Re: [PATCH v3 00/15] livepatch: hybrid consistency model
From: Josh Poimboeuf
Date: Mon Dec 12 2016 - 09:04:12 EST
On Sun, Dec 11, 2016 at 01:08:33PM +1100, Balbir Singh wrote:
>
>
> On 11/12/16 04:17, Josh Poimboeuf wrote:
> > On Sat, Dec 10, 2016 at 04:46:17PM +1100, Balbir Singh wrote:
> >> On Thu, 2016-12-08 at 12:08 -0600, Josh Poimboeuf wrote:
> >>> Dusting the cobwebs off the consistency model again. This is based on
> >>> linux-next/master.
> >>>
> >>> v1 was posted on 2015-02-09:
> >>>
> >>> https://lkml.kernel.org/r/cover.1423499826.git.jpoimboe@xxxxxxxxxx
> >>>
> >>> v2 was posted on 2016-04-28:
> >>>
> >>> https://lkml.kernel.org/r/cover.1461875890.git.jpoimboe@xxxxxxxxxx
> >>>
> >>> The biggest issue from v2 was finding a decent way to detect preemption
> >>> and page faults on the stack of a sleeping task.
> >>
> >> Could you please elaborate on this? Preemption of a sleeping task and
> >> faults as in the future (time) preemption and faults?
> >
> > The normal way for a task to go to sleep is to call schedule(). objtool
> > ensures the stack trace is reliable in that case, by making sure that
> > all functions save the frame pointer on the stack before calling out to
> > another function.
> >
> > But a task can also go to sleep in a few other ways. One way is by
> > preemption, where an interrupt handler interrupts the task and calls
> > preempt_schedule_irq().
>
> It's preempted, not sleeping. It's on_rq but not on_cpu.
You're right, I used the word "sleeping" when I meant "not currently
executing on a CPU". (Peter Z also pointed that out.)
> Another way is by a page fault exception. In
> > both cases, there's no guarantee that the interrupted function saved the
> > frame pointer on the stack beforehand. So the stack trace might be
> > unreliable. Fortunately, interrupts and exceptions leave evidence
> > behind on the stack. So when walking the stack of a sleeping task, we
> > can detect when an IRQ or exception occurred, and consider such a stack
> > unreliable.
> >
>
> Thanks for the explanation. I presume a whole lot of this is arch specific
> code? I'll look at the patches as well
Most of the new livepatch code is arch-independent, but the consistency
model part of it (i.e., !klp_patch.immediate) is currently only
supported by x86_64.
For adding support for other architectures, there are a few options:
1) Add CONFIG_HAVE_RELIABLE_STACKTRACE. This means porting objtool, and
for non-DWARF unwinders, also making sure there's a way for the stack
tracing code to detect interrupts on the stack.
2) Alternatively, figure out a way to patch kthreads without stack
checking. If all kthreads sleep in the same place, then we can
designate that place as a patching point. I think Petr M has been
working on that? In that case, arches without
HAVE_RELIABLE_STACKTRACE would still be able to use the
non-stack-checking parts of the consistency model:
a) patching user tasks when they cross the kernel/user space
boundary; and
b) patching kthreads and idle tasks at their designated patch points.
This option isn't as good as option 1 because it requires signaling
most of the tasks to patch them. But it could still be a good backup
option for those architectures which don't have reliable stack traces
yet.
In the meantime, other architectures can keep today's behavior by
setting klp_patch.immediate to true.
--
Josh