
992*4882a593Smuzhiyun ret = klp_patch_object(obj);
993*4882a593Smuzhiyun if (ret) {
994*4882a593Smuzhiyun pr_warn("failed to patch object '%s'\n",
995*4882a593Smuzhiyun klp_is_module(obj) ? obj->name : "vmlinux");
996*4882a593Smuzhiyun goto err;
997*4882a593Smuzhiyun }
998*4882a593Smuzhiyun }
999*4882a593Smuzhiyun
1000*4882a593Smuzhiyun klp_start_transition();
1001*4882a593Smuzhiyun patch->enabled = true;
1002*4882a593Smuzhiyun klp_try_complete_transition();
1003*4882a593Smuzhiyun
1004*4882a593Smuzhiyun return 0;
1005*4882a593Smuzhiyun err:
1006*4882a593Smuzhiyun pr_warn("failed to enable patch '%s'\n", patch->mod->name);
1007*4882a593Smuzhiyun
1008*4882a593Smuzhiyun klp_cancel_transition();
1009*4882a593Smuzhiyun return ret;
1010*4882a593Smuzhiyun }
1011*4882a593Smuzhiyun
1012*4882a593Smuzhiyun /**
1013*4882a593Smuzhiyun * klp_enable_patch() - enable the livepatch
1014*4882a593Smuzhiyun * @patch: patch to be enabled
1015*4882a593Smuzhiyun *
1016*4882a593Smuzhiyun * Initializes the data structure associated with the patch, creates the sysfs
1017*4882a593Smuzhiyun * interface, performs the needed symbol lookups and code relocations,
1018*4882a593Smuzhiyun * registers the patched functions with ftrace.
1019*4882a593Smuzhiyun *
1020*4882a593Smuzhiyun * This function is supposed to be called from the livepatch module_init()
1021*4882a593Smuzhiyun * callback.
1022*4882a593Smuzhiyun *
1023*4882a593Smuzhiyun * Return: 0 on success, otherwise error
1024*4882a593Smuzhiyun */
klp_enable_patch(struct klp_patch * patch)1025*4882a593Smuzhiyun int klp_enable_patch(struct klp_patch *patch)
1026*4882a593Smuzhiyun {
1027*4882a593Smuzhiyun int ret;
1028*4882a593Smuzhiyun
1029*4882a593Smuzhiyun if (!patch || !patch->mod)
1030*4882a593Smuzhiyun return -EINVAL;
1031*4882a593Smuzhiyun
1032*4882a593Smuzhiyun if (!is_livepatch_module(patch->mod)) {
1033*4882a593Smuzhiyun pr_err("module %s is not marked as a livepatch module\n",
1034*4882a593Smuzhiyun patch->mod->name);
1035*4882a593Smuzhiyun return -EINVAL;
1036*4882a593Smuzhiyun }
1037*4882a593Smuzhiyun
1038*4882a593Smuzhiyun if (!klp_initialized())
1039*4882a593Smuzhiyun return -ENODEV;
1040*4882a593Smuzhiyun
1041*4882a593Smuzhiyun if (!klp_have_reliable_stack()) {
1042*4882a593Smuzhiyun pr_warn("This architecture doesn't have support for the livepatch consistency model.\n");
1043*4882a593Smuzhiyun pr_warn("The livepatch transition may never complete.\n");
1044*4882a593Smuzhiyun }
1045*4882a593Smuzhiyun
1046*4882a593Smuzhiyun mutex_lock(&klp_mutex);
1047*4882a593Smuzhiyun
1048*4882a593Smuzhiyun if (!klp_is_patch_compatible(patch)) {
1049*4882a593Smuzhiyun pr_err("Livepatch patch (%s) is not compatible with the already installed livepatches.\n",
1050*4882a593Smuzhiyun patch->mod->name);
1051*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1052*4882a593Smuzhiyun return -EINVAL;
1053*4882a593Smuzhiyun }
1054*4882a593Smuzhiyun
1055*4882a593Smuzhiyun ret = klp_init_patch_early(patch);
1056*4882a593Smuzhiyun if (ret) {
1057*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1058*4882a593Smuzhiyun return ret;
1059*4882a593Smuzhiyun }
1060*4882a593Smuzhiyun
1061*4882a593Smuzhiyun ret = klp_init_patch(patch);
1062*4882a593Smuzhiyun if (ret)
1063*4882a593Smuzhiyun goto err;
1064*4882a593Smuzhiyun
1065*4882a593Smuzhiyun ret = __klp_enable_patch(patch);
1066*4882a593Smuzhiyun if (ret)
1067*4882a593Smuzhiyun goto err;
1068*4882a593Smuzhiyun
1069*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1070*4882a593Smuzhiyun
1071*4882a593Smuzhiyun return 0;
1072*4882a593Smuzhiyun
1073*4882a593Smuzhiyun err:
1074*4882a593Smuzhiyun klp_free_patch_start(patch);
1075*4882a593Smuzhiyun
1076*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1077*4882a593Smuzhiyun
1078*4882a593Smuzhiyun klp_free_patch_finish(patch);
1079*4882a593Smuzhiyun
1080*4882a593Smuzhiyun return ret;
1081*4882a593Smuzhiyun }
1082*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(klp_enable_patch);
1083*4882a593Smuzhiyun
1084*4882a593Smuzhiyun /*
1085*4882a593Smuzhiyun * This function unpatches objects from the replaced livepatches.
1086*4882a593Smuzhiyun *
1087*4882a593Smuzhiyun * We could be pretty aggressive here. It is called in the situation where
1088*4882a593Smuzhiyun * these structures are no longer accessed from the ftrace handler.
1089*4882a593Smuzhiyun * All functions are redirected by the klp_transition_patch. They
1090*4882a593Smuzhiyun * use either a new code or they are in the original code because
1091*4882a593Smuzhiyun * of the special nop function patches.
1092*4882a593Smuzhiyun *
1093*4882a593Smuzhiyun * The only exception is when the transition was forced. In this case,
1094*4882a593Smuzhiyun * klp_ftrace_handler() might still see the replaced patch on the stack.
1095*4882a593Smuzhiyun * Fortunately, it is carefully designed to work with removed functions
1096*4882a593Smuzhiyun * thanks to RCU. We only have to keep the patches on the system. Also
1097*4882a593Smuzhiyun * this is handled transparently by patch->module_put.
1098*4882a593Smuzhiyun */
klp_unpatch_replaced_patches(struct klp_patch * new_patch)1099*4882a593Smuzhiyun void klp_unpatch_replaced_patches(struct klp_patch *new_patch)
1100*4882a593Smuzhiyun {
1101*4882a593Smuzhiyun struct klp_patch *old_patch;
1102*4882a593Smuzhiyun
1103*4882a593Smuzhiyun klp_for_each_patch(old_patch) {
1104*4882a593Smuzhiyun if (old_patch == new_patch)
1105*4882a593Smuzhiyun return;
1106*4882a593Smuzhiyun
1107*4882a593Smuzhiyun old_patch->enabled = false;
1108*4882a593Smuzhiyun klp_unpatch_objects(old_patch);
1109*4882a593Smuzhiyun }
1110*4882a593Smuzhiyun }
1111*4882a593Smuzhiyun
1112*4882a593Smuzhiyun /*
1113*4882a593Smuzhiyun * This function removes the dynamically allocated 'nop' functions.
1114*4882a593Smuzhiyun *
1115*4882a593Smuzhiyun * We could be pretty aggressive. NOPs do not change the existing
1116*4882a593Smuzhiyun * behavior except for adding unnecessary delay by the ftrace handler.
1117*4882a593Smuzhiyun *
1118*4882a593Smuzhiyun * It is safe even when the transition was forced. The ftrace handler
1119*4882a593Smuzhiyun * will see a valid ops->func_stack entry thanks to RCU.
1120*4882a593Smuzhiyun *
1121*4882a593Smuzhiyun * We could even free the NOPs structures. They must be the last entry
1122*4882a593Smuzhiyun * in ops->func_stack. Therefore unregister_ftrace_function() is called.
1123*4882a593Smuzhiyun * It does the same as klp_synchronize_transition() to make sure that
1124*4882a593Smuzhiyun * nobody is inside the ftrace handler once the operation finishes.
1125*4882a593Smuzhiyun *
1126*4882a593Smuzhiyun * IMPORTANT: It must be called right after removing the replaced patches!
1127*4882a593Smuzhiyun */
klp_discard_nops(struct klp_patch * new_patch)1128*4882a593Smuzhiyun void klp_discard_nops(struct klp_patch *new_patch)
1129*4882a593Smuzhiyun {
1130*4882a593Smuzhiyun klp_unpatch_objects_dynamic(klp_transition_patch);
1131*4882a593Smuzhiyun klp_free_objects_dynamic(klp_transition_patch);
1132*4882a593Smuzhiyun }
1133*4882a593Smuzhiyun
1134*4882a593Smuzhiyun /*
1135*4882a593Smuzhiyun * Remove parts of patches that touch a given kernel module. The list of
1136*4882a593Smuzhiyun * patches processed might be limited. When limit is NULL, all patches
1137*4882a593Smuzhiyun * will be handled.
1138*4882a593Smuzhiyun */
klp_cleanup_module_patches_limited(struct module * mod,struct klp_patch * limit)1139*4882a593Smuzhiyun static void klp_cleanup_module_patches_limited(struct module *mod,
1140*4882a593Smuzhiyun struct klp_patch *limit)
1141*4882a593Smuzhiyun {
1142*4882a593Smuzhiyun struct klp_patch *patch;
1143*4882a593Smuzhiyun struct klp_object *obj;
1144*4882a593Smuzhiyun
1145*4882a593Smuzhiyun klp_for_each_patch(patch) {
1146*4882a593Smuzhiyun if (patch == limit)
1147*4882a593Smuzhiyun break;
1148*4882a593Smuzhiyun
1149*4882a593Smuzhiyun klp_for_each_object(patch, obj) {
1150*4882a593Smuzhiyun if (!klp_is_module(obj) || strcmp(obj->name, mod->name))
1151*4882a593Smuzhiyun continue;
1152*4882a593Smuzhiyun
1153*4882a593Smuzhiyun if (patch != klp_transition_patch)
1154*4882a593Smuzhiyun klp_pre_unpatch_callback(obj);
1155*4882a593Smuzhiyun
1156*4882a593Smuzhiyun pr_notice("reverting patch '%s' on unloading module '%s'\n",
1157*4882a593Smuzhiyun patch->mod->name, obj->mod->name);
1158*4882a593Smuzhiyun klp_unpatch_object(obj);
1159*4882a593Smuzhiyun
1160*4882a593Smuzhiyun klp_post_unpatch_callback(obj);
1161*4882a593Smuzhiyun
1162*4882a593Smuzhiyun klp_free_object_loaded(obj);
1163*4882a593Smuzhiyun break;
1164*4882a593Smuzhiyun }
1165*4882a593Smuzhiyun }
1166*4882a593Smuzhiyun }
1167*4882a593Smuzhiyun
klp_module_coming(struct module * mod)1168*4882a593Smuzhiyun int klp_module_coming(struct module *mod)
1169*4882a593Smuzhiyun {
1170*4882a593Smuzhiyun int ret;
1171*4882a593Smuzhiyun struct klp_patch *patch;
1172*4882a593Smuzhiyun struct klp_object *obj;
1173*4882a593Smuzhiyun
1174*4882a593Smuzhiyun if (WARN_ON(mod->state != MODULE_STATE_COMING))
1175*4882a593Smuzhiyun return -EINVAL;
1176*4882a593Smuzhiyun
1177*4882a593Smuzhiyun if (!strcmp(mod->name, "vmlinux")) {
1178*4882a593Smuzhiyun pr_err("vmlinux.ko: invalid module name");
1179*4882a593Smuzhiyun return -EINVAL;
1180*4882a593Smuzhiyun }
1181*4882a593Smuzhiyun
1182*4882a593Smuzhiyun mutex_lock(&klp_mutex);
1183*4882a593Smuzhiyun /*
1184*4882a593Smuzhiyun * Each module has to know that klp_module_coming()
1185*4882a593Smuzhiyun * has been called. We never know what module will
1186*4882a593Smuzhiyun * get patched by a new patch.
1187*4882a593Smuzhiyun */
1188*4882a593Smuzhiyun mod->klp_alive = true;
1189*4882a593Smuzhiyun
1190*4882a593Smuzhiyun klp_for_each_patch(patch) {
1191*4882a593Smuzhiyun klp_for_each_object(patch, obj) {
1192*4882a593Smuzhiyun if (!klp_is_module(obj) || strcmp(obj->name, mod->name))
1193*4882a593Smuzhiyun continue;
1194*4882a593Smuzhiyun
1195*4882a593Smuzhiyun obj->mod = mod;
1196*4882a593Smuzhiyun
1197*4882a593Smuzhiyun ret = klp_init_object_loaded(patch, obj);
1198*4882a593Smuzhiyun if (ret) {
1199*4882a593Smuzhiyun pr_warn("failed to initialize patch '%s' for module '%s' (%d)\n",
1200*4882a593Smuzhiyun patch->mod->name, obj->mod->name, ret);
1201*4882a593Smuzhiyun goto err;
1202*4882a593Smuzhiyun }
1203*4882a593Smuzhiyun
1204*4882a593Smuzhiyun pr_notice("applying patch '%s' to loading module '%s'\n",
1205*4882a593Smuzhiyun patch->mod->name, obj->mod->name);
1206*4882a593Smuzhiyun
1207*4882a593Smuzhiyun ret = klp_pre_patch_callback(obj);
1208*4882a593Smuzhiyun if (ret) {
1209*4882a593Smuzhiyun pr_warn("pre-patch callback failed for object '%s'\n",
1210*4882a593Smuzhiyun obj->name);
1211*4882a593Smuzhiyun goto err;
1212*4882a593Smuzhiyun }
1213*4882a593Smuzhiyun
1214*4882a593Smuzhiyun ret = klp_patch_object(obj);
1215*4882a593Smuzhiyun if (ret) {
1216*4882a593Smuzhiyun pr_warn("failed to apply patch '%s' to module '%s' (%d)\n",
1217*4882a593Smuzhiyun patch->mod->name, obj->mod->name, ret);
1218*4882a593Smuzhiyun
1219*4882a593Smuzhiyun klp_post_unpatch_callback(obj);
1220*4882a593Smuzhiyun goto err;
1221*4882a593Smuzhiyun }
1222*4882a593Smuzhiyun
1223*4882a593Smuzhiyun if (patch != klp_transition_patch)
1224*4882a593Smuzhiyun klp_post_patch_callback(obj);
1225*4882a593Smuzhiyun
1226*4882a593Smuzhiyun break;
1227*4882a593Smuzhiyun }
1228*4882a593Smuzhiyun }
1229*4882a593Smuzhiyun
1230*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1231*4882a593Smuzhiyun
1232*4882a593Smuzhiyun return 0;
1233*4882a593Smuzhiyun
1234*4882a593Smuzhiyun err:
1235*4882a593Smuzhiyun /*
1236*4882a593Smuzhiyun * If a patch is unsuccessfully applied, return
1237*4882a593Smuzhiyun * error to the module loader.
1238*4882a593Smuzhiyun */
1239*4882a593Smuzhiyun pr_warn("patch '%s' failed for module '%s', refusing to load module '%s'\n",
1240*4882a593Smuzhiyun patch->mod->name, obj->mod->name, obj->mod->name);
1241*4882a593Smuzhiyun mod->klp_alive = false;
1242*4882a593Smuzhiyun obj->mod = NULL;
1243*4882a593Smuzhiyun klp_cleanup_module_patches_limited(mod, patch);
1244*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1245*4882a593Smuzhiyun
1246*4882a593Smuzhiyun return ret;
1247*4882a593Smuzhiyun }
1248*4882a593Smuzhiyun
klp_module_going(struct module * mod)1249*4882a593Smuzhiyun void klp_module_going(struct module *mod)
1250*4882a593Smuzhiyun {
1251*4882a593Smuzhiyun if (WARN_ON(mod->state != MODULE_STATE_GOING &&
1252*4882a593Smuzhiyun mod->state != MODULE_STATE_COMING))
1253*4882a593Smuzhiyun return;
1254*4882a593Smuzhiyun
1255*4882a593Smuzhiyun mutex_lock(&klp_mutex);
1256*4882a593Smuzhiyun /*
1257*4882a593Smuzhiyun * Each module has to know that klp_module_going()
1258*4882a593Smuzhiyun * has been called. We never know what module will
1259*4882a593Smuzhiyun * get patched by a new patch.
1260*4882a593Smuzhiyun */
1261*4882a593Smuzhiyun mod->klp_alive = false;
1262*4882a593Smuzhiyun
1263*4882a593Smuzhiyun klp_cleanup_module_patches_limited(mod, NULL);
1264*4882a593Smuzhiyun
1265*4882a593Smuzhiyun mutex_unlock(&klp_mutex);
1266*4882a593Smuzhiyun }
1267*4882a593Smuzhiyun
klp_init(void)1268*4882a593Smuzhiyun static int __init klp_init(void)
1269*4882a593Smuzhiyun {
1270*4882a593Smuzhiyun klp_root_kobj = kobject_create_and_add("livepatch", kernel_kobj);
1271*4882a593Smuzhiyun if (!klp_root_kobj)
1272*4882a593Smuzhiyun return -ENOMEM;
1273*4882a593Smuzhiyun
1274*4882a593Smuzhiyun return 0;
1275*4882a593Smuzhiyun }
1276*4882a593Smuzhiyun
1277*4882a593Smuzhiyun module_init(klp_init);
1278