Josh reported a bug: When the object to be patched is a module, and that module is rmmod'ed and reloaded, it fails to load with: module: x86/modules: Skipping invalid relocation target, existing value is nonzero for type 2, loc 00000000ba0302e9, val ffffffffa03e293c livepatch: failed to initialize patch 'livepatch_nfsd' for module 'nfsd' (-8) livepatch: patch 'livepatch_nfsd' failed for module 'nfsd', refusing to load module 'nfsd' The livepatch module has a relocation which references a symbol in the _previous_ loading of nfsd. When apply_relocate_add() tries to replace the old relocation with a new one, it sees that the previous one is nonzero and it errors out. On ppc64le, we have a similar issue: module_64: livepatch_nfsd: Expected nop after call, got e8410018 at e_show+0x60/0x548 [livepatch_nfsd] livepatch: failed to initialize patch 'livepatch_nfsd' for module 'nfsd' (-8) livepatch: patch 'livepatch_nfsd' failed for module 'nfsd', refusing to load module 'nfsd' He also proposed three different solutions. We could remove the error check in apply_relocate_add() introduced by commit eda9cec4c9a1 ("x86/module: Detect and skip invalid relocations"). However the check is useful for detecting corrupted modules. We could also reverse the relocation patching (clear all relocation targets on x86_64, or return back nops on powerpc) in klp_unpatch_object(). The solution is not universal and is too much arch-specific. We decided to deny the patched modules to be removed. If it proves to be a major drawback for users, we can still implement a different approach. The reference of a patched module has to be taken regardless of a patch's state. Thus it is not taken and dropped in enable/disable paths, but in register/unregister paths. The new behaviour should not collide with mod->klp_alive variable. Reported-by: Josh Poimboeuf <jpoimboe@xxxxxxxxxx> Signed-off-by: Miroslav Benes <mbenes@xxxxxxx> --- kernel/livepatch/core.c | 24 ++++++++++++++++++++++-- 1 file changed, 22 insertions(+), 2 deletions(-) diff --git a/kernel/livepatch/core.c b/kernel/livepatch/core.c index 36eb5cf38766..2fa9eaee7bb5 100644 --- a/kernel/livepatch/core.c +++ b/kernel/livepatch/core.c @@ -645,6 +645,10 @@ static void klp_free_object_loaded(struct klp_object *obj) { struct klp_func *func; + /* + * Drop the reference from klp_init_object_loaded() + */ + module_put(obj->mod); obj->mod = NULL; klp_for_each_func(obj, func) @@ -663,6 +667,9 @@ static void klp_free_objects_limited(struct klp_patch *patch, for (obj = patch->objs; obj->funcs && obj != limit; obj++) { klp_free_funcs_limited(obj, NULL); kobject_put(&obj->kobj); + + if (klp_is_module(obj) && klp_is_object_loaded(obj)) + module_put(obj->mod); } } @@ -739,6 +746,14 @@ static int klp_init_object_loaded(struct klp_patch *patch, } } + /* + * Do not allow patched modules to be removed. + * + * All callers of klp_init_object_loaded() set obj->mod. + */ + if (klp_is_module(obj) && !try_module_get(obj->mod)) + return -ENODEV; + return 0; } @@ -984,7 +999,7 @@ int klp_module_coming(struct module *mod) if (ret) { pr_warn("pre-patch callback failed for object '%s'\n", obj->name); - goto err; + goto err_after_init; } ret = klp_patch_object(obj); @@ -993,7 +1008,7 @@ int klp_module_coming(struct module *mod) patch->mod->name, obj->mod->name, ret); klp_post_unpatch_callback(obj); - goto err; + goto err_after_init; } if (patch != klp_transition_patch) @@ -1007,6 +1022,11 @@ int klp_module_coming(struct module *mod) return 0; +err_after_init: + /* + * Drop the reference from klp_init_object_loaded(). + */ + module_put(obj->mod); err: /* * If a patch is unsuccessfully applied, return -- 2.17.0 -- To unsubscribe from this list: send the line "unsubscribe live-patching" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html