lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 11 Dec 2006 15:26:26 +0530
From:	"Amitabha Roy" <amitabha.roy@...il.com>
To:	phil.el@...adoo.fr
Cc:	oprofile-list@...ts.sf.net, linux-kernel@...r.kernel.org
Subject: [patch 1/1] oprofile: Add a special cookie for the VDSO region

Emit a special VDSO_COOKIE for VDSO regions instead of simply marking
them as anon.

Signed-off-by: Amitabha Roy <amitabha.roy@...il.com>
---
diff --git a/drivers/oprofile/buffer_sync.c b/drivers/oprofile/buffer_sync.c
index 78c2e6e..7f879db 100644
--- a/drivers/oprofile/buffer_sync.c
+++ b/drivers/oprofile/buffer_sync.c
@@ -250,7 +250,14 @@ static unsigned long lookup_dcookie(stru
 				vma->vm_file->f_path.mnt);
 			*offset = (vma->vm_pgoff << PAGE_SHIFT) + addr -
 				vma->vm_start;
-		} else {
+		}
+#ifdef CONFIG_X86_32
+		else if(mm->context.vdso==vma->vm_start){
+                        cookie = VDSO_COOKIE;
+		        *offset = addr;
+		}
+#endif
+		else {
 			/* must be an anonymous map */
 			*offset = addr;
 		}
diff --git a/drivers/oprofile/event_buffer.h b/drivers/oprofile/event_buffer.h
index 9241627..edc8ee2 100644
--- a/drivers/oprofile/event_buffer.h
+++ b/drivers/oprofile/event_buffer.h
@@ -35,6 +35,7 @@ #define CTX_TGID_CODE			7
 #define TRACE_BEGIN_CODE		8
 #define TRACE_END_CODE			9

+#define VDSO_COOKIE ~1UL
 #define INVALID_COOKIE ~0UL
 #define NO_COOKIE 0UL
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ