]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blobdiff - kernel/kprobes.c
tick/sched: Annotate lockless access to last_jiffies_update
[mirror_ubuntu-bionic-kernel.git] / kernel / kprobes.c
index 86e030696c3b7b88bf84812c41090268234aa38b..cd1d7d1ec87cf9d6c0c282dd341a0a5235d7d72b 100644 (file)
@@ -544,8 +544,14 @@ static void do_free_cleaned_kprobes(void)
        struct optimized_kprobe *op, *tmp;
 
        list_for_each_entry_safe(op, tmp, &freeing_list, list) {
-               BUG_ON(!kprobe_unused(&op->kp));
                list_del_init(&op->list);
+               if (WARN_ON_ONCE(!kprobe_unused(&op->kp))) {
+                       /*
+                        * This must not happen, but if there is a kprobe
+                        * still in use, keep it on kprobes hash list.
+                        */
+                       continue;
+               }
                free_aggr_kprobe(&op->kp);
        }
 }
@@ -1499,7 +1505,8 @@ static int check_kprobe_address_safe(struct kprobe *p,
        /* Ensure it is not in reserved area nor out of text */
        if (!kernel_text_address((unsigned long) p->addr) ||
            within_kprobe_blacklist((unsigned long) p->addr) ||
-           jump_label_text_reserved(p->addr, p->addr)) {
+           jump_label_text_reserved(p->addr, p->addr) ||
+           find_bug((unsigned long)p->addr)) {
                ret = -EINVAL;
                goto out;
        }
@@ -2142,6 +2149,47 @@ void dump_kprobe(struct kprobe *kp)
 }
 NOKPROBE_SYMBOL(dump_kprobe);
 
+int kprobe_add_ksym_blacklist(unsigned long entry)
+{
+       struct kprobe_blacklist_entry *ent;
+       unsigned long offset = 0, size = 0;
+
+       if (!kernel_text_address(entry) ||
+           !kallsyms_lookup_size_offset(entry, &size, &offset))
+               return -EINVAL;
+
+       ent = kmalloc(sizeof(*ent), GFP_KERNEL);
+       if (!ent)
+               return -ENOMEM;
+       ent->start_addr = entry;
+       ent->end_addr = entry + size;
+       INIT_LIST_HEAD(&ent->list);
+       list_add_tail(&ent->list, &kprobe_blacklist);
+
+       return (int)size;
+}
+
+/* Add all symbols in given area into kprobe blacklist */
+int kprobe_add_area_blacklist(unsigned long start, unsigned long end)
+{
+       unsigned long entry;
+       int ret = 0;
+
+       for (entry = start; entry < end; entry += ret) {
+               ret = kprobe_add_ksym_blacklist(entry);
+               if (ret < 0)
+                       return ret;
+               if (ret == 0)   /* In case of alias symbol */
+                       ret = 1;
+       }
+       return 0;
+}
+
+int __init __weak arch_populate_kprobe_blacklist(void)
+{
+       return 0;
+}
+
 /*
  * Lookup and populate the kprobe_blacklist.
  *
@@ -2153,26 +2201,24 @@ NOKPROBE_SYMBOL(dump_kprobe);
 static int __init populate_kprobe_blacklist(unsigned long *start,
                                             unsigned long *end)
 {
+       unsigned long entry;
        unsigned long *iter;
-       struct kprobe_blacklist_entry *ent;
-       unsigned long entry, offset = 0, size = 0;
+       int ret;
 
        for (iter = start; iter < end; iter++) {
                entry = arch_deref_entry_point((void *)*iter);
-
-               if (!kernel_text_address(entry) ||
-                   !kallsyms_lookup_size_offset(entry, &size, &offset))
+               ret = kprobe_add_ksym_blacklist(entry);
+               if (ret == -EINVAL)
                        continue;
-
-               ent = kmalloc(sizeof(*ent), GFP_KERNEL);
-               if (!ent)
-                       return -ENOMEM;
-               ent->start_addr = entry;
-               ent->end_addr = entry + size;
-               INIT_LIST_HEAD(&ent->list);
-               list_add_tail(&ent->list, &kprobe_blacklist);
+               if (ret < 0)
+                       return ret;
        }
-       return 0;
+
+       /* Symbols in __kprobes_text are blacklisted */
+       ret = kprobe_add_area_blacklist((unsigned long)__kprobes_text_start,
+                                       (unsigned long)__kprobes_text_end);
+
+       return ret ? : arch_populate_kprobe_blacklist();
 }
 
 /* Module notifier call back, checking kprobes on the module */