+++ Ravineet Singh [13/05/16 16:15 +0200]:
Thanks for the reply,
I indeed had CONFIG_LIVEPATCH configured, after removing it, it is possible
to unload the kpatch module
via kpatch unload .
Also install/uninstall seems to work fine. Also an installed kpatch module
is auto loaded upon boot.
The only issue I see is; while unloading a kpatch module, a dump from the
kernel is generated (se below).
Any ideas?
regards
/Ravineet
[ 29.144476] kpatch: loaded patch module 'kpatch_0001_Test_kpatch'
[ 37.464348] kpatch: unloaded patch module 'kpatch_0001_Test_kpatch'
[ 37.466345] ------------[ cut here ]------------
[ 37.466742] WARNING: CPU: 4 PID: 1878 at kernel/module.c:1107
module_put+0x95/0xa0
Hm, that looks like some sort of module refcount issue (it's WARNing
in module_put). I am however unable to reproduce the problem with the
kpatch.ko core module under 4.6.0-rc4..
Quick questions: What are you patching in kpatch_0001_Test_kpatch, and
how are you loading/unloading the module? Are you able reproduce the
problem consistently (i.e. it happens every time you unload)? Trying
to figure out if this is just a kernel fluke or if the problem is on
our side.
Thanks,
Jessica
[ 37.467373] Modules linked in: kpatch(O) [last unloaded:
kpatch_0001_Test_kpatch]
[ 37.468034] CPU: 4 PID: 1878 Comm: rmmod Tainted: G W O K
4.6-rc4+ #3
[ 37.468625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
Bochs 01/01/2011
[ 37.469024] 0000000000000000 ffff88007ba03e10 ffffffff81336508
0000000000000000
[ 37.469024] 0000000000000000 ffff88007ba03e50 ffffffff8105ab51
000004537ba03e30
[ 37.469024] ffff88007b7b7f80 ffffffffa0002640 ffffffffa0017420
ffffffffa0017190
[ 37.469024] Call Trace:
[ 37.469024] [<ffffffff81336508>] dump_stack+0x4d/0x65
[ 37.469024] [<ffffffff8105ab51>] __warn+0xd1/0xf0
[ 37.469024] [<ffffffff8105ac3d>] warn_slowpath_null+0x1d/0x20
[ 37.469024] [<ffffffff810cc345>] module_put+0x95/0xa0
[ 37.469024] [<ffffffff810cc3b1>] module_unload_free+0x41/0xc0
[ 37.469024] [<ffffffff810cdeff>] free_module+0x19f/0x2b0
[ 37.469024] [<ffffffff810ce1bc>] SyS_delete_module+0x1ac/0x230
[ 37.469024] [<ffffffff81002af2>] ? syscall_return_slowpath+0x92/0x100
[ 37.469024] [<ffffffff818d649b>] entry_SYSCALL_64_fastpath+0x13/0x8f
[ 37.475283] ---[ end trace 3b7c7357c1bf21ff ]---
On 25 April 2016 at 19:58, Josh Poimboeuf <[email protected]> wrote:
On Fri, Apr 22, 2016 at 04:00:15PM +0200, Ravineet Singh wrote:
> Hi,
> Not sure if this is the correct forum but I'll try anyway.
> I am looking at the possibility to build kpatch-patches on x86 machines
to
> be deployed in a arm v8 environment.
>
> The first step is to verify kpatch on x86_64 and initially I have a
> couple a hinder.
> I might have missed one or several steps but, it seems like the kpatch
> sysfs entry is not created and hence
> listing nor unloading is possible...
>
> I basically follwed the guide on: https://github.com/dynup/kpatch for
> debian 8.
>
> I guess it is obvious to you guys but:
> root@debian64:~/kpatch (master) # strace kpatch list 2>&1 | grep "/sys"
> stat("/sys/kernel/kpatch/patches/*", 0x7ffcb713dff0) = -1 ENOENT (No such
> file or directory)
>
> Could someone point me in the right direction please :)
Hi Ravineet,
Any chance your kernel was compiled with CONFIG_LIVEPATCH? If so, you
built a livepatch module and you'll need to manage the patch using the
/sys/kernel/livepatch directory because the kpatch command-line utility
doesn't know how to interact with livepatch yet.
--
Josh
--
Regards
Ravineet
_______________________________________________
kpatch mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/kpatch
_______________________________________________
kpatch mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/kpatch