blob: 470944aa865811e5c49c58245ab49fbe8a3f2ec6 [file] [log] [blame]
Joe Lawrence93862e32017-10-13 15:08:41 -04001======================
2(Un)patching Callbacks
3======================
4
5Livepatch (un)patch-callbacks provide a mechanism for livepatch modules
6to execute callback functions when a kernel object is (un)patched. They
Petr Mladekd9defe42019-05-03 16:30:24 +02007can be considered a **power feature** that **extends livepatching abilities**
Joe Lawrence93862e32017-10-13 15:08:41 -04008to include:
9
10 - Safe updates to global data
11
12 - "Patches" to init and probe functions
13
14 - Patching otherwise unpatchable code (i.e. assembly)
15
16In most cases, (un)patch callbacks will need to be used in conjunction
17with memory barriers and kernel synchronization primitives, like
18mutexes/spinlocks, or even stop_machine(), to avoid concurrency issues.
19
Petr Mladekd9defe42019-05-03 16:30:24 +0200201. Motivation
21=============
22
Joe Lawrence93862e32017-10-13 15:08:41 -040023Callbacks differ from existing kernel facilities:
24
25 - Module init/exit code doesn't run when disabling and re-enabling a
26 patch.
27
28 - A module notifier can't stop a to-be-patched module from loading.
29
30Callbacks are part of the klp_object structure and their implementation
31is specific to that klp_object. Other livepatch objects may or may not
32be patched, irrespective of the target klp_object's current state.
33
Petr Mladekd9defe42019-05-03 16:30:24 +0200342. Callback types
35=================
36
Joe Lawrence93862e32017-10-13 15:08:41 -040037Callbacks can be registered for the following livepatch actions:
38
Mauro Carvalho Chehab89e33ea2019-05-03 16:30:23 +020039 * Pre-patch
40 - before a klp_object is patched
Joe Lawrence93862e32017-10-13 15:08:41 -040041
Mauro Carvalho Chehab89e33ea2019-05-03 16:30:23 +020042 * Post-patch
43 - after a klp_object has been patched and is active
Joe Lawrence93862e32017-10-13 15:08:41 -040044 across all tasks
45
Mauro Carvalho Chehab89e33ea2019-05-03 16:30:23 +020046 * Pre-unpatch
47 - before a klp_object is unpatched (ie, patched code is
Joe Lawrence93862e32017-10-13 15:08:41 -040048 active), used to clean up post-patch callback
49 resources
50
Mauro Carvalho Chehab89e33ea2019-05-03 16:30:23 +020051 * Post-unpatch
52 - after a klp_object has been patched, all code has
Joe Lawrence93862e32017-10-13 15:08:41 -040053 been restored and no tasks are running patched code,
54 used to cleanup pre-patch callback resources
55
Petr Mladekd9defe42019-05-03 16:30:24 +0200563. How it works
57===============
58
Joe Lawrence93862e32017-10-13 15:08:41 -040059Each callback is optional, omitting one does not preclude specifying any
60other. However, the livepatching core executes the handlers in
61symmetry: pre-patch callbacks have a post-unpatch counterpart and
62post-patch callbacks have a pre-unpatch counterpart. An unpatch
63callback will only be executed if its corresponding patch callback was
64executed. Typical use cases pair a patch handler that acquires and
65configures resources with an unpatch handler tears down and releases
66those same resources.
67
68A callback is only executed if its host klp_object is loaded. For
69in-kernel vmlinux targets, this means that callbacks will always execute
70when a livepatch is enabled/disabled. For patch target kernel modules,
71callbacks will only execute if the target module is loaded. When a
72module target is (un)loaded, its callbacks will execute only if the
73livepatch module is enabled.
74
75The pre-patch callback, if specified, is expected to return a status
76code (0 for success, -ERRNO on error). An error status code indicates
77to the livepatching core that patching of the current klp_object is not
78safe and to stop the current patching request. (When no pre-patch
79callback is provided, the transition is assumed to be safe.) If a
80pre-patch callback returns failure, the kernel's module loader will:
81
82 - Refuse to load a livepatch, if the livepatch is loaded after
83 targeted code.
84
85 or:
86
87 - Refuse to load a module, if the livepatch was already successfully
88 loaded.
89
90No post-patch, pre-unpatch, or post-unpatch callbacks will be executed
91for a given klp_object if the object failed to patch, due to a failed
92pre_patch callback or for any other reason.
93
94If a patch transition is reversed, no pre-unpatch handlers will be run
95(this follows the previously mentioned symmetry -- pre-unpatch callbacks
96will only occur if their corresponding post-patch callback executed).
97
98If the object did successfully patch, but the patch transition never
99started for some reason (e.g., if another object failed to patch),
100only the post-unpatch callback will be called.
101
Petr Mladekd9defe42019-05-03 16:30:24 +02001024. Use cases
103============
Joe Lawrence93862e32017-10-13 15:08:41 -0400104
Petr Mladekd9defe42019-05-03 16:30:24 +0200105Sample livepatch modules demonstrating the callback API can be found in
106samples/livepatch/ directory. These samples were modified for use in
107kselftests and can be found in the lib/livepatch directory.
Joe Lawrence93862e32017-10-13 15:08:41 -0400108
Petr Mladekd9defe42019-05-03 16:30:24 +0200109Global data update
Joe Lawrence93862e32017-10-13 15:08:41 -0400110------------------
111
112A pre-patch callback can be useful to update a global variable. For
113example, 75ff39ccc1bd ("tcp: make challenge acks less predictable")
114changes a global sysctl, as well as patches the tcp_send_challenge_ack()
115function.
116
117In this case, if we're being super paranoid, it might make sense to
118patch the data *after* patching is complete with a post-patch callback,
119so that tcp_send_challenge_ack() could first be changed to read
120sysctl_tcp_challenge_ack_limit with READ_ONCE.
121
Petr Mladekd9defe42019-05-03 16:30:24 +0200122__init and probe function patches support
Joe Lawrence93862e32017-10-13 15:08:41 -0400123-----------------------------------------
124
125Although __init and probe functions are not directly livepatch-able, it
126may be possible to implement similar updates via pre/post-patch
127callbacks.
128
Petr Mladekd9defe42019-05-03 16:30:24 +0200129The commit ``48900cb6af42 ("virtio-net: drop NETIF_F_FRAGLIST")`` change the way that
Joe Lawrence93862e32017-10-13 15:08:41 -0400130virtnet_probe() initialized its driver's net_device features. A
131pre/post-patch callback could iterate over all such devices, making a
132similar change to their hw_features value. (Client functions of the
133value may need to be updated accordingly.)