From: Jonathan Rajotte Date: Thu, 7 Mar 2019 19:57:59 +0000 (-0500) Subject: Blacklist: kprobe for arm X-Git-Tag: v2.9.12~1 X-Git-Url: https://git.lttng.org./?a=commitdiff_plain;h=99d62d55d8d587ade853db85a8dc1a7f01b4113e;p=lttng-modules.git Blacklist: kprobe for arm This upstream kernel commit broke optimized kprobe. commit e46daee53bb50bde38805f1823a182979724c229 Author: Kees Cook Date: Tue Oct 30 22:12:56 2018 +0100 ARM: 8806/1: kprobes: Fix false positive with FORTIFY_SOURCE The arm compiler internally interprets an inline assembly label as an unsigned long value, not a pointer. As a result, under CONFIG_FORTIFY_SOURCE, the address of a label has a size of 4 bytes, which was tripping the runtime checks. Instead, we can just cast the label (as done with the size calculations earlier). Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1639397 Reported-by: William Cohen Fixes: 6974f0c4555e ("include/linux/string.h: add the option of fortified string.h functions") Cc: stable@vger.kernel.org Acked-by: Laura Abbott Acked-by: Masami Hiramatsu Tested-by: William Cohen Signed-off-by: Kees Cook Signed-off-by: Russell King It was introduced in the 4.20 cycle. It was also backported to the 4.19 and 4.14 branch. This issue is fixed upstream by [1] and is present in the 5.0 kernel release. [1] 0ac569bf6a7983c0c5747d6df8db9dc05bc92b6c The fix was backported to 4.20, 4.19 and 4.14 branch. It is included starting at: v5.0.0 v4.20.13 v4.19.26 v4.14.104 Fixes #1174 Signed-off-by: Jonathan Rajotte Signed-off-by: Mathieu Desnoyers --- diff --git a/blacklist/kprobes.h b/blacklist/kprobes.h new file mode 100644 index 00000000..6c1d7a53 --- /dev/null +++ b/blacklist/kprobes.h @@ -0,0 +1,23 @@ +/* SPDX-License-Identifier: (GPL-2.0 OR LGPL-2.1) + * + * blacklist/kprobes.h + * + * Blacklist of kernel for buggy kprobes implementation. + * + * Copyright (C) 2019 Jonathan Rajotte-Julien + */ + +#ifndef _LTTNG_BLACKLIST_KPROBES_H +#define _LTTNG_BLACKLIST_KPROBES_H + +#include + +#if LTTNG_KERNEL_RANGE(4,20,0, 4,20,13) \ + || LTTNG_KERNEL_RANGE(4,19,9, 4,19,26) \ + || LTTNG_KERNEL_RANGE(4,14,87, 4,14,104) +# if defined(CONFIG_ARM) && defined(CONFIG_OPTPROBES) +# error "Your kernel is known to have buggy optimized kprobes implementation. Fixed by commit 0ac569bf6a7983c0c5747d6df8db9dc05bc92b6c \"ARM: 8834/1: Fix: kprobes: optimized kprobes illegal instruction\" in Linux. Disable CONFIG_OPTPROBES or upgrade your kernel." +# endif /* #if defined(CONFIG_ARM) && defined(CONFIG_OPTPROBES) */ +#endif + +#endif /* _LTTNG_BLACKLIST_KPROBES_H */ diff --git a/probes/lttng-kprobes.c b/probes/lttng-kprobes.c index b58a09b4..6d2038e7 100644 --- a/probes/lttng-kprobes.c +++ b/probes/lttng-kprobes.c @@ -28,6 +28,7 @@ #include #include #include +#include static int lttng_kprobes_handler_pre(struct kprobe *p, struct pt_regs *regs) diff --git a/probes/lttng-kretprobes.c b/probes/lttng-kretprobes.c index 49b7de82..307e6777 100644 --- a/probes/lttng-kretprobes.c +++ b/probes/lttng-kretprobes.c @@ -29,6 +29,7 @@ #include #include #include +#include enum lttng_kretprobe_type { EVENT_ENTRY = 0,