File tree Expand file tree Collapse file tree 1 file changed +1
-3
lines changed Expand file tree Collapse file tree 1 file changed +1
-3
lines changed Original file line number Diff line number Diff line change @@ -93,6 +93,7 @@ static struct kprobe syscall_kprobe = {
93
93
.symbol_name = "__x64_sys_openat" ,
94
94
.pre_handler = sys_call_kprobe_pre_handler ,
95
95
};
96
+
96
97
#else
97
98
98
99
static unsigned long * * sys_call_table_stolen ;
@@ -240,7 +241,6 @@ static void disable_write_protection(void)
240
241
static int __init syscall_steal_start (void )
241
242
{
242
243
#if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL
243
-
244
244
int err ;
245
245
/* use symbol name from the module parameter */
246
246
syscall_kprobe .symbol_name = syscall_sym ;
@@ -250,7 +250,6 @@ static int __init syscall_steal_start(void)
250
250
pr_err ("Please check the symbol name from 'syscall_sym' parameter.\n" );
251
251
return err ;
252
252
}
253
-
254
253
#else
255
254
if (!(sys_call_table_stolen = acquire_sys_call_table ()))
256
255
return -1 ;
@@ -264,7 +263,6 @@ static int __init syscall_steal_start(void)
264
263
sys_call_table_stolen [__NR_openat ] = (unsigned long * )our_sys_openat ;
265
264
266
265
enable_write_protection ();
267
-
268
266
#endif
269
267
270
268
pr_info ("Spying on UID:%d\n" , uid );
You can’t perform that action at this time.
0 commit comments