Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp779089ybj; Tue, 5 May 2020 07:26:29 -0700 (PDT) X-Google-Smtp-Source: APiQypKML6x01Wq47n5ofQGkh4u47fgBDsIa87XlyuyMPib7SCLrjAp7/eKMjOnwJCOfOvb+cDwL X-Received: by 2002:a17:906:f1d7:: with SMTP id gx23mr2909199ejb.176.1588688789148; Tue, 05 May 2020 07:26:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588688789; cv=none; d=google.com; s=arc-20160816; b=Dz0mODTZJjmR9Rhq5Y1vE+A5WkVDExOxn0rH7NGOIFQHiisNfFJmoBQhv7/kwE31QP +KVKEbevSx67/ij/Sh05AFWZ3T2PIRSWQNMvKObaCQxxRi5+qSC8vkcW1s7Umf/UUbqG vDDCktNETRHI5DpEWbaOLmlvM1efz4f2xwZ+i4Xb47T2oNe4UwlymZRi6T2QmA4MmNxk c/M6yLnXF80jmi7w1LvkMAsPLKe5rT+rBOeyg8AF3GhsBfp8nPB62O8LwwKDAjhoNAlh 9C2E+DWBRIKA/o0SxGp7l5AhUxPING/kK+/cJQFMb7a+oPjZ2AUpMuV5ZTP7wS8GuVfw ovwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:subject:cc:to:from:date:user-agent:message-id; bh=tVJkcz5bMlDzvmZy+zEI6zDwkbBWnqLVUQHvIlxTwvk=; b=TdX+r1Lm1+P6NxOP57xvWx7L5QNxmPaVH9lH2RJj8/G+yvlS+UXCMiMjvVFvRRMsaO XaYAileKYnhJe4tRDMNQaAUHgXlpf+Ih8MASNxPdjiCBtS1wPMoNKk0jzu9Bh0YED80A j+dYdhl81/KbR5sBAk4rAaO0ufuN5z6FPHJoqb9sP7LmyAKTiaG09qor3bBYRNPz9+pK sxQ5g5jXJFGvTdejysejDdULuBgCRZ89zCq2dGwIUMdwwXdPFP9h2pWHh+Q74s1oaqpX XgUn4nVnM4uXk9GF4+qtPCg5CZEWu2UsI+EG103CckKRbNhr9g1OxrClSmz4qXvF1vIF /6AQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b89si1259941edf.345.2020.05.05.07.26.05; Tue, 05 May 2020 07:26:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729674AbgEEOXx (ORCPT + 99 others); Tue, 5 May 2020 10:23:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48548 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1729372AbgEEONx (ORCPT ); Tue, 5 May 2020 10:13:53 -0400 Received: from Galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EEADAC061A0F for ; Tue, 5 May 2020 07:13:52 -0700 (PDT) Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jVyKF-0000Vo-Gm; Tue, 05 May 2020 16:13:35 +0200 Received: from nanos.tec.linutronix.de (localhost [IPv6:::1]) by nanos.tec.linutronix.de (Postfix) with ESMTP id F3A7FFFC8D; Tue, 5 May 2020 16:13:34 +0200 (CEST) Message-Id: <20200505134059.771170126@linutronix.de> User-Agent: quilt/0.65 Date: Tue, 05 May 2020 15:16:19 +0200 From: Thomas Gleixner To: LKML Cc: x86@kernel.org, "Paul E. McKenney" , Andy Lutomirski , Alexandre Chartre , Frederic Weisbecker , Paolo Bonzini , Sean Christopherson , Masami Hiramatsu , Petr Mladek , Steven Rostedt , Joel Fernandes , Boris Ostrovsky , Juergen Gross , Brian Gerst , Mathieu Desnoyers , Josh Poimboeuf , Will Deacon Subject: [patch V4 part 1 17/36] kprobes: Support NOKPROBE_SYMBOL() in modules References: <20200505131602.633487962@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-transfer-encoding: 8-bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Masami Hiramatsu Support NOKPROBE_SYMBOL() in modules. NOKPROBE_SYMBOL() records only symbol address in "_kprobe_blacklist" section in the module. Signed-off-by: Masami Hiramatsu Signed-off-by: Thomas Gleixner Link: https://lkml.kernel.org/r/158523419989.24735.6665260504057165207.stgit@devnote2 --- include/linux/module.h | 2 ++ kernel/kprobes.c | 17 +++++++++++++++++ kernel/module.c | 3 +++ 3 files changed, 22 insertions(+) diff --git a/include/linux/module.h b/include/linux/module.h index 369c354f9207..1192097c9a69 100644 --- a/include/linux/module.h +++ b/include/linux/module.h @@ -492,6 +492,8 @@ struct module { #ifdef CONFIG_KPROBES void *kprobes_text_start; unsigned int kprobes_text_size; + unsigned long *kprobe_blacklist; + unsigned int num_kprobe_blacklist; #endif #ifdef CONFIG_LIVEPATCH diff --git a/kernel/kprobes.c b/kernel/kprobes.c index b7549992b9bd..9eb5acf0a9f3 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -2192,6 +2192,11 @@ static void kprobe_remove_area_blacklist(unsigned long start, unsigned long end) } } +static void kprobe_remove_ksym_blacklist(unsigned long entry) +{ + kprobe_remove_area_blacklist(entry, entry + 1); +} + int __init __weak arch_populate_kprobe_blacklist(void) { return 0; @@ -2231,6 +2236,12 @@ static int __init populate_kprobe_blacklist(unsigned long *start, static void add_module_kprobe_blacklist(struct module *mod) { unsigned long start, end; + int i; + + if (mod->kprobe_blacklist) { + for (i = 0; i < mod->num_kprobe_blacklist; i++) + kprobe_add_ksym_blacklist(mod->kprobe_blacklist[i]); + } start = (unsigned long)mod->kprobes_text_start; if (start) { @@ -2242,6 +2253,12 @@ static void add_module_kprobe_blacklist(struct module *mod) static void remove_module_kprobe_blacklist(struct module *mod) { unsigned long start, end; + int i; + + if (mod->kprobe_blacklist) { + for (i = 0; i < mod->num_kprobe_blacklist; i++) + kprobe_remove_ksym_blacklist(mod->kprobe_blacklist[i]); + } start = (unsigned long)mod->kprobes_text_start; if (start) { diff --git a/kernel/module.c b/kernel/module.c index f7712a923d63..7be011dacd8a 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -3197,6 +3197,9 @@ static int find_module_sections(struct module *mod, struct load_info *info) #ifdef CONFIG_KPROBES mod->kprobes_text_start = section_objs(info, ".kprobes.text", 1, &mod->kprobes_text_size); + mod->kprobe_blacklist = section_objs(info, "_kprobe_blacklist", + sizeof(unsigned long), + &mod->num_kprobe_blacklist); #endif mod->extable = section_objs(info, "__ex_table", sizeof(*mod->extable), &mod->num_exentries);