[PATCH -tip 0/2] kprobes: fix bugs by updating blacklist

From: Masami Hiramatsu
Date: Wed Oct 30 2013 - 06:53:46 EST


Recently I've found that putting probes on some functions
could lock or reboot the kernel. These two patches fix
those bugs by prohibiting probing such functions by
adding those to blacklist(kprobes.text).

In both cases, those functions are related to int3 handling
execution path. One is related to irqoff-tracer and the other
is related to notifier debug option.

Thank you,

---

Masami Hiramatsu (2):
[BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
[BUGFIX] kprobes: Prohibit probing on func_ptr_is_kernel_text


arch/x86/kernel/cpu/common.c | 7 ++++---
kernel/extable.c | 3 ++-
2 files changed, 6 insertions(+), 4 deletions(-)

--
Masami HIRAMATSU
IT Management Research Dept. Linux Technology Center
Hitachi, Ltd., Yokohama Research Laboratory
E-mail: masami.hiramatsu.pt@xxxxxxxxxxx
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/