[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190722083216.16192-1-devel@etsukata.com>
Date: Mon, 22 Jul 2019 17:32:15 +0900
From: Eiichi Tsukata <devel@...ukata.com>
To: mhiramat@...nel.org
Cc: juri.lelli@...il.com, linux-kernel@...r.kernel.org,
mingo@...nel.org, peterz@...radead.org, rostedt@...dmis.org,
tglx@...utronix.de, torvalds@...ux-foundation.org,
williams@...hat.com, Eiichi Tsukata <devel@...ukata.com>
Subject: [PATCH 0/1] x86/stacktrace: Fix userstacktrace access_ok() WARNING in irq events
Hello
I also hit the same WARNING previously repored by Juri.
Hiramatsu san's patch looks good to me but I found that perf and
oprofile code do the similar thing by just directly calling
__range_not_ok().
perf: perf_callchain_user()@arch/x86/events/core.c
oprofile: dump_user_backtrace()@arch/x86/oprofile/backtrace.c
So for simplicity, I wrote a patch to fix the warning as other
codes do.
Ideally, we should merge these similar stacktrace codes(perf, ftrace,
oprofile) into one, but this time I made the minimum fix.
Eiichi Tsukata (1):
x86/stacktrace: Fix userstacktrace access_ok() WARNING in irq events
arch/x86/kernel/stacktrace.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
2.21.0
Powered by blists - more mailing lists