Received: by 2002:a17:90a:37e8:0:0:0:0 with SMTP id v95csp4236572pjb; Mon, 21 Oct 2019 02:14:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqwstqnTwOHVgwP4d3u9irGuFWzRPOGGlq2FQXPar6xJ584Ped4FLOeiEAKDgcZhjOkEBcnd X-Received: by 2002:a17:907:429c:: with SMTP id ny20mr20416609ejb.234.1571649281769; Mon, 21 Oct 2019 02:14:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571649281; cv=none; d=google.com; s=arc-20160816; b=p9lRxpLzI1I/dccC5tV7/LOE7fLEzePe7g4UbZ7BXNUzosQlDh3af+WkT5QKj1ytMy tVd5HD01/idoh4oaSjEcEtTuqX73M207cRJpDmlUEc2HAy8cDMpl7sCTvv41tso29a/X j+sozT6uvaTpWaAkY1nSrh/qOGU55WdSg5XqK396QbZndFt0E6q40pA3kZZbJCzsrsBq lvsi626LBDXTxgag6IXCsTzP2NdmyYZe3/I8Bt/LKtyc9v1nddPWcXisz5JOjyzW0aiP Cag46J0nVNTmw1G9+mXAAnQK2oTdmaAhsqtA9RnXFDk8hlisVv18u6haO1YIL37bRPQm oSBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=I9syePCdqy2s1RNRVlrd5LqEHLV1JDCugJ0MObESIDE=; b=Z2eVMCx/kq4FbQT3VQqAJdTLnRvxl5oHbASEmnyhcMIJh/5Vt7kTuRwdRCEJQRGsOO klB8VejPbjGdj4e07MgE7pgFhxIQw1zO0Pjf4m+QV6IWMNDwedPx/airOJgpz9gOAZlj bDOXmvEok0yjwi4qKhlykI5C4cCpuIHqImPysU32fP8om3JTvZAXNi5YT+ptjQuEewZJ zLGFxnqkqsnYK540Liwwszw3PRilYmYUndJgXCXHogbKcjhU40dhrI1OmseXtKspfVRq Z+LWI8KT96vI760yGJ4hhrUMn3s8hyYH9U8TenT4vi1LuSw4rjV7f3Fp7XQdsft7amLZ AKXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dILlMHxs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g25si8213975ejr.409.2019.10.21.02.14.18; Mon, 21 Oct 2019 02:14:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dILlMHxs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727793AbfJUJNp (ORCPT + 99 others); Mon, 21 Oct 2019 05:13:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:37830 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726987AbfJUJNo (ORCPT ); Mon, 21 Oct 2019 05:13:44 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EEF1320873; Mon, 21 Oct 2019 09:13:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571649223; bh=yqmr6bE4HTCk/kWaRLnlRHb3aZ8M5nE1t+SHzsWkT0c=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=dILlMHxsapCwB/RkiKFBJRcDoTVeP8uZtjnYn4j8HijxhFuviJQGK9RLJptUZVwle rvnrlg/U39zZmz9e7H77HIsAXzMEN5hihlW58hLy52HHm+Ms7Lddmy2Cs/TeA0Xfw2 af0VNH2gjKVSuPOS00xFIi5Vol9q+2hboQvET6FM= Date: Mon, 21 Oct 2019 18:13:37 +0900 From: Masami Hiramatsu To: Steven Rostedt Cc: Sami Tolvanen , Will Deacon , Catalin Marinas , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Mark Rutland , Nick Desaulniers , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Masami Hiramatsu Subject: Re: [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES Message-Id: <20191021181337.a1f886fa62b400023c576be0@kernel.org> In-Reply-To: <20191018130257.3376e397@gandalf.local.home> References: <20191018161033.261971-1-samitolvanen@google.com> <20191018161033.261971-11-samitolvanen@google.com> <20191018130257.3376e397@gandalf.local.home> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 18 Oct 2019 13:02:57 -0400 Steven Rostedt wrote: > > Added Masami who's the maintainer of kprobes. > > -- Steve > > > On Fri, 18 Oct 2019 09:10:25 -0700 > Sami Tolvanen wrote: > > > kprobe_on_func_entry and arch_kprobe_on_func_entry need to be available > > even if CONFIG_KRETPROBES is not selected. Good catch! Since nowadays all arch supports kretprobes, I've missed to test it. Acked-by: Masami Hiramatsu Thank you, > > > > Signed-off-by: Sami Tolvanen > > --- > > kernel/kprobes.c | 38 +++++++++++++++++++------------------- > > 1 file changed, 19 insertions(+), 19 deletions(-) > > > > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > > index 53534aa258a6..b5e20a4669b8 100644 > > --- a/kernel/kprobes.c > > +++ b/kernel/kprobes.c > > @@ -1829,6 +1829,25 @@ unsigned long __weak arch_deref_entry_point(void *entry) > > return (unsigned long)entry; > > } > > > > +bool __weak arch_kprobe_on_func_entry(unsigned long offset) > > +{ > > + return !offset; > > +} > > + > > +bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > > +{ > > + kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > > + > > + if (IS_ERR(kp_addr)) > > + return false; > > + > > + if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > > + !arch_kprobe_on_func_entry(offset)) > > + return false; > > + > > + return true; > > +} > > + > > #ifdef CONFIG_KRETPROBES > > /* > > * This kprobe pre_handler is registered with every kretprobe. When probe > > @@ -1885,25 +1904,6 @@ static int pre_handler_kretprobe(struct kprobe *p, struct pt_regs *regs) > > } > > NOKPROBE_SYMBOL(pre_handler_kretprobe); > > > > -bool __weak arch_kprobe_on_func_entry(unsigned long offset) > > -{ > > - return !offset; > > -} > > - > > -bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > > -{ > > - kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > > - > > - if (IS_ERR(kp_addr)) > > - return false; > > - > > - if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > > - !arch_kprobe_on_func_entry(offset)) > > - return false; > > - > > - return true; > > -} > > - > > int register_kretprobe(struct kretprobe *rp) > > { > > int ret = 0; > -- Masami Hiramatsu