Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp2318657ybc; Wed, 13 Nov 2019 12:28:11 -0800 (PST) X-Google-Smtp-Source: APXvYqziRruff11fPj9domGcv+Me/iw5I6EX+PFw+U8qzzP4xH8wp99wpqHmbvbAunIv+2XsVTTd X-Received: by 2002:aa7:c453:: with SMTP id n19mr6012314edr.103.1573676891739; Wed, 13 Nov 2019 12:28:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573676891; cv=none; d=google.com; s=arc-20160816; b=vlRSM/j3fBgPDKZO1doEvr6baqToKSJI7hY8yZ6kSqWkPfX3E7z4QkJ2815kf9YNjF YABpZHqGi/Pbc/oUl7nhqRDCugWAWrr40bvjdtGmYJxMFLkBqX5zyb5B4LvctkdE+vCK TFcdvH1RyovtBjBk6ql/JkyNhQhpPAvnzIRtqFyTfSV8ojImAKTf/k2vLwTHflYzDDHh 26Zmaf0gw9EVcUFhC/t7oqZZNB2vLN0DKg9xwLFM4+tZQRYJfxyAqMkfpeVk3xy8YEs4 sdG0HFHR76YcLe8VsSyzNNQi0ZWoAInYstPQaWoBr3KVnOWQV8KS2S8/aRliKO5sxOhi R8Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=ynmReBgqO8oAEHYcUFgymjkJ92osRsCWRB2iTs5zs3k=; b=r/rYK6MpMzEFC7AUKGN27wNGWwEzcPr3M4On2dEgf466pOYurZ8gkUbvE/Nj85ajgH inEgP89B7P+gNYDqWnISTHHrnwLsbNTXhuXLv0VfJKokrEAQGsjwzGVsavaXcGtRQhuM aWDjoOuj4czs6PfXWs6DSE/3lsX/jfvhO9mvg0VFtvWA3o1mZXH+oCv2FXvCPYvmecRN LKTVGGfnj4xde6PYVZTQyaUi9xOELnqA0tafz4Z6cM92REZFMmZeiMz8sS8YyJQwrjRo CiYe6/AgFkanBK7sB9YHPdUkCf1P3S//22H0WbM5ndeZDPWspfKk6PXz4srby1eWr/Vn 7g+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k7si2143493edb.265.2019.11.13.12.27.47; Wed, 13 Nov 2019 12:28:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727020AbfKMU1G (ORCPT + 99 others); Wed, 13 Nov 2019 15:27:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:50958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726179AbfKMU1G (ORCPT ); Wed, 13 Nov 2019 15:27:06 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E9155206E6; Wed, 13 Nov 2019 20:27:04 +0000 (UTC) Date: Wed, 13 Nov 2019 15:27:02 -0500 From: Steven Rostedt To: Sami Tolvanen Cc: Will Deacon , Catalin Marinas , Masami Hiramatsu , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Mark Rutland , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES Message-ID: <20191113152702.291884f3@gandalf.local.home> In-Reply-To: <20191101221150.116536-9-samitolvanen@google.com> References: <20191018161033.261971-1-samitolvanen@google.com> <20191101221150.116536-1-samitolvanen@google.com> <20191101221150.116536-9-samitolvanen@google.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 1 Nov 2019 15:11:41 -0700 Sami Tolvanen wrote: > kprobe_on_func_entry and arch_kprobe_on_func_entry need to be available > even if CONFIG_KRETPROBES is not selected. > > Signed-off-by: Sami Tolvanen > Acked-by: Masami Hiramatsu > Reviewed-by: Kees Cook Acked-by: Steven Rostedt (VMware) -- Steve > --- > kernel/kprobes.c | 38 +++++++++++++++++++------------------- > 1 file changed, 19 insertions(+), 19 deletions(-) > > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > index 53534aa258a6..b5e20a4669b8 100644 > --- a/kernel/kprobes.c > +++ b/kernel/kprobes.c > @@ -1829,6 +1829,25 @@ unsigned long __weak arch_deref_entry_point(void *entry) > return (unsigned long)entry; > } > > +bool __weak arch_kprobe_on_func_entry(unsigned long offset) > +{ > + return !offset; > +} > + > +bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > +{ > + kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > + > + if (IS_ERR(kp_addr)) > + return false; > + > + if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > + !arch_kprobe_on_func_entry(offset)) > + return false; > + > + return true; > +} > + > #ifdef CONFIG_KRETPROBES > /* > * This kprobe pre_handler is registered with every kretprobe. When probe > @@ -1885,25 +1904,6 @@ static int pre_handler_kretprobe(struct kprobe *p, struct pt_regs *regs) > } > NOKPROBE_SYMBOL(pre_handler_kretprobe); > > -bool __weak arch_kprobe_on_func_entry(unsigned long offset) > -{ > - return !offset; > -} > - > -bool kprobe_on_func_entry(kprobe_opcode_t *addr, const char *sym, unsigned long offset) > -{ > - kprobe_opcode_t *kp_addr = _kprobe_addr(addr, sym, offset); > - > - if (IS_ERR(kp_addr)) > - return false; > - > - if (!kallsyms_lookup_size_offset((unsigned long)kp_addr, NULL, &offset) || > - !arch_kprobe_on_func_entry(offset)) > - return false; > - > - return true; > -} > - > int register_kretprobe(struct kretprobe *rp) > { > int ret = 0;