Hi Andi, > > > - set_intr_gate(3,&int3); > > > + set_system_gate(3,&int3); > > > set_system_gate(4,&overflow); /* int4-5 can be called from all */ > > > set_system_gate(5,&bounds); > > > set_intr_gate(6,&invalid_op); > > > Index: linux/arch/x86_64/kernel/kprobes.c
This looks good to me. Andi do you see any thing that will cause premption by moving int3 to system gate. > > > =================================================================== > > > --- linux.orig/arch/x86_64/kernel/kprobes.c 2005-01-04 12:12:39.%N > > > +0100 > > > +++ linux/arch/x86_64/kernel/kprobes.c 2005-01-18 02:46:05.%N +0100 > > > @@ -297,6 +297,8 @@ > > > struct die_args *args = (struct die_args *)data; > > > switch (val) { > > > case DIE_INT3: > > > + if (args->regs->cs & 3) > > > + return NOTIFY_DONE; This will prevent handling of userspace probes (privilege level 3). The kprobe_exception handler will return from here and registered user space probe handler won't be called. Thanks Prasanna -- Prasanna S Panchamukhi Linux Technology Center India Software Labs, IBM Bangalore Ph: 91-80-25044636 <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/