[FIX] kretprobe disarming on x86 platform 66/74066/2
authorVyacheslav Cherkashin <v.cherkashin@samsung.com>
Fri, 10 Jun 2016 13:26:54 +0000 (16:26 +0300)
committerVyacheslav Cherkashin <v.cherkashin@samsung.com>
Fri, 10 Jun 2016 18:10:40 +0000 (21:10 +0300)
commitcfb1f0041be62098eae116fe888f3a5444378033
tree790b3d10efc9c3607b0a46f0f0b20997e632c761
parentfa049504752a2b8ba77939f8eafa9d763abec083
[FIX] kretprobe disarming on x86 platform

Now swap_kernel_sp() is to be used in kprobe handlers instead
of kernel_stack_pointer() to get the stack pointer.

Change-Id: Ida8c02ab82f3754d7a0d9b32bbfbc0dfe8e347e1
Signed-off-by: Vyacheslav Cherkashin <v.cherkashin@samsung.com>
kprobe/arch/x86/swap-asm/swap_kprobes.c
kprobe/arch/x86/swap-asm/swap_kprobes.h