[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <66dfa2cb82fc306d42e51adf0f5d819b4695644e.1470120173.git.panand@redhat.com>
Date: Tue, 2 Aug 2016 12:14:06 +0530
From: Pratyush Anand <panand@...hat.com>
To: linux-kernel@...r.kernel.org
Cc: oleg@...hat.com, srikar@...ux.vnet.ibm.com,
Pratyush Anand <panand@...hat.com>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Ingo Molnar <mingo@...hat.com>,
Peter Zijlstra <peterz@...radead.org>
Subject: [PATCH] uprobe: Add uprobe_pre/post_sstep_notifier to NOKPROBE_SYMBOL
uprobe_pre_sstep_notifier and uprobe_post_sstep_notifier are called from
debug exception handler, so blacklist them for kprobing.
Signed-off-by: Pratyush Anand <panand@...hat.com>
---
kernel/events/uprobes.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c
index b7a525ab2083..206e594cb65e 100644
--- a/kernel/events/uprobes.c
+++ b/kernel/events/uprobes.c
@@ -37,6 +37,7 @@
#include <linux/percpu-rwsem.h>
#include <linux/task_work.h>
#include <linux/shmem_fs.h>
+#include <linux/kprobes.h>
#include <linux/uprobes.h>
@@ -1997,6 +1998,7 @@ int uprobe_pre_sstep_notifier(struct pt_regs *regs)
set_thread_flag(TIF_UPROBE);
return 1;
}
+NOKPROBE_SYMBOL(uprobe_pre_sstep_notifier);
/*
* uprobe_post_sstep_notifier gets called in interrupt context as part of notifier
@@ -2014,6 +2016,7 @@ int uprobe_post_sstep_notifier(struct pt_regs *regs)
set_thread_flag(TIF_UPROBE);
return 1;
}
+NOKPROBE_SYMBOL(uprobe_post_sstep_notifier);
static struct notifier_block uprobe_exception_nb = {
.notifier_call = arch_uprobe_exception_notify,
--
2.5.5
Powered by blists - more mailing lists