On 03/22, Anton Arapov wrote:
>
> +arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr, struct 
> pt_regs *regs)
> +{
> +     int rasize, ncopied;
> +     unsigned long orig_ret_vaddr = 0; /* clear high bits for 32-bit apps */
> +
> +     rasize = is_ia32_task() ? 4 : 8;

Hmm.. I guess you need is_compat_task() here.

> +     ncopied = copy_from_user(&orig_ret_vaddr, (void __user *)regs->sp, 
> rasize);
> +     if (unlikely(ncopied))
> +             return -1;
> +
> +     /* check whether address has been already hijacked */
> +     if (orig_ret_vaddr == trampoline_vaddr)
> +             return orig_ret_vaddr;
> +
> +     ncopied = copy_to_user((void __user *)regs->sp, &trampoline_vaddr, 
> rasize);
> +     if (unlikely(ncopied)) {
> +             if (ncopied != rasize) {
> +                     printk(KERN_ERR "uprobe: return address clobbered: "

Cosmetic, but we have pr_err().

> +                                     "pid=%d, %%sp=%#lx, %%ip=%#lx\n",
> +                                     current->pid, regs->sp, regs->ip);
> +                     /* kill task immediately */
> +                     send_sig(SIGSEGV, current, 0);

probably force_sig_info() makes more sense, but this is minor

> +             }

You need to retun -1 here.

Cosmetic again, but since this function should be updated anyway,
I'd suggest

        ncopied = copy_to_user(...);

        if (likely(!ncopied))
                return orig_ret_vaddr;

        if (ncopied != rasize) {
                ...
        }

        return -1;

Oleg.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to