On Thu 2019-06-13 20:07:23, Josh Poimboeuf wrote:
> External callers of the module page attribute change functions now need
> to have the text_mutex.  Enforce that with lockdep assertions.
> 
> diff --git a/kernel/module.c b/kernel/module.c
> index 6e6712b3aaf5..e43a90ee2d23 100644
> --- a/kernel/module.c
> +++ b/kernel/module.c
> @@ -3519,7 +3534,7 @@ static noinline int do_init_module(struct module *mod)
>       /* Switch to core kallsyms now init is done: kallsyms may be walking! */
>       rcu_assign_pointer(mod->kallsyms, &mod->core_kallsyms);
>  #endif
> -     module_enable_ro(mod, true);
> +     __module_enable_ro(mod, true);

This one must be called under text_mutex. Otherwise it might get
called when ftrace is in the middle of modifying the functions.

It should be enough to take text_mutex right around this call.
It will prevent making the code ro when ftrace is doing
the modification. It safe also the other way.
set_all_modules_text_ro() does not call frob_ro_after_init().
Therefore ftrace could not make the after_init section RO prematurely.

>       mod_tree_remove_init(mod);
>       module_arch_freeing_init(mod);
>       mod->init_layout.base = NULL;
> @@ -3626,8 +3641,8 @@ static int complete_formation(struct module *mod, 
> struct load_info *info)
>       /* This relies on module_mutex for list integrity. */
>       module_bug_finalize(info->hdr, info->sechdrs, mod);
>  
> -     module_enable_ro(mod, false);
> -     module_enable_nx(mod);
> +     __module_enable_ro(mod, false);
> +     __module_enable_nx(mod);

This one is OK. It is called when the module is in
MODULE_STATE_UNFORMED. Therefore it is ignored by ftrace.
The module state is manipulated and checked under module_mutex.

Best Regards,
Petr

Reply via email to