Commit 0498b635 authored by Ananth N Mavinakayanahalli's avatar Ananth N Mavinakayanahalli Committed by Linus Torvalds

[PATCH] kprobes: fix build breakage

The following patch (against 2.6.15-rc5-mm3) fixes a kprobes build break
due to changes introduced in the kprobe locking in 2.6.15-rc5-mm3.  In
addition, the patch reverts back the open-coding of kprobe_mutex.
Signed-off-by: default avatarAnanth N Mavinakayanahalli <ananth@in.ibm.com>
Acked-by: default avatarAnil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
parent e597c298
...@@ -80,11 +80,11 @@ void __kprobes arch_disarm_kprobe(struct kprobe *p) ...@@ -80,11 +80,11 @@ void __kprobes arch_disarm_kprobe(struct kprobe *p)
(unsigned long) p->addr + sizeof(kprobe_opcode_t)); (unsigned long) p->addr + sizeof(kprobe_opcode_t));
} }
void __kprobes arch_remove_kprobe(struct kprobe *p, struct semaphore *s) void __kprobes arch_remove_kprobe(struct kprobe *p)
{ {
down(s); down(&kprobe_mutex);
free_insn_slot(p->ainsn.insn); free_insn_slot(p->ainsn.insn);
up(s); up(&kprobe_mutex);
} }
static inline void prepare_singlestep(struct kprobe *p, struct pt_regs *regs) static inline void prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
......
...@@ -220,11 +220,11 @@ void __kprobes arch_disarm_kprobe(struct kprobe *p) ...@@ -220,11 +220,11 @@ void __kprobes arch_disarm_kprobe(struct kprobe *p)
(unsigned long) p->addr + sizeof(kprobe_opcode_t)); (unsigned long) p->addr + sizeof(kprobe_opcode_t));
} }
void __kprobes arch_remove_kprobe(struct kprobe *p, struct semaphore *s) void __kprobes arch_remove_kprobe(struct kprobe *p)
{ {
down(s); down(&kprobe_mutex);
free_insn_slot(p->ainsn.insn); free_insn_slot(p->ainsn.insn);
up(s); up(&kprobe_mutex);
} }
static inline void save_previous_kprobe(struct kprobe_ctlblk *kcb) static inline void save_previous_kprobe(struct kprobe_ctlblk *kcb)
......
...@@ -40,7 +40,7 @@ typedef u8 kprobe_opcode_t; ...@@ -40,7 +40,7 @@ typedef u8 kprobe_opcode_t;
#define JPROBE_ENTRY(pentry) (kprobe_opcode_t *)pentry #define JPROBE_ENTRY(pentry) (kprobe_opcode_t *)pentry
#define ARCH_SUPPORTS_KRETPROBES #define ARCH_SUPPORTS_KRETPROBES
#define arch_remove_kprobe(p, s) do { } while(0) #define arch_remove_kprobe(p) do {} while (0)
void kretprobe_trampoline(void); void kretprobe_trampoline(void);
......
...@@ -89,7 +89,7 @@ struct kprobe_ctlblk { ...@@ -89,7 +89,7 @@ struct kprobe_ctlblk {
#define IP_RELATIVE_PREDICT_OPCODE (7) #define IP_RELATIVE_PREDICT_OPCODE (7)
#define LONG_BRANCH_OPCODE (0xC) #define LONG_BRANCH_OPCODE (0xC)
#define LONG_CALL_OPCODE (0xD) #define LONG_CALL_OPCODE (0xD)
#define arch_remove_kprobe(p, s) do { } while(0) #define arch_remove_kprobe(p) do {} while (0)
typedef struct kprobe_opcode { typedef struct kprobe_opcode {
bundle_t bundle; bundle_t bundle;
......
...@@ -33,6 +33,7 @@ ...@@ -33,6 +33,7 @@
#define __ARCH_WANT_KPROBES_INSN_SLOT #define __ARCH_WANT_KPROBES_INSN_SLOT
struct pt_regs; struct pt_regs;
struct kprobe;
typedef unsigned int kprobe_opcode_t; typedef unsigned int kprobe_opcode_t;
#define BREAKPOINT_INSTRUCTION 0x7fe00008 /* trap */ #define BREAKPOINT_INSTRUCTION 0x7fe00008 /* trap */
...@@ -50,7 +51,7 @@ typedef unsigned int kprobe_opcode_t; ...@@ -50,7 +51,7 @@ typedef unsigned int kprobe_opcode_t;
#define ARCH_SUPPORTS_KRETPROBES #define ARCH_SUPPORTS_KRETPROBES
void kretprobe_trampoline(void); void kretprobe_trampoline(void);
extern void arch_remove_kprobe(struct kprobe *p, struct semaphore *s); extern void arch_remove_kprobe(struct kprobe *p);
/* Architecture specific copy of original instruction */ /* Architecture specific copy of original instruction */
struct arch_specific_insn { struct arch_specific_insn {
......
...@@ -12,7 +12,7 @@ typedef u32 kprobe_opcode_t; ...@@ -12,7 +12,7 @@ typedef u32 kprobe_opcode_t;
#define MAX_INSN_SIZE 2 #define MAX_INSN_SIZE 2
#define JPROBE_ENTRY(pentry) (kprobe_opcode_t *)pentry #define JPROBE_ENTRY(pentry) (kprobe_opcode_t *)pentry
#define arch_remove_kprobe(p, s) do { } while(0) #define arch_remove_kprobe(p) do {} while (0)
/* Architecture specific copy of original instruction*/ /* Architecture specific copy of original instruction*/
struct arch_specific_insn { struct arch_specific_insn {
......
...@@ -30,6 +30,7 @@ ...@@ -30,6 +30,7 @@
#define __ARCH_WANT_KPROBES_INSN_SLOT #define __ARCH_WANT_KPROBES_INSN_SLOT
struct pt_regs; struct pt_regs;
struct kprobe;
typedef u8 kprobe_opcode_t; typedef u8 kprobe_opcode_t;
#define BREAKPOINT_INSTRUCTION 0xcc #define BREAKPOINT_INSTRUCTION 0xcc
...@@ -44,6 +45,7 @@ typedef u8 kprobe_opcode_t; ...@@ -44,6 +45,7 @@ typedef u8 kprobe_opcode_t;
#define ARCH_SUPPORTS_KRETPROBES #define ARCH_SUPPORTS_KRETPROBES
void kretprobe_trampoline(void); void kretprobe_trampoline(void);
extern void arch_remove_kprobe(struct kprobe *p);
/* Architecture specific copy of original instruction*/ /* Architecture specific copy of original instruction*/
struct arch_specific_insn { struct arch_specific_insn {
...@@ -78,7 +80,6 @@ static inline void restore_interrupts(struct pt_regs *regs) ...@@ -78,7 +80,6 @@ static inline void restore_interrupts(struct pt_regs *regs)
local_irq_enable(); local_irq_enable();
} }
extern void arch_remove_kprobe(struct kprobe *p, struct semaphore *s);
extern int post_kprobe_handler(struct pt_regs *regs); extern int post_kprobe_handler(struct pt_regs *regs);
extern int kprobe_fault_handler(struct pt_regs *regs, int trapnr); extern int kprobe_fault_handler(struct pt_regs *regs, int trapnr);
extern int kprobe_handler(struct pt_regs *regs); extern int kprobe_handler(struct pt_regs *regs);
......
...@@ -149,6 +149,7 @@ struct kretprobe_instance { ...@@ -149,6 +149,7 @@ struct kretprobe_instance {
}; };
extern spinlock_t kretprobe_lock; extern spinlock_t kretprobe_lock;
extern struct semaphore kprobe_mutex;
extern int arch_prepare_kprobe(struct kprobe *p); extern int arch_prepare_kprobe(struct kprobe *p);
extern void arch_arm_kprobe(struct kprobe *p); extern void arch_arm_kprobe(struct kprobe *p);
extern void arch_disarm_kprobe(struct kprobe *p); extern void arch_disarm_kprobe(struct kprobe *p);
......
...@@ -48,7 +48,7 @@ ...@@ -48,7 +48,7 @@
static struct hlist_head kprobe_table[KPROBE_TABLE_SIZE]; static struct hlist_head kprobe_table[KPROBE_TABLE_SIZE];
static struct hlist_head kretprobe_inst_table[KPROBE_TABLE_SIZE]; static struct hlist_head kretprobe_inst_table[KPROBE_TABLE_SIZE];
static DECLARE_MUTEX(kprobe_mutex); /* Protects kprobe_table */ DECLARE_MUTEX(kprobe_mutex); /* Protects kprobe_table */
DEFINE_SPINLOCK(kretprobe_lock); /* Protects kretprobe_inst_table */ DEFINE_SPINLOCK(kretprobe_lock); /* Protects kretprobe_inst_table */
static DEFINE_PER_CPU(struct kprobe *, kprobe_instance) = NULL; static DEFINE_PER_CPU(struct kprobe *, kprobe_instance) = NULL;
...@@ -532,7 +532,7 @@ valid_p: ...@@ -532,7 +532,7 @@ valid_p:
list_del_rcu(&p->list); list_del_rcu(&p->list);
kfree(old_p); kfree(old_p);
} }
arch_remove_kprobe(p, &kprobe_mutex); arch_remove_kprobe(p);
} }
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment