Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756811Ab2B1KAe (ORCPT ); Tue, 28 Feb 2012 05:00:34 -0500 Received: from mx2.mail.elte.hu ([157.181.151.9]:56488 "EHLO mx2.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754175Ab2B1KAb (ORCPT ); Tue, 28 Feb 2012 05:00:31 -0500 Date: Tue, 28 Feb 2012 10:59:53 +0100 From: Ingo Molnar To: Masami Hiramatsu Cc: linux-kernel@vger.kernel.org, yrl.pp-manager.tt@hitachi.com, systemtap@sourceware.org, anderson@redhat.com, Thomas Gleixner , "H. Peter Anvin" , Ananth N Mavinakayanahalli Subject: Re: Re: Re: [PATCH v3 -tip] [BUGFIX] x86/kprobes: Fix to recover instructions on optimized path Message-ID: <20120228095953.GA17149@elte.hu> References: <20120223083703.GA26781@elte.hu> <20120224095412.8462.55698.stgit@localhost.localdomain> <20120227093421.GA10078@elte.hu> <4F4C4182.1040706@hitachi.com> <20120228084828.GK21106@elte.hu> <4F4CA3BC.7050909@hitachi.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4F4CA3BC.7050909@hitachi.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-ELTE-SpamScore: -2.0 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-2.0 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.3.1 -2.0 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2157 Lines: 61 * Masami Hiramatsu wrote: > (2012/02/28 17:48), Ingo Molnar wrote: > > > > * Masami Hiramatsu wrote: > > > >> (2012/02/27 18:34), Ingo Molnar wrote: > >>> > >>> * Masami Hiramatsu wrote: > >>> > >>>> + > >>>> +#ifdef CONFIG_OPTPROBES > >>>> +static unsigned long __recover_optprobed_insn(struct kprobe *kp, > >>>> + kprobe_opcode_t *buf, > >>>> + unsigned long addr) > >>>> +{ > >>>> + long offs = addr - (unsigned long)kp->addr - 1; > >>>> + struct optimized_kprobe *op = container_of(kp, struct optimized_kprobe, kp); > >>>> + > >>>> + /* > >>>> + * If the kprobe can be optimized, original bytes which can be > >>>> + * overwritten by jump destination address. In this case, original > >>>> + * bytes must be recovered from op->optinsn.copied_insn buffer. > >>>> + */ > >>>> + memcpy(buf, (void *)addr, MAX_INSN_SIZE * sizeof(kprobe_opcode_t)); > >>>> + if (addr == (unsigned long)kp->addr) { > >>>> + buf[0] = kp->opcode; > >>>> + memcpy(buf + 1, op->optinsn.copied_insn, RELATIVE_ADDR_SIZE); > >>>> + } else > >>>> + memcpy(buf, op->optinsn.copied_insn + offs, RELATIVE_ADDR_SIZE - offs); > >>>> + > >>>> + return (unsigned long)buf; > >>>> +} > >>>> +#endif > >>> > >>> Why not stick this into a new kprobes-opt.c file? > >> > >> Would you mean that I should split all optprobe stuffs into > >> new file? > > > > Yeah, that would be sensible I think - and it might help avoid > > similar complications in the future. > > > > Could (and probably should) be done in a separate patch - to > > keep the bits that you already fixed and tested intact. > > OK, I'll make a separate patch. Could be done on top of your existing patch, to keep things simpler for you - a split-up patch done before your fix would create a lot of conflicts in the fix patch. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/