lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130415160416.GA17826@redhat.com>
Date:	Mon, 15 Apr 2013 18:04:16 +0200
From:	Oleg Nesterov <oleg@...hat.com>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	Ananth N Mavinakayanahalli <ananth@...ibm.com>,
	Anton Arapov <anton@...hat.com>,
	Frank Eigler <fche@...hat.com>,
	Josh Stone <jistone@...hat.com>,
	Masami Hiramatsu <masami.hiramatsu.pt@...achi.com>,
	Srikar Dronamraju <srikar@...ux.vnet.ibm.com>,
	Steven Rostedt <rostedt@...dmis.org>,
	linux-kernel@...r.kernel.org
Subject: [GIT PULL] uprobes: ret-probes + misc

Ingo, please pull from

  git://git.kernel.org/pub/scm/linux/kernel/git/oleg/misc uprobes/core

Mostly uretprobes. "perf probe -x file sym%return" works like kretprobes.
TODO: longjmp() is not supported, currently we assume that the probed
function returns, this needs another series.

Also the powerpc fixes plus a couple of cleanups/optimizations in uprobes
and trace_uprobes.



Ananth N Mavinakayanahalli (3):
      uprobes: Add trap variant helper
      uprobes/powerpc: Teach uprobes to ignore gdb breakpoints
      uprobes/powerpc: Remove additional trap instruction check

Anton Arapov (9):
      uretprobes: Introduce uprobe_consumer->ret_handler()
      uretprobes: Reserve the first slot in xol_vma for trampoline
      uretprobes/x86: Hijack return address
      uretprobes/powerpc: Hijack return address
      uretprobes: Return probe entry, prepare_uretprobe()
      uretprobes: Return probe exit, invoke handlers
      uretprobes: Limit the depth of return probe nestedness
      uretprobes: Remove -ENOSYS as return probes implemented
      uretprobes: Documentation update

Oleg Nesterov (18):
      uprobes: Use file_inode()
      uprobes: Turn copy_opcode() into copy_from_page()
      uprobes: Change __copy_insn() to use copy_from_page()
      uprobes: Kill the unnecesary filp != NULL check in __copy_insn()
      uprobes: Introduce copy_to_page()
      uprobes: Change write_opcode() to use copy_*page()
      uprobes/tracing: Kill the pointless task_pt_regs() calls
      uprobes/tracing: Kill the pointless seq_print_ip_sym() call
      uprobes/tracing: Kill the pointless local_save_flags/preempt_count calls
      uprobes/tracing: Generalize struct uprobe_trace_entry_head
      uprobes/tracing: Introduce uprobe_{trace,perf}_print() helpers
      uprobes/tracing: Introduce is_ret_probe() and uretprobe_dispatcher()
      uprobes/tracing: Make uprobe_{trace,perf}_print() uretprobe-friendly
      uprobes/tracing: Make register_uprobe_event() paths uretprobe-friendly
      uprobes/tracing: Make seq_printf() code uretprobe-friendly
      uprobes/tracing: Change create_trace_uprobe() to support uretprobes
      uprobes/tracing: Don't pass addr=ip to perf_trace_buf_submit()
      uprobes/perf: Avoid perf_trace_buf_prepare/submit if ->perf_events is empty

 Documentation/trace/uprobetracer.txt |  114 ++++++++------
 arch/powerpc/include/asm/uprobes.h   |    1 +
 arch/powerpc/kernel/uprobes.c        |   29 +++-
 arch/x86/include/asm/uprobes.h       |    1 +
 arch/x86/kernel/uprobes.c            |   29 ++++
 include/linux/uprobes.h              |    8 +
 kernel/events/uprobes.c              |  300 ++++++++++++++++++++++++++++------
 kernel/trace/trace.h                 |    5 -
 kernel/trace/trace_uprobe.c          |  203 +++++++++++++++++-------
 9 files changed, 526 insertions(+), 164 deletions(-)

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ