mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-06-29 10:01:25 +00:00
[PATCH] disallow kprobes on notifier_call_chain
When kprobe is re-entered, the re-entered kprobe kernel path will will call atomic_notifier_call_chain function, if this function is kprobed that will incur numerous kprobe recursive fault. This patch disallows kprobes on atomic_notifier_call_chain function. Signed-off-by: bibo, mao <bibo.mao@intel.com> Signed-off-by: Ananth N Mavinakayanahalli <ananth@in.ibm.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
This commit is contained in:
parent
62c27be0dd
commit
f2aa85a0cc
1 changed files with 1 additions and 1 deletions
|
@ -221,7 +221,7 @@ EXPORT_SYMBOL_GPL(atomic_notifier_chain_unregister);
|
||||||
* of the last notifier function called.
|
* of the last notifier function called.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int atomic_notifier_call_chain(struct atomic_notifier_head *nh,
|
int __kprobes atomic_notifier_call_chain(struct atomic_notifier_head *nh,
|
||||||
unsigned long val, void *v)
|
unsigned long val, void *v)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue