__module_address() can be invoked within a RCU section, there is no requirement to have preemption disabled.
The _notrace() variant was introduced in commit 14c4c8e41511a ("cfi: Use rcu_read_{un}lock_sched_notrace"). The recursive case where __cfi_slowpath_diag() could end up calling itself is no longer present, as all that logic is gone since commit 89245600941e ("cfi: Switch to -fsanitize=kcfi"). Sami Tolvanen said that KCFI checks don't perform function calls. Elliot Berman verified it with | modprobe -a dummy_stm stm_ftrace stm_p_basic | mkdir -p /sys/kernel/config/stp-policy/dummy_stm.0.my-policy/default | echo function > /sys/kernel/tracing/current_tracer | echo 1 > /sys/kernel/tracing/tracing_on | echo dummy_stm.0 > /sys/class/stm_source/ftrace/stm_source_link Replace the rcu_read_lock_sched_notrace() section around __module_address() with RCU. Cc: Elliot Berman <quic_eber...@quicinc.com> Cc: Kees Cook <k...@kernel.org> Cc: Nathan Chancellor <nat...@kernel.org> Cc: Sami Tolvanen <samitolva...@google.com> Cc: Steven Rostedt <rost...@goodmis.org> Cc: l...@lists.linux.dev Tested-by: Elliot Berman <elliot.ber...@oss.qualcomm.com> # sm8650-qrd Link: https://lore.kernel.org/all/20241230185812429-0800.eber...@hu-eberman-lv.qualcomm.com Acked-by: Peter Zijlstra (Intel) <pet...@infradead.org> Signed-off-by: Sebastian Andrzej Siewior <bige...@linutronix.de> --- kernel/cfi.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/kernel/cfi.c b/kernel/cfi.c index 08caad7767176..abcd4d1f98eab 100644 --- a/kernel/cfi.c +++ b/kernel/cfi.c @@ -71,14 +71,11 @@ static bool is_module_cfi_trap(unsigned long addr) struct module *mod; bool found = false; - rcu_read_lock_sched_notrace(); - + guard(rcu)(); mod = __module_address(addr); if (mod) found = is_trap(addr, mod->kcfi_traps, mod->kcfi_traps_end); - rcu_read_unlock_sched_notrace(); - return found; } #else /* CONFIG_MODULES */ -- 2.47.1