Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752436Ab1DSN3O (ORCPT ); Tue, 19 Apr 2011 09:29:14 -0400 Received: from hrndva-omtalb.mail.rr.com ([71.74.56.122]:46354 "EHLO hrndva-omtalb.mail.rr.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751361Ab1DSN3N (ORCPT ); Tue, 19 Apr 2011 09:29:13 -0400 X-Authority-Analysis: v=1.1 cv=aqMe+0lCtaYvy4h0jyaoPGyq+DPF+P6rPG2xbekoY9Q= c=1 sm=0 a=1QQH6BUniP4A:10 a=5SG0PmZfjMsA:10 a=Q9fys5e9bTEA:10 a=OPBmh+XkhLl+Enan7BmTLg==:17 a=owHtBCBMGy2idkNl1-sA:9 a=5cPSLGuINJWaWo-Cx0UA:7 a=PUjeQqilurYA:10 a=OPBmh+XkhLl+Enan7BmTLg==:117 X-Cloudmark-Score: 0 X-Originating-IP: 67.242.120.143 Subject: Re: [PATCH v3 2.6.39-rc1-tip 7/26] 7: x86: analyze instruction and determine fixups. From: Steven Rostedt To: Srikar Dronamraju Cc: Peter Zijlstra , Ingo Molnar , Linux-mm , Arnaldo Carvalho de Melo , Linus Torvalds , Andi Kleen , Christoph Hellwig , Jonathan Corbet , Thomas Gleixner , Masami Hiramatsu , Oleg Nesterov , LKML , SystemTap , Jim Keniston , Roland McGrath , Ananth N Mavinakayanahalli , Andrew Morton In-Reply-To: <20110401143348.15455.68644.sendpatchset@localhost6.localdomain6> References: <20110401143223.15455.19844.sendpatchset@localhost6.localdomain6> <20110401143348.15455.68644.sendpatchset@localhost6.localdomain6> Content-Type: text/plain; charset="ISO-8859-15" Date: Tue, 19 Apr 2011 09:29:11 -0400 Message-ID: <1303219751.7181.101.camel@gandalf.stny.rr.com> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1140 Lines: 36 On Fri, 2011-04-01 at 20:03 +0530, Srikar Dronamraju wrote: > + > +static void report_bad_prefix(void) > +{ > + printk(KERN_ERR "uprobes does not currently support probing " > + "instructions with any of the following prefixes: " > + "cs:, ds:, es:, ss:, lock:\n"); > +} > + > +static void report_bad_1byte_opcode(int mode, uprobe_opcode_t op) > +{ > + printk(KERN_ERR "In %d-bit apps, " > + "uprobes does not currently support probing " > + "instructions whose first byte is 0x%2.2x\n", mode, op); > +} > + > +static void report_bad_2byte_opcode(uprobe_opcode_t op) > +{ > + printk(KERN_ERR "uprobes does not currently support probing " > + "instructions with the 2-byte opcode 0x0f 0x%2.2x\n", op); > +} Should these really be KERN_ERR, or is KERN_WARNING a better fit? Also, can a non-privileged user cause these printks to spam the console and cause a DoS to the system? -- Steve -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/