[PATCH 2/3] disallow kprobes on notifier_call_chain

From: bibo,mao
Date: Tue Sep 26 2006 - 01:06:55 EST


When kprobe is re-entered, the re-entered kprobe kernel path will will call atomic_notifier_call_chain function, if this function is kprobed that will incur numerous kprobe recursive fault. This patch disallows kprobes on atomic_notifier_call_chain function.

Signed-off-by: bibo, mao <bibo.mao@xxxxxxxxx>
Signed-off-by: Ananth N Mavinakayanahalli <ananth@xxxxxxxxxx>


diff -Nruap 2.6.18-mm1.org/kernel/sys.c 2.6.18-mm1/kernel/sys.c
--- 2.6.18-mm1.org/kernel/sys.c 2006-09-26 10:16:33.000000000 +0800
+++ 2.6.18-mm1/kernel/sys.c 2006-09-26 10:49:37.000000000 +0800
@@ -222,7 +222,7 @@ EXPORT_SYMBOL_GPL(atomic_notifier_chain_
* of the last notifier function called.
-int atomic_notifier_call_chain(struct atomic_notifier_head *nh,
+int __kprobes atomic_notifier_call_chain(struct atomic_notifier_head *nh,
unsigned long val, void *v)
int ret;
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/