Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp546328rdd; Tue, 9 Jan 2024 11:48:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IFcMVNfeC8JOp6GwFN8OMq2aZWWdORY426R7ZwRCpvs5/YrjwNpWDsmtIG+Nnqg5QxJwNY+ X-Received: by 2002:a19:7518:0:b0:50e:61c0:cfdf with SMTP id y24-20020a197518000000b0050e61c0cfdfmr2499425lfe.132.1704829699893; Tue, 09 Jan 2024 11:48:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704829699; cv=none; d=google.com; s=arc-20160816; b=jq6vofnZcVVFNpGxqdV3uBtfxVgNDNBOpErki6Mi5HRrvbHhbKARy8+dKYVFQppaa+ g2Zeb8TmvJOg4g4uV0HGTeCRK31XODy7A40Q7abOluRiMEWfvsQn7ezw0a2LYZ/Oj2df A8jY+BwfPke1uL0W+dKtYX4nwRSiE49mq2Yw1eU27CMXqgnnnKQob/vGpCygKirtZ6+K 71Sxkec+o2WevKJFyNxcR9QuLZi7ZxZqEGV94YS8cvz3uy0J1lGuS9RyQ0PB/MBpBtW+ jJM31W6b5BmHBUoC817ctQ1K/msP1IoFD/ToWORaIayKyd0ERYn8B8LBxt84ztZgba7x +0zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:dkim-signature:message-id; bh=zsdEHeEwRYmVyFsFYFedUjisXdYoKaXuYf8Fki4RZuY=; fh=ltPIZRnzWBPrnv4MTE6LRraKbmqJ2zH7+UjAe3uc5gA=; b=idjFZ0k3DAyGxjQUeK5ECPseBnllMJaEBf5CIC0uHJhq63QU+OmCqd/46JfkxbYYRW OC+0ptdqi0Mk36dl/h/jWsPatPQflfeg3m0ZdgpMmloWodm/ntOZpDq5nfyfx5wkH12n 5AZ5wr7EFog5aRkUpvE+Es4D14z7uzUo6ywUZghhXrl67AdqScIM+lC2jhZGSGLtxwzF QAn+2hTKTdlIa5OXrcR5L0jt9HtE5XWHM+tscA+TiMKLfvbADhqcmnZ5j0epQuGzyzTV NDx3MXnqgKohdkknGg64kO9l++9qEyCs2plYH7kbI8kq+q/j7n3TLrQmYmP6msS+yCX8 xQSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=fLrETZHQ; spf=pass (google.com: domain of linux-kernel+bounces-21355-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-21355-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id w14-20020a1709064a0e00b00a2b2c19e32asi1017585eju.78.2024.01.09.11.48.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Jan 2024 11:48:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-21355-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=fLrETZHQ; spf=pass (google.com: domain of linux-kernel+bounces-21355-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-21355-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 9F9921F209B7 for ; Tue, 9 Jan 2024 19:48:19 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4E1C73D56D; Tue, 9 Jan 2024 19:40:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="fLrETZHQ" Received: from out-185.mta0.migadu.com (out-185.mta0.migadu.com [91.218.175.185]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 278303D3B1 for ; Tue, 9 Jan 2024 19:40:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Message-ID: <82f55c0e-0ec8-4fe1-8d8c-b1de07558ad9@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1704829243; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=zsdEHeEwRYmVyFsFYFedUjisXdYoKaXuYf8Fki4RZuY=; b=fLrETZHQx/JZZ5zipm54JSKGvNoZAzqY4Q1B1yXvx7aG5TlMzcJI+FIHGUyYoj8nwCVXsd 3DvHJf549YTYpCopq4+lVeCE9GTiqRg3M58jdh93gZoFxTJspRAYpXxV2gUBCNT6c+nEN9 vTgJpWSNyH3RkT0KAyG8OaW3hHShm08= Date: Tue, 9 Jan 2024 11:40:38 -0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Subject: Re: [PATCH bpf-next] selftests/bpf: fix potential premature unload in bpf_testmod Content-Language: en-GB To: Artem Savkov , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , bpf@vger.kernel.org, netdev@vger.kernel.org, jolsa@kernel.org Cc: linux-kernel@vger.kernel.org References: <20240109164317.16371-1-asavkov@redhat.com> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Yonghong Song In-Reply-To: <20240109164317.16371-1-asavkov@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Migadu-Flow: FLOW_OUT On 1/9/24 8:43 AM, Artem Savkov wrote: > It is possible for bpf_kfunc_call_test_release() to be called from > bpf_map_free_deferred() when bpf_testmod is already unloaded and > perf_test_stuct.cnt which it tries to decrease is no longer in memory. > This patch tries to fix the issue by waiting for all references to be > dropped in bpf_testmod_exit(). > > The issue can be triggered by running 'test_progs -t map_kptr' in 6.5, > but is obscured in 6.6 by d119357d07435 ("rcu-tasks: Treat only > synchronous grace periods urgently"). > > Fixes: 65eb006d85a2a ("bpf: Move kernel test kfuncs to bpf_testmod") Please add your Signed-off-by tag. I think the root cause is that bpf_kfunc_call_test_acquire() kfunc is defined in bpf_testmod and the kfunc returns some data in bpf_testmod. But the release function bpf_kfunc_call_test_release() is in the kernel. The release func tries to access some data in bpf_testmod which might have been unloaded. The prog_test_ref_kfunc is defined in the kernel, so no bpf_testmod btf reference is hold so bpf_testmod can be unloaded before bpf_kfunc_call_test_release(). As you mentioned, we won't have this issue if bpf_kfunc_call_test_acquire() is also in the kernel. I think putting bpf_kfunc_call_test_acquire() in bpf_testmod and bpf_kfunc_call_test_release() in kernel is not a good idea and confusing. But since this is only for tests, I guess we can live with that. With that, Acked-by: Yonghong Song > --- > tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > index 91907b321f913..63f0dbd016703 100644 > --- a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > +++ b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > @@ -2,6 +2,7 @@ > /* Copyright (c) 2020 Facebook */ > #include > #include > +#include > #include > #include > #include > @@ -544,6 +545,9 @@ static int bpf_testmod_init(void) > > static void bpf_testmod_exit(void) > { > + while (refcount_read(&prog_test_struct.cnt) > 1) > + msleep(20); > + > return sysfs_remove_bin_file(kernel_kobj, &bin_attr_bpf_testmod_file); > } >