From: Jonathan Rajotte Date: Thu, 7 Mar 2019 19:57:59 +0000 (-0500) Subject: Blacklist: kprobe for arm X-Git-Tag: v2.9.12~1 X-Git-Url: http://git.liburcu.org/?a=commitdiff_plain;h=99d62d55d8d587ade853db85a8dc1a7f01b4113e;hp=99d62d55d8d587ade853db85a8dc1a7f01b4113e;p=lttng-modules.git Blacklist: kprobe for arm This upstream kernel commit broke optimized kprobe. commit e46daee53bb50bde38805f1823a182979724c229 Author: Kees Cook Date: Tue Oct 30 22:12:56 2018 +0100 ARM: 8806/1: kprobes: Fix false positive with FORTIFY_SOURCE The arm compiler internally interprets an inline assembly label as an unsigned long value, not a pointer. As a result, under CONFIG_FORTIFY_SOURCE, the address of a label has a size of 4 bytes, which was tripping the runtime checks. Instead, we can just cast the label (as done with the size calculations earlier). Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1639397 Reported-by: William Cohen Fixes: 6974f0c4555e ("include/linux/string.h: add the option of fortified string.h functions") Cc: stable@vger.kernel.org Acked-by: Laura Abbott Acked-by: Masami Hiramatsu Tested-by: William Cohen Signed-off-by: Kees Cook Signed-off-by: Russell King It was introduced in the 4.20 cycle. It was also backported to the 4.19 and 4.14 branch. This issue is fixed upstream by [1] and is present in the 5.0 kernel release. [1] 0ac569bf6a7983c0c5747d6df8db9dc05bc92b6c The fix was backported to 4.20, 4.19 and 4.14 branch. It is included starting at: v5.0.0 v4.20.13 v4.19.26 v4.14.104 Fixes #1174 Signed-off-by: Jonathan Rajotte Signed-off-by: Mathieu Desnoyers ---