Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1016580ybx; Fri, 1 Nov 2019 15:13:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqxP7jPAKwYx+Xf88SFoejysu3eHWwJ6MWgUmQcTH7c7ImQZbSSWb/07yPbwqND8ES7Olw7M X-Received: by 2002:a17:906:4cca:: with SMTP id q10mr11807097ejt.242.1572646417739; Fri, 01 Nov 2019 15:13:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572646417; cv=none; d=google.com; s=arc-20160816; b=N/8Kta8wvkbvwVMcdy/IZH8LGQ3j5xxIFH+MpGHLv9t5oG85DG/LphiUA2khxZwj0n nmVEYHwfwdBBLq6X1UqbuyXYBGXlvUIEw+4v7AnMhIY+o7Oh797wXNnGibSVHb2czHMK twkibxMgBFDUGe4bZOvTT1pbSCNodcvMzhYGgch9jSAtRWnA49B3G/CGsmX3TYjsCEiv 62Hft/zK/3NiSbbbzgW0lr48w1opjg9UztnaU5O77OlYeJzcRtL9ZpDQd+f0n27SngSA Fu72+ZO+GXmECT3mLjlAV3Ro4kVoXpQ8hjF1pV+PXnuT75oeeue7LDnCJIZfKHffoyoq fZHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=lxookr95uMT9sOw8S1HRxQFBJ0wSUMPDNTYBScBbdzA=; b=oa88WdeZwjJb6nN4I+9cU9NvSjosL+3SHm1Lw6Wu+MG74HTkIJkEbhqhGfUo5DyHqV tm0kRIKvc16TURfGSFEBpQIZI9Zi6TL2R8LNaBoMLVnAO23STcn1oytY+Rjj/m9Eup0V wq/ydoY0L1k7S43Dsz8nEuT10X1Cqpa/agJ6TD9AGlCL4bNvl5eIAvijNhMoCHnetBJp XzVQZZ/l3sJMQM5RfsibbwZohNO+RGhlV923IvxujqWeV0TR0/FH/U/f+VBZ+ZoYBrFS p5Ie26Snj+R7KLPLRUWYJ/yzoQr2qbe2pSZmlkKlfRT/pTMYYtRUvJ2m7D7ztp3yIc+g RV3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=VqPASQjK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e12si1630013edj.70.2019.11.01.15.13.14; Fri, 01 Nov 2019 15:13:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=VqPASQjK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727483AbfKAWMU (ORCPT + 99 others); Fri, 1 Nov 2019 18:12:20 -0400 Received: from mail-pf1-f201.google.com ([209.85.210.201]:50321 "EHLO mail-pf1-f201.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727673AbfKAWMR (ORCPT ); Fri, 1 Nov 2019 18:12:17 -0400 Received: by mail-pf1-f201.google.com with SMTP id e13so1781142pff.17 for ; Fri, 01 Nov 2019 15:12:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=lxookr95uMT9sOw8S1HRxQFBJ0wSUMPDNTYBScBbdzA=; b=VqPASQjKWMJdAAeJVcDeaVBQprxOwcKwHm7RWTEH9a4e15mPmrxMbW1NmgWy95nCCG gTOzFuhp1ly0goL38Kzph/3B6Z/grLfH43Q8d/pdkZ/OzdVRcdb/FYfbWEa2y3Z36z+b aTHaRyLhmFGkSCynkV7G0QI+cwcWnjK1qpx31PYhN1zT7bAET6McDo/Y5fThXHdO9Ek7 zYHqR539+PQJrPPLRkOE7jflC+yHuXbTJUVLQrKHrysQdsbsiJzOBJ0HDbVrb0s28p6t kflfPrlWaRQdM1RMKSTS9mn+78aoixWKDx0joRXcRCUOTMxiomPR6k+4etm9NwgxSA31 215g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=lxookr95uMT9sOw8S1HRxQFBJ0wSUMPDNTYBScBbdzA=; b=ked09v/9vuJmUUGaqiDDZkk72ivCt8H+QvuF0FOOKeUtMzc1l0oefQ1TD1+hejQh8v tmsqFxnHudP9dfeLfQfDYuFppk/2w2yutdN0l3D31W38NjC//np7wodnyUYcugLbeWL0 Cx/aIW7u3ytYps4p/prRY+3z0dmQkeTTHlf/+prOlomy+v2iyP/D1fYHfdTt5hoRuSHq ilRPIJ0fG3cyb/scnHYDq846hn2guvG+c0DPhdohyvEUS+ZeTInYf7cEqPnLlMYeaDY7 7TTJtpPcKEt4NbaLHakOsLEvIJfwEWlkNosALVGKPYNOUMJURCmxVaPzjVrRRfmnTSz1 V6hA== X-Gm-Message-State: APjAAAVSC8XNO9lltKP8WBE7rEOQaBqlFVRj5YZMzLwX4AxIgddG/ewY 96KgQPt/xyO/b3xi/bqHkK514Npm63BrAG8UJ5M= X-Received: by 2002:a63:d306:: with SMTP id b6mr15679209pgg.338.1572646336234; Fri, 01 Nov 2019 15:12:16 -0700 (PDT) Date: Fri, 1 Nov 2019 15:11:41 -0700 In-Reply-To: <20191101221150.116536-1-samitolvanen@google.com> Message-Id: <20191101221150.116536-9-samitolvanen@google.com> Mime-Version: 1.0 References: <20191018161033.261971-1-samitolvanen@google.com> <20191101221150.116536-1-samitolvanen@google.com> X-Mailer: git-send-email 2.24.0.rc1.363.gb1bccd3e3d-goog Subject: [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES From: Sami Tolvanen To: Will Deacon , Catalin Marinas , Steven Rostedt , Masami Hiramatsu , Ard Biesheuvel Cc: Dave Martin , Kees Cook , Laura Abbott , Mark Rutland , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Sami Tolvanen Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kprobe_on_func_entry and arch_kprobe_on_func_entry need to be available even if CONFIG_KRETPROBES is not selected. Signed-off-by: Sami Tolvanen Acked-by: Masami Hiramatsu Reviewed-by: Kees Cook --- kernel/kprobes.c | 38 +++++++++++++++++++------------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/kernel/kprobes.c b/kernel/kprobes.c index 53534aa258a6..b5e20a4669b8 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -1829,6 +1829,25 @@ unsigned long __weak arch_deref_entry_point(void *entry) return (unsigned long)entry; } +bool __weak arch_kprobe_on_func_entry(unsigned long offset) +{ + return !offset; +} + +bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) +{ + kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); + + if (IS_ERR(kp_addr)) + return false; + + if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || + !arch_kprobe_on_func_entry(offset)) + return false; + + return true; +} + #ifdef CONFIG_KRETPROBES /* * This kprobe pre_handler is registered with every kretprobe. When probe @@ -1885,25 +1904,6 @@ static int pre_handler_kretprobe(struct kprobe *p, struct pt_regs *regs) } NOKPROBE_SYMBOL(pre_handler_kretprobe); -bool __weak arch_kprobe_on_func_entry(unsigned long offset) -{ - return !offset; -} - -bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) -{ - kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); - - if (IS_ERR(kp_addr)) - return false; - - if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || - !arch_kprobe_on_func_entry(offset)) - return false; - - return true; -} - int register_kretprobe(struct kretprobe *rp) { int ret = 0; -- 2.24.0.rc1.363.gb1bccd3e3d-goog