This is an architecture independant synchronization around kernel text modifications through use of a global mutex. A mutex has been chosen so that kprobes, the main user of this, can sleep during memory allocation between the memory read of the instructions it must replace and the memory write of the breakpoint. Other user of this interface: immediate values. Paravirt and alternatives are always done when SMP is inactive, so there is no need to use locks. Signed-off-by: Mathieu Desnoyers CC: Andi Kleen CC: Ingo Molnar --- include/linux/memory.h | 7 +++++++ mm/memory.c | 34 ++++++++++++++++++++++++++++++++++ 2 files changed, 41 insertions(+) Index: linux-2.6-sched-devel/include/linux/memory.h =================================================================== --- linux-2.6-sched-devel.orig/include/linux/memory.h 2008-04-22 20:04:13.000000000 -0400 +++ linux-2.6-sched-devel/include/linux/memory.h 2008-04-22 20:19:19.000000000 -0400 @@ -92,4 +92,11 @@ extern int memory_notify(unsigned long v #define hotplug_memory_notifier(fn, pri) do { } while (0) #endif +/* + * Take and release the kernel text modification lock, used for code patching. + * Users of this lock can sleep. + */ +extern void kernel_text_lock(void); +extern void kernel_text_unlock(void); + #endif /* _LINUX_MEMORY_H_ */ Index: linux-2.6-sched-devel/mm/memory.c =================================================================== --- linux-2.6-sched-devel.orig/mm/memory.c 2008-04-19 17:41:25.000000000 -0400 +++ linux-2.6-sched-devel/mm/memory.c 2008-04-22 20:19:19.000000000 -0400 @@ -51,6 +51,8 @@ #include #include #include +#include +#include #include #include @@ -96,6 +98,12 @@ int randomize_va_space __read_mostly = 2; #endif +/* + * mutex protecting text section modification (dynamic code patching). + * some users need to sleep (allocating memory...) while they hold this lock. + */ +static DEFINE_MUTEX(text_mutex); + static int __init disable_randmaps(char *s) { randomize_va_space = 0; @@ -2737,3 +2745,29 @@ void print_vma_addr(char *prefix, unsign } up_read(¤t->mm->mmap_sem); } + +/** + * kernel_text_lock - Take the kernel text modification lock + * + * Insures mutual write exclusion of kernel and modules text live text + * modification. Should be used for code patching. + * Users of this lock can sleep. + */ +void __kprobes kernel_text_lock(void) +{ + mutex_lock(&text_mutex); +} +EXPORT_SYMBOL_GPL(kernel_text_lock); + +/** + * kernel_text_unlock - Release the kernel text modification lock + * + * Insures mutual write exclusion of kernel and modules text live text + * modification. Should be used for code patching. + * Users of this lock can sleep. + */ +void __kprobes kernel_text_unlock(void) +{ + mutex_unlock(&text_mutex); +} +EXPORT_SYMBOL_GPL(kernel_text_unlock); -- Mathieu Desnoyers Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F BA06 3F25 A8FE 3BAE 9A68 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/