linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Ingo Molnar <mingo@kernel.org>
To: David Lang <david@lang.hm>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>,
	Frederic Weisbecker <fweisbec@gmail.com>,
	Seth Jennings <sjenning@redhat.com>,
	Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>,
	Steven Rostedt <rostedt@goodmis.org>,
	Ingo Molnar <mingo@redhat.com>, Jiri Slaby <jslaby@suse.cz>,
	linux-kernel@vger.kernel.org,
	Peter Zijlstra <a.p.zijlstra@chello.nl>,
	Andrew Morton <akpm@linux-foundation.org>,
	Linus Torvalds <torvalds@linux-foundation.org>,
	Thomas Gleixner <tglx@linutronix.de>
Subject: Re: [RFC PATCH 0/2] kpatch: dynamic kernel patching
Date: Thu, 8 May 2014 08:12:20 +0200	[thread overview]
Message-ID: <20140508061220.GB31184@gmail.com> (raw)
In-Reply-To: <alpine.DEB.2.02.1405071552520.5876@nftneq.ynat.uz>


* David Lang <david@lang.hm> wrote:

> On Wed, 7 May 2014, Ingo Molnar wrote:
> 
> >* Josh Poimboeuf <jpoimboe@redhat.com> wrote:
> >
> >>On Wed, May 07, 2014 at 02:24:44PM +0200, Ingo Molnar wrote:
> >>>
> >>>* Josh Poimboeuf <jpoimboe@redhat.com> wrote:
> >>>
> >>>>>Ah this reminds me when we chased kprobes dangerous spots and we
> >>>>>tried to declare __kprobes the functions which were too dangerous
> >>>>>to hot patch.
> >>>>>
> >>>>>We eventually gave up because it was impossible to fix everything.
> >>>>>And that was only for kprobes!
> >>>>>
> >>>>>So you can never tell if a given patch will impact a given
> >>>>>kthread.
> >>>>
> >>>>If the user (or the person creating the patch for them) doesn't
> >>>>understand all impacts of the patch, they have no business patching
> >>>>their kernel with it.
> >>>
> >>>I think what is being somewhat lost is this discussion is the
> >>>distinction between:
> >>>
> >>> 1) is the patch safe
> >>> 2) is the _live patching_ safe
> >>>
> >>>It's really two different things. We should absolutely strive for live
> >>>patching to be safe under all circumstances, as long as the patch
> >>>being fed to it is safe in itself when building a new kernel the old
> >>>fashioned way.
> >>>
> >>>I.e. it's natural that a kernel can be messed up via a patch, but this
> >>>subsystem should absolutely make sure that it will safely reject
> >>>totally fine patches that are unsafe to live patch.
> >>
> >>Thanks, that's a very succinct way to put it.  They are indeed two
> >>different things, but at the same time they're interrelated: determining
> >>whether a patch is safe requires making assumptions about how it will be
> >>applied.
> >
> >No!
> >
> >A patch to the kernel source is 'safe' if it results in a correctly
> >patched kernel source. Full stop!
> >
> >Live patching does not enter into this question, ever. The correctness
> >of a patch to the source does not depend on 'live patching'
> >considerations in any way, shape or form.
> >
> >Any mechanism that tries to blur these lines is broken by design.
> >
> >My claim is that if a patch is correct/safe in the old fashioned way,
> >then a fundamental principle is that a live patching subsystem must
> >either safely apply, or safely reject the live patching attempt,
> >independently from any user input.
> >
> >It's similar to how kprobes (or ftrace) will safely reject or perform
> >a live patching of the kernel.
> >
> >So for example, there's this recent upstream kernel fix:
> >
> > 3ca9e5d36afb agp: info leak in agpioc_info_wrap()
> >
> >which fixes an information leak. The 'patch' is Git commit
> >3ca9e5d36afb (i.e. it patches a very specific incoming kernel source
> >tree that results in a specific outgoing source tree), and we know
> >it's safe and correct.
> >
> >Any live patching subsystem must make sure that if this patch is
> >live-patched, that this attempt is either rejected safely or performed
> >safely.
> >
> >"We think/hope it won't blow up in most cases and we automated some
> >checks halfways" or "the user must know what he is doing" is really
> >not something that I think is a good concept for something as fragile
> >as live patching.
> 
> In that case you will have to reject any kernel patch that changes 
> any memory structure, because it's impossible as a general rule to 
> say that changing memory structures is going to be safe (or even 
> possible) to change.
> 
> that includes any access to memory that moves around a lock

Initially restricting it to such patches would be a good beginning - 
most of the security fixes are just failed checks, i.e. they don't 
typically even change any external (not on stack) memory structure, 
right?

Thanks,

	Ingo

  reply	other threads:[~2014-05-08  6:12 UTC|newest]

Thread overview: 60+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-05-01 15:52 [RFC PATCH 0/2] kpatch: dynamic kernel patching Josh Poimboeuf
2014-05-01 15:52 ` [RFC PATCH 1/2] kpatch: add TAINT_KPATCH flag Josh Poimboeuf
2014-05-01 15:52 ` [RFC PATCH 2/2] kpatch: add kpatch core module Josh Poimboeuf
2014-05-01 20:45 ` [RFC PATCH 0/2] kpatch: dynamic kernel patching Andi Kleen
2014-05-01 21:01   ` Josh Poimboeuf
2014-05-01 21:06     ` Andi Kleen
2014-05-01 21:27       ` Josh Poimboeuf
2014-05-01 21:39         ` Josh Poimboeuf
2014-05-02  1:30       ` Masami Hiramatsu
2014-05-02  8:37 ` Jiri Kosina
2014-05-02 13:29   ` Josh Poimboeuf
2014-05-02 13:10 ` Jiri Kosina
2014-05-02 13:37   ` Josh Poimboeuf
2014-05-05 23:34   ` David Lang
2014-05-05 23:52     ` Jiri Kosina
2014-05-06  1:59       ` David Lang
2014-05-06 12:17         ` Josh Poimboeuf
2014-05-06  7:32       ` Ingo Molnar
2014-05-06  8:03         ` Jiri Kosina
2014-05-06 12:23         ` Josh Poimboeuf
2014-05-07 12:19           ` Ingo Molnar
2014-05-09  1:46             ` David Lang
2014-05-09  2:45               ` Steven Rostedt
2014-05-09  4:07               ` Masami Hiramatsu
2014-05-05  8:55 ` Ingo Molnar
2014-05-05 13:26   ` Josh Poimboeuf
2014-05-05 14:10     ` Frederic Weisbecker
2014-05-05 18:43       ` Ingo Molnar
2014-05-05 21:49         ` Frederic Weisbecker
2014-05-06 12:12           ` Josh Poimboeuf
2014-05-06 12:33             ` Steven Rostedt
2014-05-06 22:49               ` Masami Hiramatsu
2014-05-06 14:05             ` Frederic Weisbecker
2014-05-06 14:50               ` Josh Poimboeuf
2014-05-07 12:24                 ` Ingo Molnar
2014-05-07 15:41                   ` Josh Poimboeuf
2014-05-07 15:57                     ` Ingo Molnar
2014-05-07 16:43                       ` Josh Poimboeuf
2014-05-07 22:56                       ` David Lang
2014-05-08  6:12                         ` Ingo Molnar [this message]
2014-05-08  6:50                           ` David Lang
2014-05-08  7:08                             ` Ingo Molnar
2014-05-08  7:29                               ` Masami Hiramatsu
2014-05-08 12:48                               ` Josh Poimboeuf
2014-05-09  6:21                                 ` Masami Hiramatsu
2014-06-14 20:31                               ` Pavel Machek
2014-06-15  6:57                                 ` Ingo Molnar
2014-05-06 11:45         ` Masami Hiramatsu
2014-05-06 12:26           ` Steven Rostedt
2014-05-06 22:33             ` Masami Hiramatsu
2014-05-16 16:27             ` Jiri Kosina
2014-05-16 17:14               ` Josh Poimboeuf
2014-05-20  9:37                 ` Jiri Kosina
2014-05-20 12:59                   ` Josh Poimboeuf
2014-05-16 18:09               ` Masami Hiramatsu
2014-05-17 22:46                 ` Vojtech Pavlik
2014-05-16 18:55               ` Steven Rostedt
2014-05-16 22:32                 ` Jiri Kosina
2014-05-17  0:27                   ` Steven Rostedt
2014-05-17  7:10                     ` Jiri Kosina

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140508061220.GB31184@gmail.com \
    --to=mingo@kernel.org \
    --cc=a.p.zijlstra@chello.nl \
    --cc=akpm@linux-foundation.org \
    --cc=david@lang.hm \
    --cc=fweisbec@gmail.com \
    --cc=jpoimboe@redhat.com \
    --cc=jslaby@suse.cz \
    --cc=linux-kernel@vger.kernel.org \
    --cc=masami.hiramatsu.pt@hitachi.com \
    --cc=mingo@redhat.com \
    --cc=rostedt@goodmis.org \
    --cc=sjenning@redhat.com \
    --cc=tglx@linutronix.de \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).