Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp690923ybi; Fri, 14 Jun 2019 01:36:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqw0c1kkpuMPkYBGdwI8cdpT+szDQQ5nZ8vX6yncnf5J69MErbuQZkuDLcGez6VXcxJf6+Lo X-Received: by 2002:a62:2e46:: with SMTP id u67mr97447340pfu.206.1560501394397; Fri, 14 Jun 2019 01:36:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560501394; cv=none; d=google.com; s=arc-20160816; b=l6XYmpJEZxjg9yfWMjTUujVuD6RN3N/iLSQgNNgeDug4LLZ+ws6c6efUQtDvTD+oDy 1cyki/hahJ2gL6BNYiwYaiLQukSo8IbK/Mlkp9/9fpapjqt7VZSTnCAilAxUwSgD0BeL ChsEslGNFk+Y0/sIKWNV9/Y04eHS6851UE8mgtHBQLv2q64RdKOc+oZ88JMTYiBsU2l7 ESCaEJPX8INJNnuEodLGPsYtr2Pzqwtiv8GZIrYACS4v9YgQqNm3WPb0PeIgl3rTq6b7 GDV5YhNusBIuH9WqVr5ik7kABPhUlO8xtPfPg/L8HftRYyTechFBW74f0PkCGtKpCwSl 2nXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=FafimAj3sQc7J89ZTboMiYe+vEdE7k5BsLkhuB1M7M4=; b=QzNpr2rN7JCYrM1B1eyPfyQ/v711eG1AduHEUQUmkXXrWqpAOR9Uiue7gUEvVA0NgI Jv4ExbX6fMkDmOR1nRlbLWQOsk+/8j6aG+KjLd2ZDv37tQ5mWluR69EPIsByfHCM9pzu BOU1d9hDVAOovwcwRvyUGFyCAtk6G4I/ljhE1+4FKZ85QabTroqbjplJf9+xbAfl4x6M 45jQT+g7CPVHLIWli7yIRExs/kJj+a6FNy6D/d0G8a4wpsYAMbVOk8QtDxfbLEqNOlWD yCWjQoPK4N2zB4sUtQqUBY3cinnfOaTxwTTqlQnz3TSF5wln006tlNpLLx1kanNd8iFR PZpQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j19si1940967pgh.483.2019.06.14.01.36.17; Fri, 14 Jun 2019 01:36:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726785AbfFNIei (ORCPT + 99 others); Fri, 14 Jun 2019 04:34:38 -0400 Received: from mx2.suse.de ([195.135.220.15]:43676 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726259AbfFNIeh (ORCPT ); Fri, 14 Jun 2019 04:34:37 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 96AE4ADFA; Fri, 14 Jun 2019 08:34:35 +0000 (UTC) Date: Fri, 14 Jun 2019 10:34:35 +0200 From: Petr Mladek To: Joe Lawrence Cc: Miroslav Benes , linux-kernel@vger.kernel.org, live-patching@vger.kernel.org, linux-kbuild@vger.kernel.org Subject: Re: [PATCH v4 00/10] klp-convert livepatch build tooling Message-ID: <20190614083435.uq3mk6mprbatysol@pathway.suse.cz> References: <20190509143859.9050-1-joe.lawrence@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 2019-06-13 16:48:02, Joe Lawrence wrote: > On 6/13/19 9:15 AM, Joe Lawrence wrote: > > On 6/13/19 9:00 AM, Miroslav Benes wrote: > >> Hi Joe, > >> > >> first, I'm sorry for the lack of response so far. > >> > >> Maybe you've already noticed but the selftests fail. Well, at least in > >> my VM. When test_klp_convert1.ko is loaded, the process is killed with > >> > >> [ 518.041826] BUG: kernel NULL pointer dereference, address: 0000000000000000 > >> [ 518.042816] #PF: supervisor read access in kernel mode > >> [ 518.043393] #PF: error_code(0x0000) - not-present page > >> [ 518.043981] PGD 0 P4D 0 > >> [ 518.044185] Oops: 0000 [#1] SMP PTI > >> [ 518.044518] CPU: 2 PID: 2255 Comm: insmod Tainted: G O K 5.1.0-klp_convert_v4-193435-g67748576637e #2 > >> [ 518.045784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58-prebuilt.qemu.org 04/01/2014 > >> [ 518.046940] RIP: 0010:test_klp_convert_init+0x1c/0x40 [test_klp_convert1] > >> [ 518.047611] Code: 1b a0 48 89 c6 e9 a8 c0 f4 e0 0f 1f 40 00 0f 1f 44 00 00 53 48 c7 c7 00 30 1b a0 e8 5e 33 f6 e0 85 c0 89 c3 74 04 89 d8 5b c3 <48> 8b 35 5d ef e4 5f 48 c7 c7 28 20 1b a0 e8 75 c0 f4 e0 e8 6c ff > >> [ 518.049779] RSP: 0018:ffffc90000f37cc8 EFLAGS: 00010246 > >> [ 518.050243] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000027de0 > >> [ 518.050922] RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffff88807ab54f40 > >> [ 518.051619] RBP: ffffffffa01b1080 R08: 0000000096efde7a R09: 0000000000000001 > >> [ 518.052332] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000ffffffff > >> [ 518.053012] R13: 0000000000000000 R14: ffff888078b55000 R15: ffffc90000f37ea0 > >> [ 518.053714] FS: 00007febece1fb80(0000) GS:ffff88807d400000(0000) knlGS:0000000000000000 > >> [ 518.054514] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > >> [ 518.055078] CR2: 0000000000000000 CR3: 000000007a56a000 CR4: 00000000000006e0 > >> [ 518.055818] Call Trace: > >> [ 518.056007] do_one_initcall+0x6a/0x2da > >> [ 518.056340] ? do_init_module+0x22/0x230 > >> [ 518.056702] ? rcu_read_lock_sched_held+0x96/0xa0 > >> [ 518.057125] ? kmem_cache_alloc_trace+0x284/0x2e0 > >> [ 518.057493] do_init_module+0x5a/0x230 > >> [ 518.057900] load_module+0x17bc/0x1f50 > >> [ 518.058214] ? __symbol_put+0x40/0x40 > >> [ 518.058499] ? vfs_read+0x12d/0x160 > >> [ 518.058766] __do_sys_finit_module+0x83/0xc0 > >> [ 518.059122] do_syscall_64+0x57/0x190 > >> [ 518.059407] entry_SYSCALL_64_after_hwframe+0x49/0xbe > >> ... > >> > >> It crashes right in test_klp_convert_init() when print_*() using > >> supposed-to-be-converted symbols are called. I'll debug it next week. Can > >> you reproduce it too? > > > > Hey, thanks for the report.. > > > > I don't recall the tests crashing, but I had put this patchset on the > > side for a few weeks now. I'll try to fire up a VM and see what happens > > today. > > > > Hmm, I haven't been able to reproduce using my original base (Linux 5.1-rc6) > or when rebased ontop of livepatching.git/master + 997a55f3fb6d("stacktrace: Unbreak stack_trace_save_tsk_reliable()") I stared into the code a bit but I did not find any bug. Let's hope that it was just some pre-vacation last minute mistake (system inconsistency or so ;-) Anyway, I am curious about one thing. I saw: function __load_mod() { local mod="$1"; shift local msg="% modprobe $mod $*" log "${msg%% }" ret=$(modprobe "$mod" "$@" 2>&1) if [[ "$ret" != "" ]]; then die "$ret" fi # Wait for module in sysfs ... loop_until '[[ -e "/sys/module/$mod" ]]' || die "failed to load module $mod" } Is the waiting for sysfs really necessary here? Note that it is /sys/module and not /sys/kernel/livepatch/. My understanding is that modprobe waits until the module succesfully loaded. mod_sysfs_setup() is called before the module init callback. Therefore the sysfs interface should be read before modprobe returns. Do I miss something? If it works different way then there might be some races because mod_sysfs_setup() is called before the module is alive. Best Regards, Petr