diff options
author | Naveen N. Rao <[email protected]> | 2017-10-23 22:07:40 +0530 |
---|---|---|
committer | Michael Ellerman <[email protected]> | 2017-11-12 23:51:42 +1100 |
commit | 67ac0bfe29e9b4359012a8961c196baa813c707a (patch) | |
tree | 642837ee8cff30edda103fedacdc6e234b3fa7f3 | |
parent | f72180cc93a2c64d4efe0129fa2396ad78be80e3 (diff) |
powerpc/kprobes: Blacklist emulate_update_regs() from kprobes
Commit 3cdfcbfd32b9d ("powerpc: Change analyse_instr so it doesn't
modify *regs") introduced emulate_update_regs() to perform part of what
emulate_step() was doing earlier. However, this function was not added
to the kprobes blacklist. Add it so as to prevent it from being probed.
Signed-off-by: Naveen N. Rao <[email protected]>
Acked-by: Masami Hiramatsu <[email protected]>
Signed-off-by: Michael Ellerman <[email protected]>
-rw-r--r-- | arch/powerpc/lib/sstep.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/powerpc/lib/sstep.c b/arch/powerpc/lib/sstep.c index 8c3955e183d4..70274b7b4773 100644 --- a/arch/powerpc/lib/sstep.c +++ b/arch/powerpc/lib/sstep.c @@ -2717,6 +2717,7 @@ void emulate_update_regs(struct pt_regs *regs, struct instruction_op *op) } regs->nip = next_pc; } +NOKPROBE_SYMBOL(emulate_update_regs); /* * Emulate a previously-analysed load or store instruction. |