From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759301Ab3K1Slw (ORCPT ); Thu, 28 Nov 2013 13:41:52 -0500 Received: from mx1.redhat.com ([209.132.183.28]:12975 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757220Ab3K1Sls (ORCPT ); Thu, 28 Nov 2013 13:41:48 -0500 Date: Thu, 28 Nov 2013 19:41:42 +0100 From: Oleg Nesterov To: David Long Cc: linux-arm-kernel@lists.infradead.org, Russell King , Rabin Vincent , "Jon Medhurst (Tixy)" , Srikar Dronamraju , Ingo Molnar , Masami Hiramatsu , Ananth N Mavinakayanahalli , Anil S Keshavamurthy , davem@davemloft.net, Peter Zijlstra , Paul Mackerras , Arnaldo Carvalho de Melo , linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 01/15] uprobes: allow ignoring of probe hits Message-ID: <20131128184142.GA21889@redhat.com> References: <1385520814-10663-1-git-send-email-dave.long@linaro.org> <1385520814-10663-2-git-send-email-dave.long@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1385520814-10663-2-git-send-email-dave.long@linaro.org> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/26, David Long wrote: > > From: "David A. Long" > > Allow arches to decided to ignore a probe hit. ARM will use this to > only call handlers if the conditions to execute a conditionally executed > instruction are satisfied. > > Upleveled for v3.12-rc5. > > Signed-off-by: David A. Long Acked-by: Oleg Nesterov > --- > include/linux/uprobes.h | 1 + > kernel/events/uprobes.c | 9 +++++++++ > 2 files changed, 10 insertions(+) > > diff --git a/include/linux/uprobes.h b/include/linux/uprobes.h > index 319eae7..197a36e 100644 > --- a/include/linux/uprobes.h > +++ b/include/linux/uprobes.h > @@ -134,6 +134,7 @@ extern bool arch_uprobe_xol_was_trapped(struct task_struct *tsk); > extern int arch_uprobe_exception_notify(struct notifier_block *self, unsigned long val, void *data); > extern void arch_uprobe_abort_xol(struct arch_uprobe *aup, struct pt_regs *regs); > extern unsigned long arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr, struct pt_regs *regs); > +extern bool __weak arch_uprobe_ignore(struct arch_uprobe *aup, struct pt_regs *regs); > #else /* !CONFIG_UPROBES */ > struct uprobes_state { > }; > diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c > index 24b7d6c..4eec7ce 100644 > --- a/kernel/events/uprobes.c > +++ b/kernel/events/uprobes.c > @@ -1778,6 +1778,11 @@ static bool handle_trampoline(struct pt_regs *regs) > return true; > } > > +bool __weak arch_uprobe_ignore(struct arch_uprobe *aup, struct pt_regs *regs) > +{ > + return false; > +} > + > /* > * Run handler and ask thread to singlestep. > * Ensure all non-fatal signals cannot interrupt thread while it singlesteps. > @@ -1828,7 +1833,11 @@ static void handle_swbp(struct pt_regs *regs) > if (unlikely(!test_bit(UPROBE_COPY_INSN, &uprobe->flags))) > goto out; > > + if (arch_uprobe_ignore(&uprobe->arch, regs)) > + goto out; > + > handler_chain(uprobe, regs); > + > if (can_skip_sstep(uprobe, regs)) > goto out; > > -- > 1.8.1.2 >