Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp241654ybg; Mon, 8 Jun 2020 22:31:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZw4GDR0uzGUiFdB+Dk84qJrJxeZgYtqwe56LODmYuHu+wzub/Mw+Vak+VcAFi7pNyqKQ7 X-Received: by 2002:a17:906:2b81:: with SMTP id m1mr23081655ejg.488.1591680674493; Mon, 08 Jun 2020 22:31:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591680674; cv=none; d=google.com; s=arc-20160816; b=KWgkYmTFs2u7VV449g4MFcG607U3BYWd3GIMs9dXq+bSJi/fRWqQ44jyIBjqobNxl6 Np+SnLqIGonc1Om2lmz4jXiO+PmkApe1psbWpO3V/KcDtVVRPGyzDIP01PxLjJZkzA2O 5eWWsWr+OzF/O7zoeACztTxBOK7Fued8D3cBlgzkERhCcra5w1wjV5lP+dTFSdBDgtTV zRkCKpC3SI7KvBPFvpXEofh5/bZzaYHnBeBqYG0XlYeXATmijX4tzVxm4Oks3cdVmYv1 ies13bVYop0bl0Tj8Cwi1IbhKmfIhORwsGngd607IsD277uH9YBq4XZOLReGyBnqTW8g EmNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:message-id:subject:references :in-reply-to:cc:to:from; bh=nlV3hT2QpNeRwOeEnnQFtRroKwpK8bcfOTLKDlU8XFs=; b=wKv5yOPGIE4SACyI+IDd+kcV4girYY+i/m12XdDgdNmIjEu8cZDdfyr/ktJriWCJpv +acCdy5xAJa3XCLjC0khRMbTckitb4ekjMY7aeGoDzWmXFswubF4kLCnybZP102lghaf JqCUtI7sCrW48IfYPRCnfRFoElTt/w7oBhibSBwHAeMkvTEdCIos2cLsHZ3wPXUaWdXR nr+hAnHrGeMJup2/hm4V1WmrXCH5uJifU3ztR/14rTcc7ixBqx1SLedmmjLxhxUsYvGm k/ezWLWpqV7hySSEk3y0ZOtCiLbrtNMZ3L2KZFG1rbyb1fQbbxRdcg4jR3mW1qbobrG8 HoWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x25si10768230ejs.242.2020.06.08.22.30.52; Mon, 08 Jun 2020 22:31:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727844AbgFIF24 (ORCPT + 99 others); Tue, 9 Jun 2020 01:28:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727775AbgFIF2p (ORCPT ); Tue, 9 Jun 2020 01:28:45 -0400 Received: from ozlabs.org (ozlabs.org [IPv6:2401:3900:2:1::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 393E1C03E969 for ; Mon, 8 Jun 2020 22:28:45 -0700 (PDT) Received: by ozlabs.org (Postfix, from userid 1034) id 49gzDq4Mzpz9sTY; Tue, 9 Jun 2020 15:28:42 +1000 (AEST) From: Michael Ellerman To: Christophe Leroy , Paul Mackerras , Benjamin Herrenschmidt , Michael Ellerman , naveen.n.rao@linux.vnet.ibm.com Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org In-Reply-To: <1ae02b6637b87fc5aaa1d5012c3e2cb30e62b4a3.1585670437.git.christophe.leroy@c-s.fr> References: <1ae02b6637b87fc5aaa1d5012c3e2cb30e62b4a3.1585670437.git.christophe.leroy@c-s.fr> Subject: Re: [PATCH v2 01/12] powerpc/52xx: Blacklist functions running with MMU disabled for kprobe Message-Id: <159168034995.1381411.12691438266986038237.b4-ty@ellerman.id.au> Date: Tue, 9 Jun 2020 15:28:42 +1000 (AEST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 31 Mar 2020 16:03:36 +0000 (UTC), Christophe Leroy wrote: > kprobe does not handle events happening in real mode, all > functions running with MMU disabled have to be blacklisted. Applied to powerpc/next. [01/12] powerpc/52xx: Blacklist functions running with MMU disabled for kprobe https://git.kernel.org/powerpc/c/e83f01fdb9143a4f90b17fbf7d8b8b21efb2f968 [02/12] powerpc/82xx: Blacklist pq2_restart() for kprobe https://git.kernel.org/powerpc/c/1740f15a99d30a5e2710b2b0754e65fc5ba68d1d [03/12] powerpc/83xx: Blacklist mpc83xx_deep_resume() for kprobe https://git.kernel.org/powerpc/c/7aa85127b1a170694b042cbc35a07afe3904173e [04/12] powerpc/powermac: Blacklist functions running with MMU disabled for kprobe https://git.kernel.org/powerpc/c/32a820670fa00419375a964ca8bc569e1499b90d [05/12] powerpc/mem: Blacklist flush_dcache_icache_phys() for kprobe https://git.kernel.org/powerpc/c/a64371b5d4fb37199dcd04cb7bf0132894018e33 [06/12] powerpc/32s: Make local symbols non visible in hash_low. https://git.kernel.org/powerpc/c/f892c21d2efb3b86ecbf8f5a95ea4abeedcc91b0 [07/12] powerpc/32s: Blacklist functions running with MMU disabled for kprobe https://git.kernel.org/powerpc/c/e6209318d63e2774c5ab214b14b948079e040064 [08/12] powerpc/rtas: Remove machine_check_in_rtas() https://git.kernel.org/powerpc/c/32746dfe4cf37f4077929601e8877a7fd02676e8 [09/12] powerpc/32: Blacklist functions running with MMU disabled for kprobe https://git.kernel.org/powerpc/c/5f32e8361cba8c58c4f272a389296f489ecc2823 [10/12] powerpc/entry32: Blacklist exception entry points for kprobe. https://git.kernel.org/powerpc/c/a616c442119f2ea5641e6abc215d7255b73b982b [11/12] powerpc/entry32: Blacklist syscall exit points for kprobe. https://git.kernel.org/powerpc/c/7cdf4401388572f720403a7038a178a4b30ac14c [12/12] powerpc/entry32: Blacklist exception exit points for kprobe. https://git.kernel.org/powerpc/c/e51c3e13709fe55d4d0eb50ba435bc53a64152bf cheers