Prohibit probing on func_ptr_is_kernel_text(). Since the func_ptr_is_kernel_text() is called from notifier_call_chain() which is called from int3 handler, probing it may cause double int3 fault and kernel will reboot.
This happenes when the kernel built with CONFIG_DEBUG_NOTIFIERS=y. Signed-off-by: Masami Hiramatsu <[email protected]> Cc: Andrew Morton <[email protected]> Cc: "Uwe Kleine-König" <[email protected]> Cc: Borislav Petkov <[email protected]> Cc: Ingo Molnar <[email protected]> --- kernel/extable.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/extable.c b/kernel/extable.c index 832cb28..022fb25 100644 --- a/kernel/extable.c +++ b/kernel/extable.c @@ -129,7 +129,7 @@ int kernel_text_address(unsigned long addr) * pointer is part of the kernel text, we need to do some * special dereferencing first. */ -int func_ptr_is_kernel_text(void *ptr) +int nokprobe func_ptr_is_kernel_text(void *ptr) { unsigned long addr; addr = (unsigned long) dereference_function_descriptor(ptr); -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

