Skip to content

Commit 3a09a1e

Browse files
committed
Apply editorial changes
1 parent 31a14a0 commit 3a09a1e

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

examples/syscall-steal.c

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ static struct kprobe syscall_kprobe = {
9393
.symbol_name = "__x64_sys_openat",
9494
.pre_handler = sys_call_kprobe_pre_handler,
9595
};
96+
9697
#else
9798

9899
static unsigned long **sys_call_table_stolen;
@@ -240,7 +241,6 @@ static void disable_write_protection(void)
240241
static int __init syscall_steal_start(void)
241242
{
242243
#if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL
243-
244244
int err;
245245
/* use symbol name from the module parameter */
246246
syscall_kprobe.symbol_name = syscall_sym;
@@ -250,7 +250,6 @@ static int __init syscall_steal_start(void)
250250
pr_err("Please check the symbol name from 'syscall_sym' parameter.\n");
251251
return err;
252252
}
253-
254253
#else
255254
if (!(sys_call_table_stolen = acquire_sys_call_table()))
256255
return -1;
@@ -264,7 +263,6 @@ static int __init syscall_steal_start(void)
264263
sys_call_table_stolen[__NR_openat] = (unsigned long *)our_sys_openat;
265264

266265
enable_write_protection();
267-
268266
#endif
269267

270268
pr_info("Spying on UID:%d\n", uid);

0 commit comments

Comments
 (0)