[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <rwmwrvvtg3pd7qrnt3of6dideioohwhsplancoc2gdrjran7bg@j5tqng6loymr>
Date: Mon, 31 Mar 2025 21:19:36 +0800
From: Shung-Hsi Yu <shung-hsi.yu@...e.com>
To: "Naveen N. Rao" <naveen@...nel.org>,
Hari Bathini <hbathini@...ux.ibm.com>, bpf@...r.kernel.org
Cc: Michael Ellerman <mpe@...erman.id.au>,
Mark Rutland <mark.rutland@....com>, Daniel Borkmann <daniel@...earbox.net>,
Masahiro Yamada <masahiroy@...nel.org>, Nicholas Piggin <npiggin@...il.com>,
Alexei Starovoitov <ast@...nel.org>, Steven Rostedt <rostedt@...dmis.org>,
Masami Hiramatsu <mhiramat@...nel.org>, Andrii Nakryiko <andrii@...nel.org>,
Christophe Leroy <christophe.leroy@...roup.eu>, Vishal Chourasia <vishalc@...ux.ibm.com>,
Mahesh J Salgaonkar <mahesh@...ux.ibm.com>, Miroslav Benes <mbenes@...e.cz>,
Michal Suchánek <msuchanek@...e.de>, linux-kernel@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
linux-trace-kernel@...r.kernel.org, live-patching@...r.kernel.org
Subject: [BUG?] ppc64le: fentry BPF not triggered after live patch (v6.14)
Hi all,
On ppc64le (v6.14, kernel config attached), I've observed that fentry
BPF programs stop being invoked after the target kernel function is live
patched. This occurs regardless of whether the BPF program was attached
before or after the live patch. I believe fentry/fprobe on ppc64le is
added with [1].
Steps to reproduce on ppc64le:
- Use bpftrace (v0.10.0+) to attach a BPF program to cmdline_proc_show
with fentry (kfunc is the older name bpftrace used for fentry, used
here for max compatability)
bpftrace -e 'kfunc:cmdline_proc_show { printf("%lld: cmdline_proc_show() called by %s\n", nsecs(), comm) }'
- Run `cat /proc/cmdline` and observe bpftrace output
- Load samples/livepatch/livepatch-sample.ko
- Run `cat /proc/cmdline` again. Observe "this has been live patched" in
output, but no new bpftrace output.
Note: once the live patching module is disabled through the sysfs interface
the BPF program invocation is restored.
Is this the expected interaction between fentry BPF and live patching?
On x86_64 it does _not_ happen, so I'd guess the behavior on ppc64le is
unintended. Any insights appreciated.
Thanks,
Shung-Hsi Yu
1: https://lore.kernel.org/all/20241030070850.1361304-2-hbathini@linux.ibm.com/
Powered by blists - more mailing lists