Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1755398ybg; Sat, 19 Oct 2019 01:50:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqyepf4xEaCi3g9KZuboFcqbTDuCfBg/Oey29DoV7lItUb0YiFLRQGEs35aTLWhWb4cC0U/n X-Received: by 2002:a05:6402:a4f:: with SMTP id bt15mr14158525edb.121.1571475001508; Sat, 19 Oct 2019 01:50:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571475001; cv=none; d=google.com; s=arc-20160816; b=pnAC1pVo4i4+JVYri9CkrEpjJ2OKvd79Ua6zZb5ehwsVEHpuO3ojzfKY7/LgwBlUcQ An3YeeZIQKDa75BBf2MkOk7VexQohvWIYrLm7mqlSE9weMBBAHE2/SwUvXy2JFsyDfP+ vv4OA+UW2l9mOmnwRPg/UDbwAWflT+IjLWeapG9gfspezeI7dCIlu8D59JjZ2fAG52Es qQoxr+Su84iuD4lhfBfBiJZdKqlGUtdrThxKCjCLsHk6iigEdy/7lEEtDgtNTQmgrFG3 YPJojrrygYYSxxlfQV46tO67OPOIMvqIQByjuHaDeUuoI5mjiOPRgEmrj4cZRDfqkeU6 UQ1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=OKq/04oZbGmlloN8Rgb91MocPeH++0Rb5aUEgr475cg=; b=HyBYnxtwrVhpbIsXhI258l+xJSEKwAdew0bXaYM9eim5UJlOYEpX3Cssv/TozA1+R8 K9iQyUCK/OqkX6gjAbr/4EOLxvDMyGuII3O93ncIl8YODzOhfRo5rrOuNRolaFG/SPSs gKwj4WKE7NW8GIw2BZc43i2UzE6eaPWEphn6agOktzccoFSX5cKgG2RMYC1oXlhZt4JG u00qZOhbJCvKhgysU57ZaEK7Nn/xElQL8eCOThkgbXS2WJV/yocFdyu6TP1P+rs53o3l 9W6E3URpTnDOXaqr65lP8LgXYAk23jmtsNJ958BVjg7vZc5AzeAohc9MJN70WylXzmnK eboA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si5010251eja.185.2019.10.19.01.49.38; Sat, 19 Oct 2019 01:50:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2634395AbfJRRDA (ORCPT + 99 others); Fri, 18 Oct 2019 13:03:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:50240 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387714AbfJRRDA (ORCPT ); Fri, 18 Oct 2019 13:03:00 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 819952064A; Fri, 18 Oct 2019 17:02:58 +0000 (UTC) Date: Fri, 18 Oct 2019 13:02:57 -0400 From: Steven Rostedt To: Sami Tolvanen Cc: Will Deacon , Catalin Marinas , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Mark Rutland , Nick Desaulniers , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Masami Hiramatsu Subject: Re: [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES Message-ID: <20191018130257.3376e397@gandalf.local.home> In-Reply-To: <20191018161033.261971-11-samitolvanen@google.com> References: <20191018161033.261971-1-samitolvanen@google.com> <20191018161033.261971-11-samitolvanen@google.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Added Masami who's the maintainer of kprobes. -- Steve On Fri, 18 Oct 2019 09:10:25 -0700 Sami Tolvanen wrote: > kprobe_on_func_entry and arch_kprobe_on_func_entry need to be available > even if CONFIG_KRETPROBES is not selected. > > Signed-off-by: Sami Tolvanen > --- > kernel/kprobes.c | 38 +++++++++++++++++++------------------- > 1 file changed, 19 insertions(+), 19 deletions(-) > > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > index 53534aa258a6..b5e20a4669b8 100644 > --- a/kernel/kprobes.c > +++ b/kernel/kprobes.c > @@ -1829,6 +1829,25 @@ unsigned long __weak arch_deref_entry_point(void *entry) > return (unsigned long)entry; > } > > +bool __weak arch_kprobe_on_func_entry(unsigned long offset) > +{ > + return !offset; > +} > + > +bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > +{ > + kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > + > + if (IS_ERR(kp_addr)) > + return false; > + > + if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > + !arch_kprobe_on_func_entry(offset)) > + return false; > + > + return true; > +} > + > #ifdef CONFIG_KRETPROBES > /* > * This kprobe pre_handler is registered with every kretprobe. When probe > @@ -1885,25 +1904,6 @@ static int pre_handler_kretprobe(struct kprobe *p, struct pt_regs *regs) > } > NOKPROBE_SYMBOL(pre_handler_kretprobe); > > -bool __weak arch_kprobe_on_func_entry(unsigned long offset) > -{ > - return !offset; > -} > - > -bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > -{ > - kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > - > - if (IS_ERR(kp_addr)) > - return false; > - > - if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > - !arch_kprobe_on_func_entry(offset)) > - return false; > - > - return true; > -} > - > int register_kretprobe(struct kretprobe *rp) > { > int ret = 0;