powerpc/kprobes: Blacklist emulate_update_regs() from kprobes
authorNaveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Mon, 23 Oct 2017 16:37:40 +0000 (22:07 +0530)
committerMichael Ellerman <mpe@ellerman.id.au>
Sun, 12 Nov 2017 12:51:42 +0000 (23:51 +1100)
Commit 3cdfcbfd32b9d ("powerpc: Change analyse_instr so it doesn't
modify *regs") introduced emulate_update_regs() to perform part of what
emulate_step() was doing earlier. However, this function was not added
to the kprobes blacklist. Add it so as to prevent it from being probed.

Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Acked-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
arch/powerpc/lib/sstep.c

index 8c3955e183d430d56d259f8d8272c2b2b2b84d8b..70274b7b4773a67be2bf3794e95a1976471b7b19 100644 (file)
@@ -2717,6 +2717,7 @@ void emulate_update_regs(struct pt_regs *regs, struct instruction_op *op)
        }
        regs->nip = next_pc;
 }
+NOKPROBE_SYMBOL(emulate_update_regs);
 
 /*
  * Emulate a previously-analysed load or store instruction.