The patch titled kretprobe-booster update has been removed from the -mm tree. Its filename is kretprobe-booster-update.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ Subject: kretprobe-booster update From: Masami Hiramatsu <hiramatu@xxxxxxxxxxxxxxxxx> In the previous kretprobe-booster patch, I had a mistake about stack register. In this patch, the bug is fixed. Signed-off-by: Masami Hiramatsu <hiramatu@xxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- arch/i386/kernel/kprobes.c | 56 +++++++++++++++++++++-------------- 1 files changed, 35 insertions(+), 21 deletions(-) diff -puN arch/i386/kernel/kprobes.c~kretprobe-booster-update arch/i386/kernel/kprobes.c --- devel/arch/i386/kernel/kprobes.c~kretprobe-booster-update 2006-02-13 15:30:20.000000000 -0800 +++ devel-akpm/arch/i386/kernel/kprobes.c 2006-02-13 15:30:20.000000000 -0800 @@ -321,17 +321,44 @@ no_kprobe: * here. When a retprobed function returns, this probe is hit and * trampoline_probe_handler() runs, calling the kretprobe's handler. */ - void kretprobe_trampoline_holder(void) + void __kprobes kretprobe_trampoline_holder(void) { - asm volatile ( ".global kretprobe_trampoline\n" + asm volatile ( ".global kretprobe_trampoline\n" "kretprobe_trampoline: \n" - "nop\n"); - } + " pushf\n" + /* skip cs, eip, orig_eax, es, ds */ + " subl $20, %esp\n" + " pushl %eax\n" + " pushl %ebp\n" + " pushl %edi\n" + " pushl %esi\n" + " pushl %edx\n" + " pushl %ecx\n" + " pushl %ebx\n" + " movl %esp, %eax\n" + " call trampoline_handler\n" + /* move eflags to cs */ + " movl 48(%esp), %edx\n" + " movl %edx, 44(%esp)\n" + /* save true return address on eflags */ + " movl %eax, 48(%esp)\n" + " popl %ebx\n" + " popl %ecx\n" + " popl %edx\n" + " popl %esi\n" + " popl %edi\n" + " popl %ebp\n" + " popl %eax\n" + /* skip eip, orig_eax, es, ds */ + " addl $16, %esp\n" + " popf\n" + " ret\n"); +} /* - * Called when we hit the probe point at kretprobe_trampoline + * Called from kretprobe_trampoline */ -int __kprobes trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs) +fastcall void *__kprobes trampoline_handler(struct pt_regs *regs) { struct kretprobe_instance *ri = NULL; struct hlist_head *head; @@ -376,18 +403,10 @@ int __kprobes trampoline_probe_handler(s } BUG_ON(!orig_ret_address || (orig_ret_address == trampoline_address)); - regs->eip = orig_ret_address; - reset_current_kprobe(); spin_unlock_irqrestore(&kretprobe_lock, flags); - preempt_enable_no_resched(); - /* - * By returning a non-zero value, we are telling - * kprobe_handler() that we don't want the post_handler - * to run (and have re-enabled preemption) - */ - return 1; + return (void*)orig_ret_address; } /* @@ -634,12 +653,7 @@ int __kprobes longjmp_break_handler(stru return 0; } -static struct kprobe trampoline_p = { - .addr = (kprobe_opcode_t *) &kretprobe_trampoline, - .pre_handler = trampoline_probe_handler -}; - int __init arch_init_kprobes(void) { - return register_kprobe(&trampoline_p); + return 0; } _ Patches currently in -mm which might be from hiramatu@xxxxxxxxxxxxxxxxx are - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html