* [PATCH 2/3] disallow kprobes on notifier_call_chain
@ 2006-09-26 5:02 bibo,mao
0 siblings, 0 replies; only message in thread
From: bibo,mao @ 2006-09-26 5:02 UTC (permalink / raw)
To: Andrew Morton
Cc: linux-kernel, Ananth N Mavinakayanahalli, Masami Hiramatsu,
Keshavamurthy, Anil S
Hi,
When kprobe is re-entered, the re-entered kprobe kernel path will will call atomic_notifier_call_chain function, if this function is kprobed that will incur numerous kprobe recursive fault. This patch disallows kprobes on atomic_notifier_call_chain function.
Signed-off-by: bibo, mao <bibo.mao@intel.com>
Signed-off-by: Ananth N Mavinakayanahalli <ananth@in.ibm.com>
thanks
bibo,mao
diff -Nruap 2.6.18-mm1.org/kernel/sys.c 2.6.18-mm1/kernel/sys.c
--- 2.6.18-mm1.org/kernel/sys.c 2006-09-26 10:16:33.000000000 +0800
+++ 2.6.18-mm1/kernel/sys.c 2006-09-26 10:49:37.000000000 +0800
@@ -222,7 +222,7 @@ EXPORT_SYMBOL_GPL(atomic_notifier_chain_
* of the last notifier function called.
*/
-int atomic_notifier_call_chain(struct atomic_notifier_head *nh,
+int __kprobes atomic_notifier_call_chain(struct atomic_notifier_head *nh,
unsigned long val, void *v)
{
int ret;
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2006-09-26 5:06 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-09-26 5:02 [PATCH 2/3] disallow kprobes on notifier_call_chain bibo,mao
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox