diff options
| author | Masami Hiramatsu <[email protected]> | 2019-02-12 16:13:12 +0000 |
|---|---|---|
| committer | Ingo Molnar <[email protected]> | 2019-02-13 07:16:40 +0000 |
| commit | 6143c6fb1e8f9bde9c434038f7548a19d36b55e7 (patch) | |
| tree | 20b9b8aa8d376e83e4e168807a2fd5e82af59cca /tools/perf/scripts/python/mem-phys-addr.py | |
| parent | x86/kprobes: Prohibit probing on IRQ handlers directly (diff) | |
| download | kernel-6143c6fb1e8f9bde9c434038f7548a19d36b55e7.tar.gz kernel-6143c6fb1e8f9bde9c434038f7548a19d36b55e7.zip | |
kprobes: Search non-suffixed symbol in blacklist
Newer GCC versions can generate some different instances of a function
with suffixed symbols if the function is optimized and only
has a part of that. (e.g. .constprop, .part etc.)
In this case, it is not enough to check the entry of kprobe
blacklist because it only records non-suffixed symbol address.
To fix this issue, search non-suffixed symbol in blacklist if
given address is within a symbol which has a suffix.
Note that this can cause false positive cases if a kprobe-safe
function is optimized to suffixed instance and has same name
symbol which is blacklisted.
But I would like to chose a fail-safe design for this issue.
Signed-off-by: Masami Hiramatsu <[email protected]>
Reviewed-by: Steven Rostedt (VMware) <[email protected]>
Cc: Alexander Shishkin <[email protected]>
Cc: Andrea Righi <[email protected]>
Cc: Arnaldo Carvalho de Melo <[email protected]>
Cc: Jiri Olsa <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: Mathieu Desnoyers <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Steven Rostedt <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Link: http://lkml.kernel.org/r/154998799234.31052.6136378903570418008.stgit@devbox
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/mem-phys-addr.py')
0 files changed, 0 insertions, 0 deletions
