Re: [PATCH] powerpc/kprobes: Use probe_address() to read instructions

2020-06-10 Thread Michael Ellerman
Christoph Hellwig writes: > On Tue, Jun 09, 2020 at 03:28:38PM +1000, Michael Ellerman wrote: >> On Mon, 24 Feb 2020 18:02:10 + (UTC), Christophe Leroy wrote: >> > In order to avoid Oopses, use probe_address() to read the >> > instruction at the address where the trap happened. >> >> Applied

Re: [PATCH] powerpc/kprobes: Use probe_address() to read instructions

2020-06-08 Thread Christoph Hellwig
On Tue, Jun 09, 2020 at 03:28:38PM +1000, Michael Ellerman wrote: > On Mon, 24 Feb 2020 18:02:10 + (UTC), Christophe Leroy wrote: > > In order to avoid Oopses, use probe_address() to read the > > instruction at the address where the trap happened. > > Applied to powerpc/next. > > [1/1] powerp

Re: [PATCH] powerpc/kprobes: Use probe_address() to read instructions

2020-06-08 Thread Michael Ellerman
On Mon, 24 Feb 2020 18:02:10 + (UTC), Christophe Leroy wrote: > In order to avoid Oopses, use probe_address() to read the > instruction at the address where the trap happened. Applied to powerpc/next. [1/1] powerpc/kprobes: Use probe_address() to read instructions https://git.kernel.org

[PATCH] powerpc/kprobes: Use probe_address() to read instructions

2020-02-24 Thread Christophe Leroy
In order to avoid Oopses, use probe_address() to read the instruction at the address where the trap happened. Signed-off-by: Christophe Leroy --- arch/powerpc/kernel/kprobes.c | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/kernel/kprobes.c b/arch/powe