Commit 8e114405 authored by Masami Hiramatsu's avatar Masami Hiramatsu Committed by Linus Torvalds

kprobes: indirectly call kprobe_target

Call kprobe_target indirectly.  This prevents gcc to unroll a noinline
function in caller function.

I ported patches which had been discussed on
http://sources.redhat.com/bugzilla/show_bug.cgi?id=3542Signed-off-by: default avatarMasami Hiramatsu <mhiramat@redhat.com>
Acked-by: default avatarAnanth N Mavinakayanahalli <ananth@in.ibm.com>
Cc: Jim Keniston <jkenisto@us.ibm.com>
Cc: David Miller <davem@davemloft.net>
Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent bc2f7015
...@@ -22,21 +22,10 @@ ...@@ -22,21 +22,10 @@
static u32 rand1, preh_val, posth_val, jph_val; static u32 rand1, preh_val, posth_val, jph_val;
static int errors, handler_errors, num_tests; static int errors, handler_errors, num_tests;
static u32 (*target)(u32 value);
static noinline u32 kprobe_target(u32 value) static noinline u32 kprobe_target(u32 value)
{ {
/*
* gcc ignores noinline on some architectures unless we stuff
* sufficient lard into the function. The get_kprobe() here is
* just for that.
*
* NOTE: We aren't concerned about the correctness of get_kprobe()
* here; hence, this call is neither under !preempt nor with the
* kprobe_mutex held. This is fine(tm)
*/
if (get_kprobe((void *)0xdeadbeef))
printk(KERN_INFO "Kprobe smoke test: probe on 0xdeadbeef!\n");
return (value / div_factor); return (value / div_factor);
} }
...@@ -74,7 +63,7 @@ static int test_kprobe(void) ...@@ -74,7 +63,7 @@ static int test_kprobe(void)
return ret; return ret;
} }
ret = kprobe_target(rand1); ret = target(rand1);
unregister_kprobe(&kp); unregister_kprobe(&kp);
if (preh_val == 0) { if (preh_val == 0) {
...@@ -121,7 +110,7 @@ static int test_jprobe(void) ...@@ -121,7 +110,7 @@ static int test_jprobe(void)
return ret; return ret;
} }
ret = kprobe_target(rand1); ret = target(rand1);
unregister_jprobe(&jp); unregister_jprobe(&jp);
if (jph_val == 0) { if (jph_val == 0) {
printk(KERN_ERR "Kprobe smoke test failed: " printk(KERN_ERR "Kprobe smoke test failed: "
...@@ -177,7 +166,7 @@ static int test_kretprobe(void) ...@@ -177,7 +166,7 @@ static int test_kretprobe(void)
return ret; return ret;
} }
ret = kprobe_target(rand1); ret = target(rand1);
unregister_kretprobe(&rp); unregister_kretprobe(&rp);
if (krph_val != rand1) { if (krph_val != rand1) {
printk(KERN_ERR "Kprobe smoke test failed: " printk(KERN_ERR "Kprobe smoke test failed: "
...@@ -193,6 +182,8 @@ int init_test_probes(void) ...@@ -193,6 +182,8 @@ int init_test_probes(void)
{ {
int ret; int ret;
target = kprobe_target;
do { do {
rand1 = random32(); rand1 = random32();
} while (rand1 <= div_factor); } while (rand1 <= div_factor);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment