[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <tip-fe6e65615415987629a2dda583b4495677d8c388@git.kernel.org>
Date: Mon, 17 Dec 2018 10:19:30 -0800
From: tip-bot for Masami Hiramatsu <tipbot@...or.com>
To: linux-tip-commits@...r.kernel.org
Cc: mingo@...nel.org, linux-kernel@...r.kernel.org,
mhiramat@...nel.org, naveen.n.rao@...ux.vnet.ibm.com,
peterz@...radead.org, anil.s.keshavamurthy@...el.com, yhs@...com,
bp@...en8.de, torvalds@...ux-foundation.org, tglx@...utronix.de,
righi.andrea@...il.com, hpa@...or.com, davem@...emloft.net,
luto@...nel.org
Subject: [tip:perf/core] kprobes/x86: Show x86-64 specific blacklisted
symbols correctly
Commit-ID: fe6e65615415987629a2dda583b4495677d8c388
Gitweb: https://git.kernel.org/tip/fe6e65615415987629a2dda583b4495677d8c388
Author: Masami Hiramatsu <mhiramat@...nel.org>
AuthorDate: Mon, 17 Dec 2018 17:21:24 +0900
Committer: Ingo Molnar <mingo@...nel.org>
CommitDate: Mon, 17 Dec 2018 17:48:39 +0100
kprobes/x86: Show x86-64 specific blacklisted symbols correctly
Show x86-64 specific blacklisted symbols in debugfs.
Since x86-64 prohibits probing on symbols which are in
entry text, those should be shown.
Tested-by: Andrea Righi <righi.andrea@...il.com>
Signed-off-by: Masami Hiramatsu <mhiramat@...nel.org>
Cc: Andy Lutomirski <luto@...nel.org>
Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@...el.com>
Cc: Borislav Petkov <bp@...en8.de>
Cc: David S. Miller <davem@...emloft.net>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Naveen N. Rao <naveen.n.rao@...ux.vnet.ibm.com>
Cc: Peter Zijlstra <peterz@...radead.org>
Cc: Thomas Gleixner <tglx@...utronix.de>
Cc: Yonghong Song <yhs@...com>
Link: http://lkml.kernel.org/r/154503488425.26176.17136784384033608516.stgit@devbox
Signed-off-by: Ingo Molnar <mingo@...nel.org>
---
arch/x86/kernel/kprobes/core.c | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
index c33b06f5faa4..6011a4a90f0a 100644
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/core.c
@@ -1034,6 +1034,12 @@ bool arch_within_kprobe_blacklist(unsigned long addr)
addr < (unsigned long)__entry_text_end);
}
+int __init arch_populate_kprobe_blacklist(void)
+{
+ return kprobe_add_area_blacklist((unsigned long)__entry_text_start,
+ (unsigned long)__entry_text_end);
+}
+
int __init arch_init_kprobes(void)
{
return 0;
Powered by blists - more mailing lists