Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp762937ybl; Wed, 4 Dec 2019 10:26:11 -0800 (PST) X-Google-Smtp-Source: APXvYqyaKVKTSkboWYOAR7p6hIZDOLMXMcydJRXzo0Shq7sRHRDbwviYThCp3o1/+fu/k6rC6dVz X-Received: by 2002:aca:fd58:: with SMTP id b85mr3902212oii.106.1575483971099; Wed, 04 Dec 2019 10:26:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483971; cv=none; d=google.com; s=arc-20160816; b=t8nZ/zYXvK1v2ECrBxyHw0YuAO1kefsgzRFjVW+73HVosvzpMnuRkRBv8ykT1g62Lh IcDZfr3lUYKeAS4CWZUfuRLfj0PbQMJfOhxVxYFw286TtVjhpieaFYiIUlcTQy02DeBZ iV8SXFItWG/l4vmZye48BXxUZv5Hvuz/lRfSLzMaYJxSgNuaPXTgD5q2l+QmfPymDr92 nzlBJMhCxoc2txiekH/OQ9BYVYmTN+ZsvPpqu6gtgAX/TjZofx4+n1tsJTw5eJcosMGa MjOW2yu65uv0w+bGls6H/ch2ISVZ1dZwJTGhHrRrL9G12r1vJRko162DxxjwPtKNm82u TfSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4nofLd1WJe1kighB2LTDf3hdpOjpLW+FJiOcM23zg3Y=; b=ngbG071xpmys5e6jsliWHN2HicK6hldAfF5bjtk5B7yFb5rLRs78H+iOhRVta6rZez ir32wVCk3q/56mo2N1qO6Z+C9NIEcIkvnZL1InZdx/bKPw+VPY6K/nkbUsHAiFNrnrLs +CBormCKCXeu8P8wIZqtyXOHTKYcatDDE2IPROGlSANnQ61zZht7P+Ag1r6+cDNSEt0+ lUKAlQtXWPV2Y09YhVbXLrE9emvwsYHTxSew4eSyP8ZOYrNcRJ150p2/51bCo+aRUDEK HX1Z7/ksGfTAFsG5Yv2i/d7aQ11pi5CFxZbe9BqjooWjihQOYZn3X8DbZ6wYaR2LR4Ev 064g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aS4IYgy4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f17si3733919otq.96.2019.12.04.10.25.58; Wed, 04 Dec 2019 10:26:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aS4IYgy4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731068AbfLDSXy (ORCPT + 99 others); Wed, 4 Dec 2019 13:23:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:47132 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730036AbfLDSDZ (ORCPT ); Wed, 4 Dec 2019 13:03:25 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1504820675; Wed, 4 Dec 2019 18:03:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482604; bh=Ql9x8nBLRruSTrj/axpdo25m6wC+H80WPeR0h+hYPu4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aS4IYgy4Pkwf6wRbD7V3m1CKW0mDmuMnuJomaq3261RmCOTNetn/AWw2nFuzTdHho QLS73GmfDIwEQO1xBk3DXeWer4/wAJTtvbtmx+/2q5h4fRhV8+a/jkQwXAYeMYXfkr oBkwFqq7eicvCKBU3q0o1dqJ20DW9qIbu7SslAcA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrea Righi , Masami Hiramatsu , Boris Ostrovsky , Sasha Levin Subject: [PATCH 4.14 063/209] kprobes/x86/xen: blacklist non-attachable xen interrupt functions Date: Wed, 4 Dec 2019 18:54:35 +0100 Message-Id: <20191204175325.651022463@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrea Righi [ Upstream commit bf9445a33ae6ac2f0822d2f1ce1365408387d568 ] Blacklist symbols in Xen probe-prohibited areas, so that user can see these prohibited symbols in debugfs. See also: a50480cb6d61. Signed-off-by: Andrea Righi Acked-by: Masami Hiramatsu Signed-off-by: Boris Ostrovsky Signed-off-by: Sasha Levin --- arch/x86/xen/xen-asm_64.S | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/xen/xen-asm_64.S b/arch/x86/xen/xen-asm_64.S index 3a6feed76dfc1..a93d8a7cef26c 100644 --- a/arch/x86/xen/xen-asm_64.S +++ b/arch/x86/xen/xen-asm_64.S @@ -12,6 +12,7 @@ #include #include #include +#include #include @@ -24,6 +25,7 @@ ENTRY(xen_\name) pop %r11 jmp \name END(xen_\name) +_ASM_NOKPROBE(xen_\name) .endm xen_pv_trap divide_error -- 2.20.1