提交 00c6b2d5 编写于 作者: I Ingo Molnar

x86: harden kernel code patching

Signed-off-by: NIngo Molnar <mingo@elte.hu>
上级 b7b66baa
...@@ -519,6 +519,7 @@ void *__kprobes text_poke(void *addr, const void *opcode, size_t len) ...@@ -519,6 +519,7 @@ void *__kprobes text_poke(void *addr, const void *opcode, size_t len)
pages[1] = vmalloc_to_page(addr + PAGE_SIZE); pages[1] = vmalloc_to_page(addr + PAGE_SIZE);
} else { } else {
pages[0] = virt_to_page(addr); pages[0] = virt_to_page(addr);
WARN_ON(!PageReserved(pages[0]));
pages[1] = virt_to_page(addr + PAGE_SIZE); pages[1] = virt_to_page(addr + PAGE_SIZE);
} }
BUG_ON(!pages[0]); BUG_ON(!pages[0]);
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册