From 6df20cd9407d90bf5a5e0f4e3452ea0a7ade700d Mon Sep 17 00:00:00 2001 From: Packit Service Date: Mar 18 2021 04:34:00 +0000 Subject: Apply patch 0100-kpatch-wait-for-module-ref-counts-on-unload.patch patch_name: 0100-kpatch-wait-for-module-ref-counts-on-unload.patch present_in_specfile: true --- diff --git a/kpatch/kpatch b/kpatch/kpatch index 9051d00..e923dd3 100755 --- a/kpatch/kpatch +++ b/kpatch/kpatch @@ -28,6 +28,7 @@ SCRIPTDIR="$(readlink -f "$(dirname "$(type -p "$0")")")" VERSION="0.9.2" POST_ENABLE_WAIT=15 # seconds POST_SIGNAL_WAIT=60 # seconds +MODULE_REF_WAIT=15 # seconds # How many times to try loading the patch if activeness safety check fails. MAX_LOAD_ATTEMPTS=5 @@ -135,6 +136,10 @@ find_core_module() { return 1 } +kpatch_core_loaded() { + grep -q -e "T kpatch_register" /proc/kallsyms +} + core_loaded () { grep -q -e "T klp_enable_patch" -e "T kpatch_register" /proc/kallsyms } @@ -275,6 +280,31 @@ wait_for_patch_transition() { return 1 } +module_ref_count() { + local modname="$1" + [[ $(cat "/sys/module/$modname/refcnt" 2>/dev/null) != "0" ]] +} + +wait_for_zero_module_ref_count() { + local modname="$1" + local i=0 + + # We can't rely on a zero refcount with kpatch.ko as it + # implements KPATCH_FORCE_UNSAFE with an additional reference on + # kpatch-patch modules to avoid potential crashes. + kpatch_core_loaded && return 0 + + module_ref_count "$modname" || return 0 + + echo "waiting (up to $MODULE_REF_WAIT seconds) for module refcount..." + for (( i=0; i /dev/null || return 0 + rmmod "$modname" 2> /dev/null || return 0 } unload_module () {