public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH 2/3] disallow kprobes on notifier_call_chain
@ 2006-09-26  5:02 bibo,mao
  0 siblings, 0 replies; only message in thread
From: bibo,mao @ 2006-09-26  5:02 UTC (permalink / raw)
  To: Andrew Morton
  Cc: linux-kernel, Ananth N Mavinakayanahalli, Masami Hiramatsu,
	Keshavamurthy, Anil S

Hi,

When kprobe is re-entered, the re-entered kprobe kernel path will will call atomic_notifier_call_chain function, if this function is kprobed that will incur numerous kprobe recursive fault. This patch disallows kprobes on atomic_notifier_call_chain function.

Signed-off-by: bibo, mao <bibo.mao@intel.com>
Signed-off-by: Ananth N Mavinakayanahalli <ananth@in.ibm.com>

thanks
bibo,mao

diff -Nruap 2.6.18-mm1.org/kernel/sys.c 2.6.18-mm1/kernel/sys.c
--- 2.6.18-mm1.org/kernel/sys.c	2006-09-26 10:16:33.000000000 +0800
+++ 2.6.18-mm1/kernel/sys.c	2006-09-26 10:49:37.000000000 +0800
@@ -222,7 +222,7 @@ EXPORT_SYMBOL_GPL(atomic_notifier_chain_
  *	of the last notifier function called.
  */
  
-int atomic_notifier_call_chain(struct atomic_notifier_head *nh,
+int __kprobes atomic_notifier_call_chain(struct atomic_notifier_head *nh,
 		unsigned long val, void *v)
 {
 	int ret;

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-09-26  5:06 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-09-26  5:02 [PATCH 2/3] disallow kprobes on notifier_call_chain bibo,mao

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox