kprobes/x86: Blacklist non-attachable interrupt functions

These interrupt functions are already non-attachable by kprobes.
Blacklist them explicitly so that they can show up in
/sys/kernel/debug/kprobes/blacklist and tools like BCC can use this
additional information.

Signed-off-by: Andrea Righi <righi.andrea@gmail.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: David S. Miller <davem@davemloft.net>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Yonghong Song <yhs@fb.com>
Link: http://lkml.kernel.org/r/20181206095648.GA8249@Dell
Signed-off-by: Ingo Molnar <mingo@kernel.org>

authored by Andrea Righi and committed by Ingo Molnar a50480cb 43a1b0cb

Changed files
+4
arch
x86
entry
+4
arch/x86/entry/entry_64.S
··· 566 566 567 567 ret 568 568 END(interrupt_entry) 569 + _ASM_NOKPROBE(interrupt_entry) 569 570 570 571 571 572 /* Interrupt entry/exit. */ ··· 767 766 jmp native_irq_return_iret 768 767 #endif 769 768 END(common_interrupt) 769 + _ASM_NOKPROBE(common_interrupt) 770 770 771 771 /* 772 772 * APIC interrupts. ··· 782 780 call \do_sym /* rdi points to pt_regs */ 783 781 jmp ret_from_intr 784 782 END(\sym) 783 + _ASM_NOKPROBE(\sym) 785 784 .endm 786 785 787 786 /* Make sure APIC interrupt handlers end up in the irqentry section: */ ··· 963 960 964 961 jmp error_exit 965 962 .endif 963 + _ASM_NOKPROBE(\sym) 966 964 END(\sym) 967 965 .endm 968 966