Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp993412yba; Thu, 4 Apr 2019 01:59:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxLPXrYKoAGnlddizzkiJrHqxiJgikH+4OIE/evKvuochybCk+GNyBvuZ41SlBRmw5aAEyY X-Received: by 2002:aa7:8c56:: with SMTP id e22mr4623738pfd.155.1554368344718; Thu, 04 Apr 2019 01:59:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554368344; cv=none; d=google.com; s=arc-20160816; b=fM2pSxcyK2NhFzA/VkNp0GXZGQFbJ0wMwjHu4BqlJzbOdqdfES8QNoaDi+z3VEUEsj H8xC9z7yX5cU/yYt5kyeEPDqDiT2CUVWubZpZqdiNeZP94Xwzx2ikww4u8Nj4ERiO2M/ JIML7hufJbAUDPxp4XVr1pcZlK2PHlO+bnHNyuckFQFsLGyNkUcclYXKZkZVjNei3U8l WWQnjyv/h7MMA1EjPNTeWPyfvullS67Pvay/MDQwIL3j08pUGdVzxccFxIdAlUOATU58 lCAVxV+2m/7HXaZKpwg9FSvVSwZTcKyeo+dR7utqa/8Y+RUS50inUuBcfvoeEDNNdefz X1tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9LN6qPhVTR0JrAUSWdT+ynVTJrY8OSJkXC97jwwcLvk=; b=q0NWruzT8+Ii/q5DOSLVHrF5PnOLPyND4F4RnEEY6J5V4wCc3c2HaMJJG/6ea7R78C tL4o7Tx9NSyYTs2oVrc1pohGdY7KnZ8KOB7ULtattBWuCiOVQr4nXURe2PPxhF0tY8Hz Kwb+MjaT/ItUdIDBozouY+aAlDFN6BsULYa0jCz58kQNC5wR/8zyYqIe4heSPG4x2ljQ 7HNOaZdCgMZ3dk9glZvc1NDcDLFa5Y7LSMp7mkZVmPk15MweJg+B2w/7IyP1U5RBP1Zw bl7HPCjkgj5hkvzoU/wx29b2Sjswjstx1v/Hr0F7VcwVb7Ov5453pK1t1WnCMKGOTwcC 9IVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VvvBzMnn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m17si16251088pgi.514.2019.04.04.01.58.49; Thu, 04 Apr 2019 01:59:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VvvBzMnn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730495AbfDDI4f (ORCPT + 99 others); Thu, 4 Apr 2019 04:56:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:59858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730482AbfDDI4b (ORCPT ); Thu, 4 Apr 2019 04:56:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7AEE420652; Thu, 4 Apr 2019 08:56:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554368191; bh=15aeuFy1DYjSfTCmecKv5HNyn/2vZ5i62khlJ8lgZgw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VvvBzMnn5nfVrCJCjFX2ZylOjXSeFlnYNqPmhBnL3Sp7feoUanaHr78AFNSFB52XC pcIEqTdLMNvS89maoYSiPt6rx9LqvheueRzbgLJNtoEhnYeGximNqlEjFXbd0vLe5S +YAb3vbDhm+lAZjDZXgwSG/XS04GWHq3aAXuFwm0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrea Righi , Masami Hiramatsu , Alexander Shishkin , Arnaldo Carvalho de Melo , Jiri Olsa , Linus Torvalds , Mathieu Desnoyers , Peter Zijlstra , Steven Rostedt , Thomas Gleixner , Ingo Molnar , Sasha Levin Subject: [PATCH 4.14 070/121] kprobes: Prohibit probing on bsearch() Date: Thu, 4 Apr 2019 10:47:38 +0200 Message-Id: <20190404084549.084513979@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084545.245659903@linuxfoundation.org> References: <20190404084545.245659903@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 02106f883cd745523f7766d90a739f983f19e650 ] Since kprobe breakpoing handler is using bsearch(), probing on this routine can cause recursive breakpoint problem. int3 ->do_int3() ->ftrace_int3_handler() ->ftrace_location() ->ftrace_location_range() ->bsearch() -> int3 Prohibit probing on bsearch(). Signed-off-by: Andrea Righi Acked-by: Masami Hiramatsu Cc: Alexander Shishkin Cc: Arnaldo Carvalho de Melo Cc: Jiri Olsa Cc: Linus Torvalds Cc: Mathieu Desnoyers Cc: Peter Zijlstra Cc: Steven Rostedt Cc: Thomas Gleixner Link: http://lkml.kernel.org/r/154998813406.31052.8791425358974650922.stgit@devbox Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- lib/bsearch.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/lib/bsearch.c b/lib/bsearch.c index 18b445b010c3..82512fe7b33c 100644 --- a/lib/bsearch.c +++ b/lib/bsearch.c @@ -11,6 +11,7 @@ #include #include +#include /* * bsearch - binary search an array of elements @@ -53,3 +54,4 @@ void *bsearch(const void *key, const void *base, size_t num, size_t size, return NULL; } EXPORT_SYMBOL(bsearch); +NOKPROBE_SYMBOL(bsearch); -- 2.19.1