forked from mirrors/linux
		
	Since kprobes depends on preempt disable/enable, probing on the preempt debug routines can cause recursive breakpoint bugs. Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Andrea Righi <righi.andrea@gmail.com> Cc: Arnaldo Carvalho de Melo <acme@redhat.com> Cc: Jiri Olsa <jolsa@redhat.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Steven Rostedt <rostedt@goodmis.org> Cc: Thomas Gleixner <tglx@linutronix.de> Link: http://lkml.kernel.org/r/154998804911.31052.3541963527929117920.stgit@devbox Signed-off-by: Ingo Molnar <mingo@kernel.org>
		
			
				
	
	
		
			67 lines
		
	
	
	
		
			1.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			67 lines
		
	
	
	
		
			1.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
/*
 | 
						|
 * lib/smp_processor_id.c
 | 
						|
 *
 | 
						|
 * DEBUG_PREEMPT variant of smp_processor_id().
 | 
						|
 */
 | 
						|
#include <linux/export.h>
 | 
						|
#include <linux/kprobes.h>
 | 
						|
#include <linux/sched.h>
 | 
						|
 | 
						|
notrace static nokprobe_inline
 | 
						|
unsigned int check_preemption_disabled(const char *what1, const char *what2)
 | 
						|
{
 | 
						|
	int this_cpu = raw_smp_processor_id();
 | 
						|
 | 
						|
	if (likely(preempt_count()))
 | 
						|
		goto out;
 | 
						|
 | 
						|
	if (irqs_disabled())
 | 
						|
		goto out;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * Kernel threads bound to a single CPU can safely use
 | 
						|
	 * smp_processor_id():
 | 
						|
	 */
 | 
						|
	if (cpumask_equal(¤t->cpus_allowed, cpumask_of(this_cpu)))
 | 
						|
		goto out;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * It is valid to assume CPU-locality during early bootup:
 | 
						|
	 */
 | 
						|
	if (system_state < SYSTEM_SCHEDULING)
 | 
						|
		goto out;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * Avoid recursion:
 | 
						|
	 */
 | 
						|
	preempt_disable_notrace();
 | 
						|
 | 
						|
	if (!printk_ratelimit())
 | 
						|
		goto out_enable;
 | 
						|
 | 
						|
	printk(KERN_ERR "BUG: using %s%s() in preemptible [%08x] code: %s/%d\n",
 | 
						|
		what1, what2, preempt_count() - 1, current->comm, current->pid);
 | 
						|
 | 
						|
	printk("caller is %pS\n", __builtin_return_address(0));
 | 
						|
	dump_stack();
 | 
						|
 | 
						|
out_enable:
 | 
						|
	preempt_enable_no_resched_notrace();
 | 
						|
out:
 | 
						|
	return this_cpu;
 | 
						|
}
 | 
						|
 | 
						|
notrace unsigned int debug_smp_processor_id(void)
 | 
						|
{
 | 
						|
	return check_preemption_disabled("smp_processor_id", "");
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(debug_smp_processor_id);
 | 
						|
NOKPROBE_SYMBOL(debug_smp_processor_id);
 | 
						|
 | 
						|
notrace void __this_cpu_preempt_check(const char *op)
 | 
						|
{
 | 
						|
	check_preemption_disabled("__this_cpu_", op);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(__this_cpu_preempt_check);
 | 
						|
NOKPROBE_SYMBOL(__this_cpu_preempt_check);
 |