Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp149379imd; Wed, 31 Oct 2018 16:18:22 -0700 (PDT) X-Google-Smtp-Source: AJdET5fPwxc7JlDbufKsgSQ3AWBH66/ygLmCe+5EpAtqsZ9WfkBM+IklWvyMjCiHgUXGrY8Qya8J X-Received: by 2002:a62:d084:: with SMTP id p126-v6mr5521484pfg.147.1541027902544; Wed, 31 Oct 2018 16:18:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541027902; cv=none; d=google.com; s=arc-20160816; b=aAs23mJoKTIzrrHadCZKWZZ+PRSuLXJxdh+9ZrLK6jvDASOHSYxkE4oI2xtu6+42ub TdftUt/DlntJEaGUHR6tNNpZzbj4k6xHdv4JAM6u7hxLgNHqm1BszGnACo+Dd1qlruE9 qQl2/zQuQyAV+z15IqaGzreHCBfXLhMBo51kTinlCxL1pjAIxDTkCDzjP+IDgeO6qEuU Khx0gj+9/0ntcpiwOmwJnGm4LzLEWrvN+pWAiVqlRR73jD1N8dCZ+n/fx96NpkYfhMWm j8WyrO+RPtxSPI3OTTNufWMRA4rnUXXuUQl6RD2XRJYHKf+qOx7q0Gu7aNLnartAk2KZ POiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=sLWSkmGa90GnlZI1MY4kAVDc2HMKbc0NEz30+sh7yBQ=; b=oQyFfgvTZfcBvsA447m0BPVVnkytW1xyn49UFPWvUfzC4mR2TBAii/VBYXYFT0oKkp NMn44JiKnd/IS5l7ocu92R55Hz1atW8U+BSRDODmP1khxJNR20Mfrq7y20fg2IFFYSnp VXWfEHLbGW2pH1paDgA2nOhYX7TSeFteyhWvof7G2YeHApv3/lSwM6zcEHFHBUimJ+p2 +2xR9WKnjsSNo3b4tT9Kf2WBhk+vnwhT7E1wm8Z/8r+Hp1v7/rTG4HtjxOSFSN0+0ed9 2yz7sg629xIXWNdFUS1b+AGhmYxhqh+MBPaGV6LaNeMTVrscbJSeIvUsoqXYVZjpGoOo Zu6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MzrrLBXX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7-v6si27141764plz.23.2018.10.31.16.18.07; Wed, 31 Oct 2018 16:18:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MzrrLBXX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732046AbeKAIMG (ORCPT + 99 others); Thu, 1 Nov 2018 04:12:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:36448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732006AbeKAIMD (ORCPT ); Thu, 1 Nov 2018 04:12:03 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E989E20880; Wed, 31 Oct 2018 23:11:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541027511; bh=os7x5a9Bu6mVXq4vgThaHRhMwRnSLcxVdhwe6Lu7oJ8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MzrrLBXXL5om4zJqqixbHxGcKJnx1lTPrJJJs7C+CI+BnbmfFgomalWJX/Qsx+FyC Lsmv0R3y88LExX3DI5vZbG3++4CncS26w1S39h3cSEZbdI40hRmcCdZ4NhC41xRUre ht7GPvCxbtuQIuuvuVGkJajShkqlYEOVmVt7tSS0= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Anil S Keshavamurthy , "David S . Miller" , Linus Torvalds , "Naveen N . Rao" , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Sasha Levin Subject: [PATCH AUTOSEL 4.4 14/32] kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() Date: Wed, 31 Oct 2018 19:11:19 -0400 Message-Id: <20181031231137.29429-14-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181031231137.29429-1-sashal@kernel.org> References: <20181031231137.29429-1-sashal@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Masami Hiramatsu [ Upstream commit 819319fc93461c07b9cdb3064f154bd8cfd48172 ] Make reuse_unused_kprobe() to return error code if it fails to reuse unused kprobe for optprobe instead of calling BUG_ON(). Signed-off-by: Masami Hiramatsu Cc: Anil S Keshavamurthy Cc: David S . Miller Cc: Linus Torvalds Cc: Naveen N . Rao Cc: Peter Zijlstra Cc: Thomas Gleixner Link: http://lkml.kernel.org/r/153666124040.21306.14150398706331307654.stgit@devbox Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- kernel/kprobes.c | 27 ++++++++++++++++++++------- 1 file changed, 20 insertions(+), 7 deletions(-) diff --git a/kernel/kprobes.c b/kernel/kprobes.c index 388bcace62f8..d8daf6c55d2b 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -665,9 +665,10 @@ static void unoptimize_kprobe(struct kprobe *p, bool force) } /* Cancel unoptimizing for reusing */ -static void reuse_unused_kprobe(struct kprobe *ap) +static int reuse_unused_kprobe(struct kprobe *ap) { struct optimized_kprobe *op; + int ret; BUG_ON(!kprobe_unused(ap)); /* @@ -681,8 +682,12 @@ static void reuse_unused_kprobe(struct kprobe *ap) /* Enable the probe again */ ap->flags &= ~KPROBE_FLAG_DISABLED; /* Optimize it again (remove from op->list) */ - BUG_ON(!kprobe_optready(ap)); + ret = kprobe_optready(ap); + if (ret) + return ret; + optimize_kprobe(ap); + return 0; } /* Remove optimized instructions */ @@ -894,11 +899,16 @@ static void __disarm_kprobe(struct kprobe *p, bool reopt) #define kprobe_disarmed(p) kprobe_disabled(p) #define wait_for_kprobe_optimizer() do {} while (0) -/* There should be no unused kprobes can be reused without optimization */ -static void reuse_unused_kprobe(struct kprobe *ap) +static int reuse_unused_kprobe(struct kprobe *ap) { + /* + * If the optimized kprobe is NOT supported, the aggr kprobe is + * released at the same time that the last aggregated kprobe is + * unregistered. + * Thus there should be no chance to reuse unused kprobe. + */ printk(KERN_ERR "Error: There should be no unused kprobe here.\n"); - BUG_ON(kprobe_unused(ap)); + return -EINVAL; } static void free_aggr_kprobe(struct kprobe *p) @@ -1276,9 +1286,12 @@ static int register_aggr_kprobe(struct kprobe *orig_p, struct kprobe *p) goto out; } init_aggr_kprobe(ap, orig_p); - } else if (kprobe_unused(ap)) + } else if (kprobe_unused(ap)) { /* This probe is going to die. Rescue it */ - reuse_unused_kprobe(ap); + ret = reuse_unused_kprobe(ap); + if (ret) + goto out; + } if (kprobe_gone(ap)) { /* -- 2.17.1