123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173 |
- /*
- * Copyright (C) 2017 Joe Lawrence <joe.lawrence@redhat.com>
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License
- * as published by the Free Software Foundation; either version 2
- * of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, see <http://www.gnu.org/licenses/>.
- */
- /*
- * livepatch-shadow-fix1.c - Shadow variables, livepatch demo
- *
- * Purpose
- * -------
- *
- * Fixes the memory leak introduced in livepatch-shadow-mod through the
- * use of a shadow variable. This fix demonstrates the "extending" of
- * short-lived data structures by patching its allocation and release
- * functions.
- *
- *
- * Usage
- * -----
- *
- * This module is not intended to be standalone. See the "Usage"
- * section of livepatch-shadow-mod.c.
- */
- #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
- #include <linux/module.h>
- #include <linux/kernel.h>
- #include <linux/livepatch.h>
- #include <linux/slab.h>
- /* Shadow variable enums */
- #define SV_LEAK 1
- /* Allocate new dummies every second */
- #define ALLOC_PERIOD 1
- /* Check for expired dummies after a few new ones have been allocated */
- #define CLEANUP_PERIOD (3 * ALLOC_PERIOD)
- /* Dummies expire after a few cleanup instances */
- #define EXPIRE_PERIOD (4 * CLEANUP_PERIOD)
- struct dummy {
- struct list_head list;
- unsigned long jiffies_expire;
- };
- struct dummy *livepatch_fix1_dummy_alloc(void)
- {
- struct dummy *d;
- void *leak;
- d = kzalloc(sizeof(*d), GFP_KERNEL);
- if (!d)
- return NULL;
- d->jiffies_expire = jiffies +
- msecs_to_jiffies(1000 * EXPIRE_PERIOD);
- /*
- * Patch: save the extra memory location into a SV_LEAK shadow
- * variable. A patched dummy_free routine can later fetch this
- * pointer to handle resource release.
- */
- leak = kzalloc(sizeof(int), GFP_KERNEL);
- klp_shadow_alloc(d, SV_LEAK, &leak, sizeof(leak), GFP_KERNEL);
- pr_info("%s: dummy @ %p, expires @ %lx\n",
- __func__, d, d->jiffies_expire);
- return d;
- }
- void livepatch_fix1_dummy_free(struct dummy *d)
- {
- void **shadow_leak, *leak;
- /*
- * Patch: fetch the saved SV_LEAK shadow variable, detach and
- * free it. Note: handle cases where this shadow variable does
- * not exist (ie, dummy structures allocated before this livepatch
- * was loaded.)
- */
- shadow_leak = klp_shadow_get(d, SV_LEAK);
- if (shadow_leak) {
- leak = *shadow_leak;
- klp_shadow_free(d, SV_LEAK);
- kfree(leak);
- pr_info("%s: dummy @ %p, prevented leak @ %p\n",
- __func__, d, leak);
- } else {
- pr_info("%s: dummy @ %p leaked!\n", __func__, d);
- }
- kfree(d);
- }
- static struct klp_func funcs[] = {
- {
- .old_name = "dummy_alloc",
- .new_func = livepatch_fix1_dummy_alloc,
- },
- {
- .old_name = "dummy_free",
- .new_func = livepatch_fix1_dummy_free,
- }, { }
- };
- static struct klp_object objs[] = {
- {
- .name = "livepatch_shadow_mod",
- .funcs = funcs,
- }, { }
- };
- static struct klp_patch patch = {
- .mod = THIS_MODULE,
- .objs = objs,
- };
- static int livepatch_shadow_fix1_init(void)
- {
- int ret;
- if (!klp_have_reliable_stack() && !patch.immediate) {
- /*
- * WARNING: Be very careful when using 'patch.immediate' in
- * your patches. It's ok to use it for simple patches like
- * this, but for more complex patches which change function
- * semantics, locking semantics, or data structures, it may not
- * be safe. Use of this option will also prevent removal of
- * the patch.
- *
- * See Documentation/livepatch/livepatch.txt for more details.
- */
- patch.immediate = true;
- pr_notice("The consistency model isn't supported for your architecture. Bypassing safety mechanisms and applying the patch immediately.\n");
- }
- ret = klp_register_patch(&patch);
- if (ret)
- return ret;
- ret = klp_enable_patch(&patch);
- if (ret) {
- WARN_ON(klp_unregister_patch(&patch));
- return ret;
- }
- return 0;
- }
- static void livepatch_shadow_fix1_exit(void)
- {
- /* Cleanup any existing SV_LEAK shadow variables */
- klp_shadow_free_all(SV_LEAK);
- WARN_ON(klp_unregister_patch(&patch));
- }
- module_init(livepatch_shadow_fix1_init);
- module_exit(livepatch_shadow_fix1_exit);
- MODULE_LICENSE("GPL");
- MODULE_INFO(livepatch, "Y");
|