Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp297722ybh; Wed, 15 Jul 2020 02:10:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTaOp8PCN6C3qqGqZMJt3pHa5uCPfD+AOmo4tKihYbvCD34xFSbao/GULHCEnMuKLQpHTO X-Received: by 2002:a17:906:1499:: with SMTP id x25mr8269163ejc.406.1594804243345; Wed, 15 Jul 2020 02:10:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594804243; cv=none; d=google.com; s=arc-20160816; b=cE5tkIB8toA4FmXGRFiu/Eeziejfkv1K6jNhNfs49HveXgofzaSWwddu6MQColO62q 0AqST6jr9ErScMqpvBrLNTFl71Pf0y/4W4aljcPSS95u+7pyZpO8VrKDfUhJLr4oLm85 sgJc9qJroenFeMdUwDhhOAuPTB92lgu4eKSFXlOPsx1NHI8LWalcvxLzen/GgDyv6Kkw f5vle4PiFE1L8H3rC5NG+RVDcIeGrsVPybUeW9TQDohUWHyIcwtOJWEhjn+Vu3KBIDFs +Xw881gU9OSFs4e0Cao9trhz75VmPQY/pgsbWK1Nt4LtyRFyMOz4q6708zcvYJg09OWP CVTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=n2ORsNAzH3yJRXBC5+RN/VUXXGmr0iIV10UChxjPaz4=; b=UXOoCdnIKrMY/pHtD0nfTik2BBwW8gmfhsdv/MbfViA4QGhck2o+M8GU6FwVCATqbG hX/sllpx/tJdXdlv4XusNAivS61/i5+PZMc4IMTuRItjp3Ms6oQu3WOOQB2ZoGpD+snU 8Ksjehi1R1Ihrg1Pex+x1sutZ5F21u3xr6HvJLfKp0s7aSU82rVtS/yu2BOljGomq7YC DXoTemi6tcJs99EaG3F1zDx2YgT3etwL4UsQUNms2MdSGb5la05gjUBOnk3kK8kSfGps OgB96fJn6Rl3JXOcB2XSFxxwtUZnzmyETX7OqDHghqTMjLXBHSZwLRqYF5xi9vR0LvN1 3A5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LwtBgKWV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i2si894218edn.115.2020.07.15.02.10.20; Wed, 15 Jul 2020 02:10:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LwtBgKWV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730231AbgGOIfb (ORCPT + 99 others); Wed, 15 Jul 2020 04:35:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:41670 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730224AbgGOIfa (ORCPT ); Wed, 15 Jul 2020 04:35:30 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BBD652065D; Wed, 15 Jul 2020 08:35:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594802129; bh=Ox43SIMUWgQaXB3i+UOOy7ao2qOQdpYQtJCeLUAPGk0=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LwtBgKWVLrxa9jeFRbsT9NRk351F+8baad7pbFJebQxf8s8+TVabITgJHMeWMu0fe HUCUGS/2/sOXjD99U0dJ2bWIPzS2RLkc6rSr2NzU/iY4EelmsB2idUMv7vOXWNY6Gk hvcpB7nYoPK1472Ta1KLEx4kb5A6MzuqGPr7ml80= Date: Wed, 15 Jul 2020 17:35:24 +0900 From: Masami Hiramatsu To: Jarkko Sakkinen Cc: linux-kernel@vger.kernel.org, x86@vger.kernel.org, Andi Kleen , Jessica Yu , "Naveen N. Rao" , Anil S Keshavamurthy , "David S. Miller" , Masami Hiramatsu , Steven Rostedt , Ingo Molnar Subject: Re: [PATCH v3 3/3] kprobes: Flag out CONFIG_MODULES dependent code Message-Id: <20200715173524.0f21afce3574b8e8596e751e@kernel.org> In-Reply-To: <20200714223239.1543716-4-jarkko.sakkinen@linux.intel.com> References: <20200714223239.1543716-1-jarkko.sakkinen@linux.intel.com> <20200714223239.1543716-4-jarkko.sakkinen@linux.intel.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jarkko, On Wed, 15 Jul 2020 01:32:29 +0300 Jarkko Sakkinen wrote: > Remove CONFIG_MODULES dependency by flagging out the dependent code. This > allows to use kprobes in a kernel without support for loadable modules, > which could be useful for a test kernel or perhaps an embedded kernel. > OK, looks good, I just have 2 comments below. > Cc: Andi Kleen > Signed-off-by: Jarkko Sakkinen > --- > include/linux/module.h | 14 +++++++------- > kernel/kprobes.c | 7 +++++++ > kernel/trace/trace_kprobe.c | 16 +++++++++++++++- > 3 files changed, 29 insertions(+), 8 deletions(-) > > diff --git a/include/linux/module.h b/include/linux/module.h > index 857b84bf9e90..eaa8ad02f75c 100644 > --- a/include/linux/module.h > +++ b/include/linux/module.h > @@ -290,6 +290,13 @@ extern typeof(name) __mod_##type##__##name##_device_table \ > > struct notifier_block; > > +enum module_state { > + MODULE_STATE_LIVE, /* Normal state. */ > + MODULE_STATE_COMING, /* Full formed, running module_init. */ > + MODULE_STATE_GOING, /* Going away. */ > + MODULE_STATE_UNFORMED, /* Still setting it up. */ > +}; > + > #ifdef CONFIG_MODULES > > extern int modules_disabled; /* for sysctl */ > @@ -305,13 +312,6 @@ struct module_use { > struct module *source, *target; > }; > > -enum module_state { > - MODULE_STATE_LIVE, /* Normal state. */ > - MODULE_STATE_COMING, /* Full formed, running module_init. */ > - MODULE_STATE_GOING, /* Going away. */ > - MODULE_STATE_UNFORMED, /* Still setting it up. */ > -}; > - > struct mod_tree_node { > struct module *mod; > struct latch_tree_node node; > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > index b4f3c24cd2ef..3039df13d34e 100644 > --- a/kernel/kprobes.c > +++ b/kernel/kprobes.c > @@ -2225,6 +2225,7 @@ int kprobe_add_area_blacklist(unsigned long start, unsigned long end) > return 0; > } > > +#ifdef CONFIG_MODULES > /* Remove all symbols in given area from kprobe blacklist */ > static void kprobe_remove_area_blacklist(unsigned long start, unsigned long end) > { > @@ -2242,6 +2243,7 @@ static void kprobe_remove_ksym_blacklist(unsigned long entry) > { > kprobe_remove_area_blacklist(entry, entry + 1); > } > +#endif > > int __init __weak arch_populate_kprobe_blacklist(void) > { > @@ -2285,6 +2287,7 @@ static int __init populate_kprobe_blacklist(unsigned long *start, > return ret ? : arch_populate_kprobe_blacklist(); > } > > +#ifdef CONFIG_MODULES > static void add_module_kprobe_blacklist(struct module *mod) > { > unsigned long start, end; > @@ -2330,6 +2333,10 @@ static void remove_module_kprobe_blacklist(struct module *mod) > kprobe_remove_area_blacklist(start, end); > } > } > +#else > +static void add_module_kprobe_blacklist(struct module *mod) {} > +static void remove_module_kprobe_blacklist(struct module *mod) {} > +#endif /* CONFIG_MODULES */ Please feel free to move the function. I would like to see; #ifdef CONFIG_MODULES /* Remove all symbols in given area from kprobe blacklist */ static void kprobe_remove_area_blacklist(unsigned long start, unsigned long end) { ... } static void add_module_kprobe_blacklist(struct module *mod) { ... } #else static void add_module_kprobe_blacklist(struct module *mod) {} static void remove_module_kprobe_blacklist(struct module *mod) {} #endif /* CONFIG_MODULES */ Rather than split #ifdefs. > > /* Module notifier call back, checking kprobes on the module */ > static int kprobes_module_callback(struct notifier_block *nb, > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > index 710ec6a6aa8f..7fcd1bf2d96e 100644 > --- a/kernel/trace/trace_kprobe.c > +++ b/kernel/trace/trace_kprobe.c > @@ -103,8 +103,9 @@ static nokprobe_inline bool trace_kprobe_has_gone(struct trace_kprobe *tk) > return !!(kprobe_gone(&tk->rp.kp)); > } > > +#ifdef CONFIG_MODULES > static nokprobe_inline bool trace_kprobe_within_module(struct trace_kprobe *tk, > - struct module *mod) > + struct module *mod) > { > int len = strlen(mod->name); > const char *name = trace_kprobe_symbol(tk); > @@ -129,6 +130,17 @@ static nokprobe_inline bool trace_kprobe_module_exist(struct trace_kprobe *tk) > > return ret; > } > +#else > +static nokprobe_inline bool trace_kprobe_within_module(struct trace_kprobe *tk, > + struct module *mod) > +{ > + return false; > +} > +static nokprobe_inline bool trace_kprobe_module_exist(struct trace_kprobe *tk) > +{ > + return false; > +} > +#endif > > static bool trace_kprobe_is_busy(struct dyn_event *ev) > { > @@ -685,10 +697,12 @@ static int trace_kprobe_module_callback(struct notifier_block *nb, > /* Don't need to check busy - this should have gone. */ > __unregister_trace_kprobe(tk); > ret = __register_trace_kprobe(tk); > +#ifdef CONFIG_MODULES > if (ret) > pr_warn("Failed to re-register probe %s on %s: %d\n", > trace_probe_name(&tk->tp), > mod->name, ret); > +#endif I guess this CONFIG_MODULES is for avoiding build error according to mod->name, if so, please use module_name(mod) macro instead of this #ifdef. > } > } > mutex_unlock(&event_mutex); > -- > 2.25.1 > -- Masami Hiramatsu