From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755976AbaEGMYv (ORCPT ); Wed, 7 May 2014 08:24:51 -0400 Received: from mail-ee0-f48.google.com ([74.125.83.48]:53741 "EHLO mail-ee0-f48.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750900AbaEGMYu (ORCPT ); Wed, 7 May 2014 08:24:50 -0400 Date: Wed, 7 May 2014 14:24:44 +0200 From: Ingo Molnar To: Josh Poimboeuf Cc: Frederic Weisbecker , Seth Jennings , Masami Hiramatsu , Steven Rostedt , Ingo Molnar , Jiri Slaby , linux-kernel@vger.kernel.org, Peter Zijlstra , Andrew Morton , Linus Torvalds , Thomas Gleixner Subject: Re: [RFC PATCH 0/2] kpatch: dynamic kernel patching Message-ID: <20140507122444.GB12234@gmail.com> References: <20140505085537.GA32196@gmail.com> <20140505132638.GA14432@treble.redhat.com> <20140505141038.GA27403@localhost.localdomain> <20140505184304.GA15137@gmail.com> <20140505214919.GE2099@localhost.localdomain> <20140506121211.GA4125@treble.redhat.com> <20140506140516.GF2099@localhost.localdomain> <20140506145010.GA6702@treble.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20140506145010.GA6702@treble.redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Josh Poimboeuf wrote: > > Ah this reminds me when we chased kprobes dangerous spots and we > > tried to declare __kprobes the functions which were too dangerous > > to hot patch. > > > > We eventually gave up because it was impossible to fix everything. > > And that was only for kprobes! > > > > So you can never tell if a given patch will impact a given > > kthread. > > If the user (or the person creating the patch for them) doesn't > understand all impacts of the patch, they have no business patching > their kernel with it. I think what is being somewhat lost is this discussion is the distinction between: 1) is the patch safe 2) is the _live patching_ safe It's really two different things. We should absolutely strive for live patching to be safe under all circumstances, as long as the patch being fed to it is safe in itself when building a new kernel the old fashioned way. I.e. it's natural that a kernel can be messed up via a patch, but this subsystem should absolutely make sure that it will safely reject totally fine patches that are unsafe to live patch. Thanks, Ingo