From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755946Ab1KWSkz (ORCPT ); Wed, 23 Nov 2011 13:40:55 -0500 Received: from casper.infradead.org ([85.118.1.10]:58676 "EHLO casper.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751059Ab1KWSky convert rfc822-to-8bit (ORCPT ); Wed, 23 Nov 2011 13:40:54 -0500 Message-ID: <1322073616.14799.96.camel@twins> Subject: Re: [PATCH v7 3.2-rc2 5/30] uprobes: copy of the original instruction. From: Peter Zijlstra To: Srikar Dronamraju Cc: Linus Torvalds , Oleg Nesterov , Andrew Morton , LKML , Linux-mm , Ingo Molnar , Andi Kleen , Christoph Hellwig , Steven Rostedt , Roland McGrath , Thomas Gleixner , Masami Hiramatsu , Arnaldo Carvalho de Melo , Anton Arapov , Ananth N Mavinakayanahalli , Jim Keniston , Stephen Wilson Date: Wed, 23 Nov 2011 19:40:16 +0100 In-Reply-To: <20111118110733.10512.11835.sendpatchset@srdronam.in.ibm.com> References: <20111118110631.10512.73274.sendpatchset@srdronam.in.ibm.com> <20111118110733.10512.11835.sendpatchset@srdronam.in.ibm.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Mailer: Evolution 3.2.1- Mime-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2011-11-18 at 16:37 +0530, Srikar Dronamraju wrote: > + /* TODO : Analysis and verification of instruction */ As in refuse to set a breakpoint on an instruction we can't deal with? Do we care? The worst case we'll crash the program, but if we're allowed setting uprobes we already have enough privileges to do that anyway, right?