[PATCH 7/7] arm64: uprobes - ARM32 instruction probing

Oleg Nesterov oleg at redhat.com
Wed Jan 24 08:13:38 PST 2018


On 01/24, Maciej Slodczyk wrote:
>
> Detect what kind of instruction is being probed and depending on the result:
> - if an A64 instruction handle it the old way, using existing A64 instructions
> probing code,
> - if an A32 instruction decode it and handle using the new code, moved from
> 32 bit arm kernel tree.

how this connects to the change in prepare_uretprobe(),

> --- a/kernel/events/uprobes.c
> +++ b/kernel/events/uprobes.c
> @@ -1566,6 +1566,9 @@ static void prepare_uretprobe(struct uprobe *uprobe, struct pt_regs *regs)
>  	unsigned long orig_ret_vaddr, trampoline_vaddr;
>  	bool chained;
>
> +	if (!current->mm)
> +		return;
> +

?

and how it is possible to hit ->mm == NULL here?

Oleg.




More information about the linux-arm-kernel mailing list