[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131101112530.14657.87835.stgit@kbuild-fedora.novalocal>
Date: Fri, 01 Nov 2013 11:25:30 +0000
From: Masami Hiramatsu <masami.hiramatsu.pt@...achi.com>
To: Ingo Molnar <mingo@...nel.org>
Cc: x86@...nel.org, Ananth N Mavinakayanahalli <ananth@...ibm.com>,
"Steven Rostedt (Red Hat)" <rostedt@...dmis.org>,
lkml <linux-kernel@...r.kernel.org>
Subject: [PATCH -tip v2 0/3] kprobes: introduce nokprobe and updating
blacklist
According to Ingo's suggestion, I've introduced 'nokprobe'
new annotation as like as 'notrace' annotation, since
__kprobes annotation is too confusing to mark non-kprobe
able functions.
I took 'nokprobe' instead of 'noprobe' since we already
have irq_set_noprobe() etc.
Also, I've found that putting probes on some functions
could lock or reboot the kernel. These two patches fix
those bugs by prohibiting probing such functions by
adding those to blacklist(kprobes.text).
In both cases, those functions are related to int3 handling
execution path. One is related to irqoff-tracer and the other
is related to notifier debug option.
Thank you,
Changes in the latest version:
- introduce nokprobe annotation
- change __kprobes to nokprobe in bugfixes
- remove unneeded linux/kprobes.h includings.
---
Masami Hiramatsu (3):
kprobes: Introduce nokprobe annotation for non-probe-able functions
[BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
[BUGFIX] kprobes: Prohibit probing on func_ptr_is_kernel_text
arch/x86/kernel/cpu/common.c | 6 +++---
include/linux/compiler.h | 6 ++++--
kernel/extable.c | 2 +-
3 files changed, 8 insertions(+), 6 deletions(-)
--
Masami HIRAMATSU
IT Management Research Dept. Linux Technology Center
Hitachi, Ltd., Yokohama Research Laboratory
E-mail: masami.hiramatsu.pt@...achi.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists