diff options
author | Srinivasa Ds <srinivasa@in.ibm.com> | 2008-04-28 02:14:26 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-04-28 08:58:32 -0700 |
commit | 3d8d996e0ca5b4093203d3f050b0f70b5c949ae8 (patch) | |
tree | 2b19d3a47bf723c3bf6ff7c8a0d90078feaee08c /include/linux/kprobes.h | |
parent | 0341a4d0fdd2a0a3d9e2bb3a9afef9f8292c8502 (diff) | |
download | op-kernel-dev-3d8d996e0ca5b4093203d3f050b0f70b5c949ae8.zip op-kernel-dev-3d8d996e0ca5b4093203d3f050b0f70b5c949ae8.tar.gz |
kprobes: prevent probing of preempt_schedule()
Prohibit users from probing preempt_schedule(). One way of prohibiting the
user from probing functions is by marking such functions with __kprobes. But
this method doesn't work for those functions, which are already marked to
different section like preempt_schedule() (belongs to __sched section). So we
use blacklist approach to refuse user from probing these functions.
In blacklist approach we populate the blacklisted function's starting address
and its size in kprobe_blacklist structure. Then we verify the user specified
address against start and end of the blacklisted function. So any attempt to
register probe on blacklisted functions will be rejected.
[akpm@linux-foundation.org: build fix]
[akpm@linux-foundation.org: coding-style fixes]
Signed-off-by: Srinivasa DS <srinivasa@in.ibm.com>
Signed-off-by: Ananth N Mavinakayanahalli <ananth@in.ibm.com>
Signed-off-by: Jim Keniston <jkenisto@us.ibm.com>
Cc: Dave Hansen <haveblue@us.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'include/linux/kprobes.h')
-rw-r--r-- | include/linux/kprobes.h | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/include/linux/kprobes.h b/include/linux/kprobes.h index 0f28486..cd507ab 100644 --- a/include/linux/kprobes.h +++ b/include/linux/kprobes.h @@ -173,6 +173,13 @@ struct kretprobe_blackpoint { const char *name; void *addr; }; + +struct kprobe_blackpoint { + const char *name; + unsigned long start_addr; + unsigned long range; +}; + extern struct kretprobe_blackpoint kretprobe_blacklist[]; static inline void kretprobe_assert(struct kretprobe_instance *ri, |