Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp957490rdd; Wed, 10 Jan 2024 04:50:15 -0800 (PST) X-Google-Smtp-Source: AGHT+IFg2U7rgQbOFjC3362motZhuVV8C0xw+YFXZGTG3nUm1MVWPMEFr/rLRkmKS8g84OsAAfPG X-Received: by 2002:ac8:5813:0:b0:429:9e61:990e with SMTP id g19-20020ac85813000000b004299e61990emr1279101qtg.103.1704891015305; Wed, 10 Jan 2024 04:50:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704891015; cv=none; d=google.com; s=arc-20160816; b=Qlu0j15jGNv03LFVaNIUh/sCVG4o+N//Ya60PnezTfp5ES328iye4HPNXVaQnUUYp5 joN21lKaAZSm/zGqFnYrtUkDLeb8lmrDvE4g3opoIQV5Bpfc/dWb9xtF/Qeuo2hTuIIw ggYtPL1ib34Q7+q0jdbDHJuD0YLzr5sTfL1ouQSVNurRe8mZscNMeUR7m/T8Yl5eRQld kiKmbIeVlezmJQyVoROu0IybtzvVfh2I8JtB1AJYhG+E0hUEquyDIlGIxH8EEXrxAhf1 C98GFT6BbpfMyhWIGRNj/ufn+b08y5WgeGhSCH0yKVwZWBuJaQmImwPsMporUGuPLrEr O5+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:date:from:dkim-signature; bh=XxADgN4BIB9wGmJchf0EcDFoLEDhQTLFvqAQ3eCiias=; fh=zFcOURTdznIyf6uaGOWtj1sBaGksPYfok9wDO2h2+uo=; b=ZNFfmAqvmwPlcpAF49ugA2ASasSy0IjktadwAJYb00p1Xgz/T74diqaGl0qUHCc58P 7rNpcwAp2lQrh2I/4m4vqSloxeQDOCYWEvUTWh7IpWkurzPGHJIMyFYTRlHmVmwHSlrz FmfTVqMrhkYc9iMLksLAFshS3WEqFbo8spdcTqWN9qrCOzlsE74qtgfB8RfIe9+vuUIK 2Vdd8LUVRaAAgOh+5uKMdPdsKDXFojTnyUy5nDPkZCFIZAKUzAIG9q2+rtYoYwxCg2X1 njUZPxVbBfpYzR02l46B5nURgq7A58X9SBZPHdq+vYASPkbHY52ErriHrobh9DovsD+e XtNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=CtgjtoHD; spf=pass (google.com: domain of linux-kernel+bounces-22187-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22187-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id u11-20020a05622a14cb00b004239226d997si3897854qtx.783.2024.01.10.04.50.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 04:50:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-22187-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=CtgjtoHD; spf=pass (google.com: domain of linux-kernel+bounces-22187-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22187-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id AE9491C26356 for ; Wed, 10 Jan 2024 12:50:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1B8B148790; Wed, 10 Jan 2024 12:49:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="CtgjtoHD" Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9EC2D4878E; Wed, 10 Jan 2024 12:49:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-40e43e489e4so46072955e9.1; Wed, 10 Jan 2024 04:49:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704890962; x=1705495762; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:from:to:cc:subject:date:message-id:reply-to; bh=XxADgN4BIB9wGmJchf0EcDFoLEDhQTLFvqAQ3eCiias=; b=CtgjtoHDBQEwsf4mCSGzAVK3lO4sjy+YTsnXPU7qQefrt91b1SphzNKpExU/wjAsaC i5XsdeSfZ0RxMv791ZZ/ec1ym6OSWIs/X+E6+3MIUbcUjor5PrHoL8ybRL8FjuZi8UzU dmvteoZsKnfruOvLyWEgSqu32/sqm0szc3/dWUPKdHrB3uBViM2m1u6c+aUyeoP2NiUj ln36dJymT52DtSakylHSf7K2coJOp0Xzy/xN7B65PosRqDPWEA8wJD+9hP0XAGVnxIl7 nSo9ZyBN2Zw5qXJdySIev8sYOY6zJPhpXa19QNxLu7n4Znb6fHXsYF+mRPXwLFes3JKI 0yxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704890962; x=1705495762; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=XxADgN4BIB9wGmJchf0EcDFoLEDhQTLFvqAQ3eCiias=; b=lGJIA8PtfbMg1VbGDQGFQ/dkrCBTgpo6z/zHun7U33YKxynrrcD6o/wDz9tY9RmVyR fAgMJiaoQ5cfr5li2h8rTVZSg2Gp6VYSBDT9vlSbYhCWqzkgU7NHxaHFVdVGuKmoYCoy JfO48npbJ5IXINryoJzhBQrtWwcPs3D33ViQx4no7XXlV8Go7seSON58m7fHBGDXIQTO oKuAMKGgZQ/fR3QZSw0JZjQmf2F7AGfD/juAtd31c1UymIm8ZSPxGpZO/j1BqGHXt3RO XtIo54DO9gqM+YuadxTptglCQORp/9Zm/3QvV7GzXQCq4xtqwr4Nv4uIVbflqHg40V52 h6sA== X-Gm-Message-State: AOJu0YwJG1UldVvqFj63TVMPcDg1rvD7twXzfvVYJXE9EUs4vf6D8w6U cWAdeuQQcDbcFBpAk+ZnWcI= X-Received: by 2002:a05:600c:4753:b0:40c:2d80:6c2a with SMTP id w19-20020a05600c475300b0040c2d806c2amr602297wmo.113.1704890961617; Wed, 10 Jan 2024 04:49:21 -0800 (PST) Received: from krava (2001-1ae9-1c2-4c00-726e-c10f-8833-ff22.ip6.tmcz.cz. [2001:1ae9:1c2:4c00:726e:c10f:8833:ff22]) by smtp.gmail.com with ESMTPSA id u6-20020a05600c138600b0040d5a9d6b68sm2147371wmf.6.2024.01.10.04.49.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 04:49:21 -0800 (PST) From: Jiri Olsa X-Google-Original-From: Jiri Olsa Date: Wed, 10 Jan 2024 13:49:19 +0100 To: Artem Savkov Cc: Yonghong Song , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH bpf-next] selftests/bpf: fix potential premature unload in bpf_testmod Message-ID: References: <20240109164317.16371-1-asavkov@redhat.com> <82f55c0e-0ec8-4fe1-8d8c-b1de07558ad9@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Wed, Jan 10, 2024 at 09:14:51AM +0100, Artem Savkov wrote: > On Tue, Jan 09, 2024 at 11:40:38AM -0800, Yonghong Song wrote: > > > > On 1/9/24 8:43 AM, Artem Savkov wrote: > > > It is possible for bpf_kfunc_call_test_release() to be called from > > > bpf_map_free_deferred() when bpf_testmod is already unloaded and > > > perf_test_stuct.cnt which it tries to decrease is no longer in memory. > > > This patch tries to fix the issue by waiting for all references to be > > > dropped in bpf_testmod_exit(). > > > > > > The issue can be triggered by running 'test_progs -t map_kptr' in 6.5, > > > but is obscured in 6.6 by d119357d07435 ("rcu-tasks: Treat only > > > synchronous grace periods urgently"). > > > > > > Fixes: 65eb006d85a2a ("bpf: Move kernel test kfuncs to bpf_testmod") > > > > Please add your Signed-off-by tag. > > Thanks for noticing. Will resend with signed-off-by and your ack. > > > I think the root cause is that bpf_kfunc_call_test_acquire() kfunc > > is defined in bpf_testmod and the kfunc returns some data in bpf_testmod. > > But the release function bpf_kfunc_call_test_release() is in the kernel. > > The release func tries to access some data in bpf_testmod which might > > have been unloaded. The prog_test_ref_kfunc is defined in the kernel, so > > no bpf_testmod btf reference is hold so bpf_testmod can be unloaded before > > bpf_kfunc_call_test_release(). > > As you mentioned, we won't have this issue if bpf_kfunc_call_test_acquire() > > is also in the kernel. > > > > I think putting bpf_kfunc_call_test_acquire() in bpf_testmod and > > bpf_kfunc_call_test_release() in kernel is not a good idea and confusing. > > But since this is only for tests, I guess we can live with that. With that, > > Correct. 65eb006d85a2a ("bpf: Move kernel test kfuncs to bpf_testmod") > also mentions why bpf_kfunc_call_test_release() is not in the module and > states that this is temporary. I'll add a comment in v2 so the wait can > be removed once the functions are re-united. I somehow recall it has to do with the fact you can't have trusted pointer on module's object, so that's why those structs had to stay in kernel.. but I might be wrong jirka > > > Acked-by: Yonghong Song > > > > > --- > > > tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c | 4 ++++ > > > 1 file changed, 4 insertions(+) > > > > > > diff --git a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > > > index 91907b321f913..63f0dbd016703 100644 > > > --- a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > > > +++ b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c > > > @@ -2,6 +2,7 @@ > > > /* Copyright (c) 2020 Facebook */ > > > #include > > > #include > > > +#include > > > #include > > > #include > > > #include > > > @@ -544,6 +545,9 @@ static int bpf_testmod_init(void) > > > static void bpf_testmod_exit(void) > > > { > > > + while (refcount_read(&prog_test_struct.cnt) > 1) > > > + msleep(20); > > > + > > > return sysfs_remove_bin_file(kernel_kobj, &bin_attr_bpf_testmod_file); > > > } > > > > -- > Regards, > Artem >