Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp42089ybl; Thu, 22 Aug 2019 19:22:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwoKSqKHhwLnb+RRR7vqpe1XwGynCvQ5GzIyAxVytm2yQmFmizLZqDFohxxglDkMVsnCNcI X-Received: by 2002:a63:9e43:: with SMTP id r3mr1953802pgo.148.1566526944024; Thu, 22 Aug 2019 19:22:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566526944; cv=none; d=google.com; s=arc-20160816; b=GlANVrkoXlJ7GwcFsAKuwEGfzhvu1FYADarWKbIuQvwk39TfXgBw26fO+b78ulttUc zw+vIlTd7+ZxsjZf916wy+d3S6jmdg9Wc4S3zk3Y+PFKxDcrdANIHPIozmoctB9DjUXb JhYbDKVRhNB1m47KP4gZLeeYuFQOAYKHmsikF7/DJY64wb5VGIO/P5g3Oxp/4XiGRAfb p46l5YXY9D9EKRk5sj6E9s/IBEHqQBeJ/RtKNOeYKXn8s8tYQ2qMNE7SEd1dTWvjBnpY SWPaGfOHOvSYLc+FyN5xFrIVeoKSw8eZX+QdmKCMWxLKgKKnhcY+xcXjcIIerri+dXe3 JExQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8szBUQZXiIfRrV5H/0rW7afCKfvlLEzcGIkLTACKVQA=; b=GST3Ok26ceSxYyErv3c8AuIy+H554OkbhsGAEwIYA09xreCKSjzYwNzIHIoZe4Ob1x 8nTzhQEwTeQPiFeI38GSU+cD0hgvL6Zx+zZGvoffstkQtJ1NmymgR17+x7+RV2wRjPPW vKoEMXjuCv9mTyclwMpmYuqcOXpckPoSwaIcNiZHEKckAwCW2DCilwm++Z39/DBb5HfF wnXaULBdzlw6JUmKGcAmasg8KdpWBohpptdW8nUHhsoOqHLzrHrIp9FFKepj1igsRRiC ejmtFy0SUbFU1ruOlkkFJZACOVT+bYbbNwrxrd/oLn5zM8jDV6F5g9prsSaJz3kSBW5y Ts/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JZIKcNJb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 36si1123111pld.289.2019.08.22.19.22.08; Thu, 22 Aug 2019 19:22:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JZIKcNJb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392102AbfHVRaD (ORCPT + 99 others); Thu, 22 Aug 2019 13:30:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:51512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404673AbfHVR0P (ORCPT ); Thu, 22 Aug 2019 13:26:15 -0400 Received: from localhost (wsip-184-188-36-2.sd.sd.cox.net [184.188.36.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A627A206DD; Thu, 22 Aug 2019 17:26:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566494774; bh=OqUlSWwlBz+qV011yxJ500U81Tx/3ZyNeUganH6IQxg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JZIKcNJbY128kKL8k4KGi5qaTGiQfDH+k2kP2joff1PUgWPHVPtkxsSzZigETD8eB UFFZcOJc3SVE+g84p53PeBBg+ib40HvlDLNiuKUfv+0VQXR1ZG233IKyC92tfCO7l5 eoF12r5SRS0ysqahauW5v3iMYTLt2j4pIW3h+Rlg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Naresh Kamboju , Masami Hiramatsu , Will Deacon , Sasha Levin Subject: [PATCH 4.19 44/85] arm64: unwind: Prohibit probing on return_address() Date: Thu, 22 Aug 2019 10:19:17 -0700 Message-Id: <20190822171733.206317448@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190822171731.012687054@linuxfoundation.org> References: <20190822171731.012687054@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit ee07b93e7721ccd5d5b9fa6f0c10cb3fe2f1f4f9 ] Prohibit probing on return_address() and subroutines which is called from return_address(), since the it is invoked from trace_hardirqs_off() which is also kprobe blacklisted. Reported-by: Naresh Kamboju Signed-off-by: Masami Hiramatsu Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/return_address.c | 3 +++ arch/arm64/kernel/stacktrace.c | 3 +++ 2 files changed, 6 insertions(+) diff --git a/arch/arm64/kernel/return_address.c b/arch/arm64/kernel/return_address.c index 933adbc0f654d..0311fe52c8ffb 100644 --- a/arch/arm64/kernel/return_address.c +++ b/arch/arm64/kernel/return_address.c @@ -11,6 +11,7 @@ #include #include +#include #include #include @@ -32,6 +33,7 @@ static int save_return_addr(struct stackframe *frame, void *d) return 0; } } +NOKPROBE_SYMBOL(save_return_addr); void *return_address(unsigned int level) { @@ -55,3 +57,4 @@ void *return_address(unsigned int level) return NULL; } EXPORT_SYMBOL_GPL(return_address); +NOKPROBE_SYMBOL(return_address); diff --git a/arch/arm64/kernel/stacktrace.c b/arch/arm64/kernel/stacktrace.c index 4989f7ea1e599..bb482ec044b61 100644 --- a/arch/arm64/kernel/stacktrace.c +++ b/arch/arm64/kernel/stacktrace.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include #include @@ -85,6 +86,7 @@ int notrace unwind_frame(struct task_struct *tsk, struct stackframe *frame) return 0; } +NOKPROBE_SYMBOL(unwind_frame); void notrace walk_stackframe(struct task_struct *tsk, struct stackframe *frame, int (*fn)(struct stackframe *, void *), void *data) @@ -99,6 +101,7 @@ void notrace walk_stackframe(struct task_struct *tsk, struct stackframe *frame, break; } } +NOKPROBE_SYMBOL(walk_stackframe); #ifdef CONFIG_STACKTRACE struct stack_trace_data { -- 2.20.1