Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp767068ybj; Tue, 5 May 2020 07:16:28 -0700 (PDT) X-Google-Smtp-Source: APiQypI5zFTP2FFMLaxJhfRow3CrUYcS933gI5PZ2fhv/1qhLz2Iu7DiDG/SGMaSX8JKQnt422NE X-Received: by 2002:a50:f78c:: with SMTP id h12mr2649797edn.207.1588688188655; Tue, 05 May 2020 07:16:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588688188; cv=none; d=google.com; s=arc-20160816; b=tk+gQHgYzcu66K8zK4he15kqJy78EIrGy2Cl7BjWL9Ifm8rWRga8KdlCjKsD9SaKv4 TwAEyT0ugUyHBNm5dbYX0AYU37hwLbUi0mKLUQqtxaGsv0e8ts0z6i92zYcs9QqMRdXN UoTWjRPE+Fuh5QrKlDrK7TiKSau7Os6hK5JDFkZzX2dkySKveqjNCjWBEwv6KhOmUcZK 8pD8p60su+Wd7n4ysx06hAQutawA42uyIQiC7aUbbOJZ5SG3RdG1a1e7gnfRbV+jqRGP /G4EJA48b2AxLNMppLEiME4Ik9Yt3k8qjmXXRSdMFCnEUj4Dr5m1pE2O92nJ5gFVRuKp dLRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:subject:cc:to:from:date:user-agent:message-id; bh=H9itjt6BRMJUsyCGW2kEN7OlqGQwWUrlu+wiao5FpSk=; b=RI4EEcWp9RJErZi2ovwWsaYQGqIcG8aqSwmZut/gPPVVUafBIvS4cMsxUtKhs+olFq ibeLcQTamn25aRHQ8+kVV72eg8xYAZ2Np7Xgh7dv4RSdGRvpCzIaC0PkIpETwxmFcY4U zYT9hvMlE5J1V+nsboNWzl8xIkpQAlyMjie4K7fRtsErlns3YMoDjbXiCw60TzQGyvXR GAe0nNmxUc8zviSZcQCcrgGtXBgK1bpg2k8OVTfLgTibkoquvMVt0vRlgeQ33gFgBHIy ttQIDU/gOk0W4zmLy3xkPsAjPQtzfrHFUEjleAGTGIcAmL9CSD/YkUPkbr8+VE8KlB0I 9iMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i17si1246567ejz.399.2020.05.05.07.15.57; Tue, 05 May 2020 07:16:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729466AbgEEON5 (ORCPT + 99 others); Tue, 5 May 2020 10:13:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1729240AbgEEONw (ORCPT ); Tue, 5 May 2020 10:13:52 -0400 Received: from Galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 020C6C061A0F for ; Tue, 5 May 2020 07:13:52 -0700 (PDT) Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jVyKD-0000U3-0M; Tue, 05 May 2020 16:13:33 +0200 Received: from nanos.tec.linutronix.de (localhost [IPv6:::1]) by nanos.tec.linutronix.de (Postfix) with ESMTP id 788B5FFC8D; Tue, 5 May 2020 16:13:32 +0200 (CEST) Message-Id: <20200505134059.571125195@linutronix.de> User-Agent: quilt/0.65 Date: Tue, 05 May 2020 15:16:17 +0200 From: Thomas Gleixner To: LKML Cc: x86@kernel.org, "Paul E. McKenney" , Andy Lutomirski , Alexandre Chartre , Frederic Weisbecker , Paolo Bonzini , Sean Christopherson , Masami Hiramatsu , Petr Mladek , Steven Rostedt , Joel Fernandes , Boris Ostrovsky , Juergen Gross , Brian Gerst , Mathieu Desnoyers , Josh Poimboeuf , Will Deacon Subject: [patch V4 part 1 15/36] kprobes: Lock kprobe_mutex while showing kprobe_blacklist References: <20200505131602.633487962@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-transfer-encoding: 8-bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Masami Hiramatsu Lock kprobe_mutex while showing kprobe_blacklist to prevent updating the kprobe_blacklist. Signed-off-by: Masami Hiramatsu Signed-off-by: Thomas Gleixner Link: https://lkml.kernel.org/r/158523417665.24735.10253198878535635600.stgit@devnote2 --- kernel/kprobes.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -2426,6 +2426,7 @@ static const struct file_operations debu /* kprobes/blacklist -- shows which functions can not be probed */ static void *kprobe_blacklist_seq_start(struct seq_file *m, loff_t *pos) { + mutex_lock(&kprobe_mutex); return seq_list_start(&kprobe_blacklist, *pos); } @@ -2452,10 +2453,15 @@ static int kprobe_blacklist_seq_show(str return 0; } +static void kprobe_blacklist_seq_stop(struct seq_file *f, void *v) +{ + mutex_unlock(&kprobe_mutex); +} + static const struct seq_operations kprobe_blacklist_seq_ops = { .start = kprobe_blacklist_seq_start, .next = kprobe_blacklist_seq_next, - .stop = kprobe_seq_stop, /* Reuse void function */ + .stop = kprobe_blacklist_seq_stop, .show = kprobe_blacklist_seq_show, };