101 lines
2.8 KiB
Diff
101 lines
2.8 KiB
Diff
From cdee6bd650a35075515d4fe2bb67657811c9640c Mon Sep 17 00:00:00 2001
|
|
From: Joe Lawrence <joe.lawrence@redhat.com>
|
|
Date: Mon, 16 Nov 2020 15:21:59 -0500
|
|
Subject: [PATCH] kpatch: wait for module ref counts on unload
|
|
|
|
There exists a very small timing window in which "kpatch unload" gets to
|
|
its "rmmod" step before the kpatch-patch module's reference count has
|
|
cleared and the "rmmod" fails.
|
|
|
|
This is only a transient problem, but we can adopt code from upstream
|
|
livepatch kselftests which wait for the module refcounts to settle
|
|
before moving onto "rmmod".
|
|
|
|
A small wrinkle is that this is not supported by the older kpatch.ko
|
|
core. The price for circumventing the activeness safety check via
|
|
KPATCH_FORCE_UNSAFE is that it must leave the kpatch patch modules in
|
|
place (see e1890e627a9b ("prevent rmmod of forced modules")).
|
|
|
|
Signed-off-by: Joe Lawrence <joe.lawrence@redhat.com>
|
|
---
|
|
kpatch/kpatch | 40 ++++++++++++++++++++++++++++++++++++++--
|
|
1 file changed, 38 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/kpatch/kpatch b/kpatch/kpatch
|
|
index bca8f41..b35b742 100755
|
|
--- a/kpatch/kpatch
|
|
+++ b/kpatch/kpatch
|
|
@@ -28,6 +28,7 @@ SCRIPTDIR="$(readlink -f "$(dirname "$(type -p "$0")")")"
|
|
VERSION="0.9.2"
|
|
POST_ENABLE_WAIT=15 # seconds
|
|
POST_SIGNAL_WAIT=60 # seconds
|
|
+MODULE_REF_WAIT=15 # seconds
|
|
|
|
# How many times to try loading the patch if activeness safety check fails.
|
|
MAX_LOAD_ATTEMPTS=5
|
|
@@ -125,6 +126,10 @@ find_core_module() {
|
|
return 1
|
|
}
|
|
|
|
+kpatch_core_loaded() {
|
|
+ grep -q -e "T kpatch_register" /proc/kallsyms
|
|
+}
|
|
+
|
|
core_loaded () {
|
|
grep -q -e "T klp_enable_patch" -e "T kpatch_register" /proc/kallsyms
|
|
}
|
|
@@ -265,6 +270,31 @@ wait_for_patch_transition() {
|
|
return 1
|
|
}
|
|
|
|
+module_ref_count() {
|
|
+ local modname="$1"
|
|
+ [[ $(cat "/sys/module/$modname/refcnt" 2>/dev/null) != "0" ]]
|
|
+}
|
|
+
|
|
+wait_for_zero_module_ref_count() {
|
|
+ local modname="$1"
|
|
+ local i=0
|
|
+
|
|
+ # We can't rely on a zero refcount with kpatch.ko as it
|
|
+ # implements KPATCH_FORCE_UNSAFE with an additional reference on
|
|
+ # kpatch-patch modules to avoid potential crashes.
|
|
+ kpatch_core_loaded && return 0
|
|
+
|
|
+ module_ref_count "$modname" || return 0
|
|
+
|
|
+ echo "waiting (up to $MODULE_REF_WAIT seconds) for module refcount..."
|
|
+ for (( i=0; i<MODULE_REF_WAIT; i++ )); do
|
|
+ module_ref_count "$modname" || return 0
|
|
+ sleep 1s
|
|
+ done
|
|
+
|
|
+ return 1
|
|
+}
|
|
+
|
|
load_module () {
|
|
local module="$1"
|
|
|
|
@@ -381,10 +411,16 @@ disable_patch_strict () {
|
|
}
|
|
|
|
remove_module () {
|
|
- echo "unloading patch module: $1"
|
|
+ local modname="$1"
|
|
+
|
|
+ if ! wait_for_zero_module_ref_count "$modname"; then
|
|
+ die "failed to unload module $modname (refcnt)"
|
|
+ fi
|
|
+
|
|
+ echo "unloading patch module: $modname"
|
|
# ignore any error here because rmmod can fail if the module used
|
|
# KPATCH_FORCE_UNSAFE.
|
|
- rmmod "$1" 2> /dev/null || return 0
|
|
+ rmmod "$modname" 2> /dev/null || return 0
|
|
}
|
|
|
|
unload_module () {
|
|
--
|
|
2.25.4
|
|
|