"Naveen N. Rao" writes:
> On 2017/05/04 04:03PM, Michael Ellerman wrote:
>> Would this work?
>>
>> diff --git a/arch/powerpc/kernel/entry_64.S b/arch/powerpc/kernel/entry_64.S
>> index 767ef6d68c9e..8d0fa4a2262a 100644
>> --- a/arch/powerpc/kernel/entry_64.S
>> +++ b/arch/powerpc/kernel/entry_64.
On 2017/05/04 04:03PM, Michael Ellerman wrote:
> "Naveen N. Rao" writes:
>
> > On 2017/04/27 08:19PM, Michael Ellerman wrote:
> >> "Naveen N. Rao" writes:
> >>
> >> > It is actually safe to probe system_call() in entry_64.S, but only till
> >> > .Lsyscall_exit. To allow this, convert .Lsyscall_
"Naveen N. Rao" writes:
> On 2017/04/27 08:19PM, Michael Ellerman wrote:
>> "Naveen N. Rao" writes:
>>
>> > It is actually safe to probe system_call() in entry_64.S, but only till
>> > .Lsyscall_exit. To allow this, convert .Lsyscall_exit to a non-local
>> > symbol __system_call() and blacklist
On 2017/04/27 08:19PM, Michael Ellerman wrote:
> "Naveen N. Rao" writes:
>
> > It is actually safe to probe system_call() in entry_64.S, but only till
> > .Lsyscall_exit. To allow this, convert .Lsyscall_exit to a non-local
> > symbol __system_call() and blacklist that symbol, rather than
> > sys
"Naveen N. Rao" writes:
> It is actually safe to probe system_call() in entry_64.S, but only till
> .Lsyscall_exit. To allow this, convert .Lsyscall_exit to a non-local
> symbol __system_call() and blacklist that symbol, rather than
> system_call().
I'm not sure I like this. The reason we made i