/* Code to find the Linux syscall table */
#ifdef OSI_PROBE_STANDALONE
-#define OSI_PROBE_DEBUG
+# define OSI_PROBE_DEBUG
#endif
#ifndef OSI_PROBE_STANDALONE
-#include <afsconfig.h>
-#include "afs/param.h"
+# include <afsconfig.h>
+# include "afs/param.h"
#endif
-#ifdef AFS_LINUX24_ENV
+
+#if defined(ENABLE_LINUX_SYSCALL_PROBING)
#include <linux/module.h> /* early to avoid printf->printk mapping */
+#include <scsi/scsi.h> /* for scsi_command_size */
+#if LINUX_VERSION_CODE > KERNEL_VERSION(2,6,26)
+/* Slightly kludgy, but too bad */
+#define scsi_command_size scsi_command_size_tbl
+#endif
#ifndef OSI_PROBE_STANDALONE
-#include "afs/sysincludes.h"
-#include "afsincludes.h"
+# include "afs/sysincludes.h"
+# include "afsincludes.h"
#endif
#include <linux/version.h>
-#include <linux/config.h>
+#include <linux/sched.h>
+#ifdef HAVE_LINUX_CONFIG_H
+# include <linux/config.h>
+#endif
#include <linux/linkage.h>
#include <linux/init.h>
#include <linux/unistd.h>
#include <linux/mm.h>
+#if defined(AFS_PPC64_LINUX26_ENV)
+# include <asm/abs_addr.h>
+#endif
+
#ifdef AFS_AMD64_LINUX20_ENV
-#include <asm/ia32_unistd.h>
+# include <asm/ia32_unistd.h>
#endif
/* number of syscalls */
/* lower bound of valid kernel text pointers */
#ifdef AFS_IA64_LINUX20_ENV
#define ktxt_lower_bound (((unsigned long)&kernel_thread ) & 0xfff00000L)
+#elif defined(AFS_PPC64_LINUX20_ENV)
+#define ktxt_lower_bound (KERNELBASE)
#else
#define ktxt_lower_bound (((unsigned long)&kernel_thread ) & ~0xfffffL)
#endif
#define _SX(x) (x)
#endif
+/* Older Linux doesn't have __user. The sys_read prototype needs it. */
+#ifndef __user
+#define __user
+#endif
/* Allow the user to specify sys_call_table addresses */
static unsigned long sys_call_table_addr[4] = { 0,0,0,0 };
+#if defined(module_param_array) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param_array(sys_call_table_addr, long, NULL, 0);
+#else
MODULE_PARM(sys_call_table_addr, "1-4l");
+#endif
MODULE_PARM_DESC(sys_call_table_addr, "Location of system call tables");
/* If this is set, we are more careful about avoiding duplicate matches */
static int probe_carefully = 1;
+#if defined(module_param) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param(probe_carefully, int, 0);
+#else
MODULE_PARM(probe_carefully, "i");
+#endif
MODULE_PARM_DESC(probe_carefully, "Probe for system call tables carefully");
static int probe_ignore_syscalls[8] = { -1, -1, -1, -1, -1, -1, -1, -1 };
+#if defined(module_param_array) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param_array(probe_ignore_syscalls, int, NULL, 0);
+#else
MODULE_PARM(probe_ignore_syscalls, "1-8i");
+#endif
MODULE_PARM_DESC(probe_ignore_syscalls, "Syscalls to ignore in table checks");
#ifdef OSI_PROBE_DEBUG
* 0x0010 - detail - check_harder
* 0x0020 - detail - check_harder/zapped
* 0x0040 - automatically ignore setgroups and afs_syscall
+ * 0x0080 - detail - check_table_readable
*/
static int probe_debug = 0x41;
+#if defined(module_param) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param(probe_debug, int, 0);
+#else
MODULE_PARM(probe_debug, "i");
+#endif
MODULE_PARM_DESC(probe_debug, "Debugging level");
static unsigned long probe_debug_addr[4] = { 0,0,0,0 };
+#if defined(module_param_array) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param_array(probe_debug_addr, long, NULL, 0);
+#else
MODULE_PARM(probe_debug_addr, "1-4l");
+#endif
MODULE_PARM_DESC(probe_debug_addr, "Debug range starting locations");
static unsigned long probe_debug_range = 0;
+#if defined(module_param) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param(probe_debug_range, long, 0);
+#else
MODULE_PARM(probe_debug_range, "l");
+#endif
MODULE_PARM_DESC(probe_debug_range, "Debug range length");
static unsigned long probe_debug_tag = 0;
+#if defined(module_param) && LINUX_VERSION_CODE > KERNEL_VERSION(2,6,9)
+module_param(probe_debug_tag, long, 0);
+#else
MODULE_PARM(probe_debug_tag, "l");
+#endif
MODULE_PARM_DESC(probe_debug_tag, "Debugging output start tag");
#endif
extern SYSCALLTYPE sys_call_table32[] __attribute__((weak));
extern SYSCALLTYPE sys_call_table_emu[] __attribute__((weak));
+extern asmlinkage ssize_t sys_read(unsigned int fd, char __user * buf, size_t count) __attribute__((weak));
extern asmlinkage long sys_close(unsigned int) __attribute__((weak));
+#if defined(EXPORTED_SYS_CHDIR)
extern asmlinkage long sys_chdir(const char *) __attribute__((weak));
+#endif
extern asmlinkage ssize_t sys_write(unsigned int, const char *, size_t) __attribute__((weak));
-#ifdef AFS_LINUX26_ENV
extern asmlinkage long sys_wait4(pid_t, int *, int, struct rusage *) __attribute__((weak));
-#else
-extern asmlinkage long sys_wait4(pid_t, unsigned int *, int, struct rusage *) __attribute__((weak));
-#endif
extern asmlinkage long sys_exit (int) __attribute__((weak));
+#if defined(EXPORTED_SYS_OPEN)
extern asmlinkage long sys_open (const char *, int, int) __attribute__((weak));
+#endif
extern asmlinkage long sys_ioctl(unsigned int, unsigned int, unsigned long) __attribute__((weak));
unsigned long try_base_mask; /* base address bits to force to zero */
unsigned long try_length; /* default length for scan */
+ unsigned long alt_try_sect_sym; /* symbol in section to try scanning */
+ unsigned long alt_try_base; /* default base address for scan */
+ unsigned long alt_try_base_mask; /* base address bits to force to zero */
+ unsigned long alt_try_length; /* default length for scan */
+
int n_zapped_syscalls; /* number of unimplemented system calls */
int *zapped_syscalls; /* list of unimplemented system calls */
int debug_ignore_NR[4]; /* syscalls to ignore for debugging */
} probectl;
+#if defined(AFS_I386_LINUX26_ENV) || defined(AFS_AMD64_LINUX26_ENV)
+static int check_access(unsigned long, int);
+static int check_table_readable(probectl *, PROBETYPE *);
+#endif
/********** Probing Configuration: sys_call_table **********/
/* On PPC64 and SPARC64, we need to omit the ones that might match both tables */
static tryctl main_try[] = {
#if !defined(AFS_PPC64_LINUX20_ENV) && !defined(AFS_SPARC64_LINUX20_ENV)
+#if defined(EXPORTED_SYS_CHDIR)
{ "scan: close+chdir+write", __NR_close, &sys_close, __NR_chdir, &sys_chdir, __NR_write, &sys_write },
#endif
+#endif
{ "scan: close+wait4", __NR_close, &sys_close, __NR_wait4, &sys_wait4, -1, 0 },
#if !defined(AFS_PPC64_LINUX20_ENV) && !defined(AFS_SPARC64_LINUX20_ENV)
+#if defined(EXPORTED_SYS_CHDIR)
{ "scan: close+chdir", __NR_close, &sys_close, __NR_chdir, &sys_chdir, -1, 0 },
#endif
+#endif
{ "scan: close+ioctl", __NR_close, &sys_close, __NR_ioctl, &sys_ioctl, -1, 0 },
+#if defined(EXPORTED_SYS_OPEN)
{ "scan: exit+open", __NR_exit, &sys_exit, __NR_open, &sys_open, -1, 0 },
+#endif
{ 0 }
};
* The module-loading mechanism changed in Linux 2.6, and insmod's
* loss is our gain: three new unimplemented system calls!
*/
-#if defined(AFS_LINUX26_ENV)
#ifdef __NR_
__NR_create_module,
#endif
#ifdef __NR_get_kernel_syms
__NR_get_kernel_syms,
#endif
-#endif /* AFS_LINUX26_ENV */
/*
* On IA64, the old module-loading calls are indeed present and
/* symbol in section to try scanning */
#if defined(AFS_SPARC64_LINUX20_ENV) || defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
(unsigned long)&sys_close,
-#elif defined(AFS_AMD64_LINUX20_ENV)
+#elif defined(AFS_AMD64_LINUX26_ENV)
/* On this platform, it's in a different section! */
- (unsigned long)&tasklist_lock,
+ (unsigned long)&generic_ro_fops,
#else
(unsigned long)&init_mm,
#endif
(unsigned long)(&init_mm),
0x1fffff,
0x30000,
-#elif defined(AFS_AMD64_LINUX20_ENV)
- (unsigned long)(&tasklist_lock) - 0x30000,
+#elif defined(AFS_AMD64_LINUX26_ENV)
+ (unsigned long)(&generic_ro_fops) - 0x30000,
0,
0x6000,
-#elif defined(AFS_PPC_LINUX20_ENV) || defined(AFS_PPC_LINUX20_ENV)
- (unsigned long)&init_mm,
- 0xffff,
- 16384,
+#elif defined(AFS_PPC64_LINUX26_ENV)
+ (unsigned long)(&do_signal),
+ 0xfff,
+ 0x400,
#else
(unsigned long)&init_mm,
0,
16384,
#endif
+ (unsigned long)scsi_command_size,
+ (unsigned long)scsi_command_size - 0x10000,
+ 0x3ffff,
+ 0x40000,
+
/* number and list of unimplemented system calls */
((sizeof(main_zapped_syscalls)/sizeof(main_zapped_syscalls[0])) - 1),
main_zapped_syscalls,
/* syscall pairs/triplets to probe */
static tryctl ia32_try[] = {
+#if defined(EXPORTED_SYS_CHDIR)
{ "scan: close+chdir+write", __NR_ia32_close, &sys_close, __NR_ia32_chdir, &sys_chdir, __NR_ia32_write, &sys_write },
{ "scan: close+chdir", __NR_ia32_close, &sys_close, __NR_ia32_chdir, &sys_chdir, -1, 0 },
+#endif
{ 0 }
};
0,
(0x180000 / sizeof(unsigned long *)),
+ (unsigned long)scsi_command_size,
+ (unsigned long)scsi_command_size - 0x10000,
+ 0x3ffff,
+ 0x40000,
+
+
/* number and list of unimplemented system calls */
((sizeof(ia32_zapped_syscalls)/sizeof(ia32_zapped_syscalls[0])) - 1),
ia32_zapped_syscalls,
/********** Probing Configuration: ppc64, sparc64 sys_call_table32 **********/
#elif defined(AFS_PPC64_LINUX20_ENV) || defined(AFS_SPARC64_LINUX20_ENV)
+struct fptr {
+ void *ip;
+ unsigned long gp;
+};
/*
* syscall pairs/triplets to probe
(unsigned long)(&sys_close),
0xfffff,
0x10000,
+#elif defined(AFS_PPC64_LINUX26_ENV)
+ (unsigned long)(&do_signal),
+ 0xfff,
+ 0x400,
#else
(unsigned long)&init_mm,
0,
16384,
#endif
+ (unsigned long)scsi_command_size,
+ (unsigned long)scsi_command_size - 0x10000,
+ 0x3ffff,
+ 0x40000,
+
/* number and list of unimplemented system calls */
((sizeof(sct32_zapped_syscalls)/sizeof(sct32_zapped_syscalls[0])) - 1),
sct32_zapped_syscalls,
0xfffff,
0x20000,
+ (unsigned long)scsi_command_size,
+ (unsigned long)scsi_command_size - 0x10000,
+ 0x3ffff,
+ 0x40000,
+
/* number and list of unimplemented system calls */
((sizeof(emu_zapped_syscalls)/sizeof(emu_zapped_syscalls[0])) - 1),
emu_zapped_syscalls,
PROBETYPE *x;
int i, j;
+#if defined(AFS_I386_LINUX26_ENV) || defined(AFS_AMD64_LINUX26_ENV)
+ i = check_table_readable(P, ptr);
+ if (i >= 0) return i;
+#endif
+
for (x = ptr, i = 0; i < _SS(NR_syscalls); i++, x++) {
#ifdef OSI_PROBE_DEBUG
if (probe_debug & 0x0040) {
return -1;
}
-static void *try(probectl *P, tryctl *T, PROBETYPE *ptr,
+static void *try(probectl *P, tryctl *T, PROBETYPE *aptr,
unsigned long datalen)
{
#ifdef OSI_PROBE_KALLSYMS
#endif
unsigned long offset, ip1, ip2, ip3;
int ret;
+ PROBETYPE *ptr;
-#ifdef AFS_IA64_LINUX20_ENV
+#if defined(AFS_IA64_LINUX20_ENV) || defined(AFS_PPC64_LINUX20_ENV)
ip1 = T->fn1 ? (unsigned long)((struct fptr *)T->fn1)->ip : 0;
ip2 = T->fn2 ? (unsigned long)((struct fptr *)T->fn2)->ip : 0;
ip3 = T->fn3 ? (unsigned long)((struct fptr *)T->fn3)->ip : 0;
if (!ip1 || !ip2 || (T->NR3 >= 0 && !ip3))
return 0;
- for (offset = 0; offset < datalen; offset++, ptr++) {
+ for (offset = 0; offset < datalen; offset++, aptr++) {
+#if defined(AFS_PPC64_LINUX20_ENV)
+ ptr = (PROBETYPE*)(*aptr);
+ if ((unsigned long)ptr <= KERNELBASE) {
+ continue;
+ }
+#else
+ ptr = aptr;
+#endif
+ if ((unsigned long)ptr < init_mm.start_code ||
+#if defined(AFS_AMD64_LINUX20_ENV)
+ (unsigned long)ptr > init_mm.brk)
+#else
+ (unsigned long)ptr > init_mm.end_data)
+#endif
+ {
+/* printk("address 0x%lx (from 0x%lx %d) is out of range in check_table. wtf?\n", (unsigned long)x, (unsigned long)ptr, i);*/
+ continue;
+ }
+
ret = check_table(P, ptr);
if (ret >= 0) {
/* return value is number of entries to skip */
- ptr += ret;
+ aptr += ret;
offset += ret;
continue;
}
unsigned long ip1;
int i, s;
+#if defined(AFS_I386_LINUX26_ENV) || defined(AFS_AMD64_LINUX26_ENV)
+ i = check_table_readable(P, p);
+ if (i >= 0) return 0;
+#endif
+
/* Check zapped syscalls */
for (i = 1; i < P->n_zapped_syscalls; i++) {
if (p[_SS(P->zapped_syscalls[i])] != p[_SS(P->zapped_syscalls[0])]) {
}
}
-#ifdef AFS_IA64_LINUX20_ENV
+#if defined(AFS_IA64_LINUX20_ENV) || defined(AFS_PPC64_LINUX20_ENV)
ip1 = P->verify_fn ? (unsigned long)((struct fptr *)(P->verify_fn))->ip : 0;
#else
ip1 = (unsigned long)(P->verify_fn);
printk("<7>osi_probe: %s try_harder\n", P->symbol);
#endif
for (offset = 0; offset < datalen; offset++, ptr++) {
+ if ((unsigned long)ptr < init_mm.start_code ||
+#if defined(AFS_AMD64_LINUX20_ENV)
+ (unsigned long)ptr > init_mm.brk)
+#else
+ (unsigned long)ptr > init_mm.end_data)
+#endif
+ {
+/* printk("address 0x%lx (from 0x%lx %d) is out of range in check_table. wtf?\n", (unsigned long)x, (unsigned long)ptr, i);*/
+ continue;
+ }
ret = check_table(P, ptr);
if (ret >= 0) {
/* return value is number of entries to skip */
if (probe_debug & 0x0001) { \
printk("<7>osi_probe: %s = 0x%016lx %s\n", P->symbol, (unsigned long)(x), (m)); \
} \
- if ((x)) { \
+ if ((x) && ((int)(x)) != -ENOENT) { \
*method = (m); \
final_answer = (void *)(x); \
} \
} while (0)
#else
#define check_result(x,m) do { \
- if ((x)) { \
+ if ((x) && ((int)(x)) != -ENOENT) { \
*method = (m); \
return (void *)(x); \
} \
} while (0)
#endif
+static void *scan_for_syscall_table(probectl *P, PROBETYPE *B, unsigned long L)
+{
+ tryctl *T;
+ void *answer;
+#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
+ void *answer2;
+#endif
+#ifdef OSI_PROBE_DEBUG
+ void *final_answer = 0;
+#endif
+#ifdef OSI_PROBE_DEBUG
+ if (probe_debug & 0x0007)
+ printk("<7>osi_probe: %s base=0x%lx, len=0x%lx\n",
+ P->symbol, (unsigned long)B, L);
+ if (probe_debug & 0x0009) {
+ printk("<7>osi_probe: %s ktxt_lower_bound=0x%lx\n",
+ P->symbol, ktxt_lower_bound);
+ printk("<7>osi_probe: %s NR_syscalls=%d\n",
+ P->symbol, NR_syscalls);
+ }
+#endif
+
+ for (T = P->trylist; T->name; T++) {
+ answer = try(P, T, B, L);
+#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
+ answer2 = try(P, T, (PROBETYPE *)(2 + (void *)B), L);
+#ifdef OSI_PROBE_DEBUG
+ if (probe_debug & 0x0003) {
+ printk("<7>osi_probe: %s = 0x%016lx %s (even)\n",
+ P->symbol, (unsigned long)(answer), T->name);
+ printk("<7>osi_probe: %s = 0x%016lx %s (odd)\n",
+ P->symbol, (unsigned long)(answer2), T->name);
+ }
+#endif
+ if (answer && answer2) answer = 0;
+ else if (answer2) answer = answer2;
+#endif
+ if (answer)
+ return answer;
+ }
+
+ /* XXX more checks here */
+
+ answer = try_harder(P, B, L);
+#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
+ answer2 = try_harder(P, (PROBETYPE *)(2 + (void *)B), L);
+#ifdef OSI_PROBE_DEBUG
+ if (probe_debug & 0x0005) {
+ printk("<7>osi_probe: %s = 0x%016lx pattern scan (even)\n",
+ P->symbol, (unsigned long)(answer));
+ printk("<7>osi_probe: %s = 0x%016lx pattern scan (odd)\n",
+ P->symbol, (unsigned long)(answer2));
+ }
+#endif
+ if (answer && answer2) answer = 0;
+ else if (answer2) answer = answer2;
+#endif
+ return answer;
+}
+
static void *do_find_syscall_table(probectl *P, char **method)
{
#ifdef OSI_PROBE_KALLSYMS
#endif
PROBETYPE *B;
unsigned long L;
- tryctl *T;
void *answer;
-#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
- void *answer2;
-#endif
#ifdef OSI_PROBE_DEBUG
void *final_answer = 0;
#endif
}
}
#endif
-
-#ifdef OSI_PROBE_DEBUG
- if (probe_debug & 0x0007)
- printk("<7>osi_probe: %s base=0x%lx, len=0x%lx\n",
- P->symbol, (unsigned long)B, L);
- if (probe_debug & 0x0009) {
- printk("<7>osi_probe: %s ktxt_lower_bound=0x%lx\n",
- P->symbol, ktxt_lower_bound);
- printk("<7>osi_probe: %s NR_syscalls=%d\n",
- P->symbol, NR_syscalls);
+
+ answer = scan_for_syscall_table(P, B, L);
+ check_result(answer, "pattern scan");
+ B = (PROBETYPE *)((P->alt_try_base) & ~(P->alt_try_base_mask));
+ L = P->alt_try_length;
+ /* Now, see if the kernel will tell us something better than the default */
+#ifdef OSI_PROBE_KALLSYMS
+ if (kallsyms_address_to_symbol && P->alt_try_sect_sym) {
+ ret = kallsyms_address_to_symbol(P->alt_try_sect_sym,
+ &mod_name, &mod_start, &mod_end,
+ &sec_name, &sec_start, &sec_end,
+ &sym_name, &sym_start, &sym_end);
+ if (ret) {
+ B = (PROBETYPE *)sec_start;
+ L = (sec_end - sec_start) / sizeof(unsigned long);
+ }
}
#endif
-
- for (T = P->trylist; T->name; T++) {
- answer = try(P, T, B, L);
-#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
- answer2 = try(P, T, (PROBETYPE *)(2 + (void *)B), L);
+ if (B && L) {
+ answer = scan_for_syscall_table(P, B, L);
+ check_result(answer, "pattern scan");
+ }
#ifdef OSI_PROBE_DEBUG
- if (probe_debug & 0x0003) {
- printk("<7>osi_probe: %s = 0x%016lx %s (even)\n",
- P->symbol, (unsigned long)(answer), T->name);
- printk("<7>osi_probe: %s = 0x%016lx %s (odd)\n",
- P->symbol, (unsigned long)(answer2), T->name);
- }
-#endif
- if (answer && answer2) answer = 0;
- else if (answer2) answer = answer2;
+ return final_answer;
+#else
+ return 0;
#endif
- check_result(answer, T->name);
- }
-
- /* XXX more checks here */
+}
- answer = try_harder(P, B, L);
-#if defined(AFS_S390_LINUX20_ENV) || defined(AFS_S390X_LINUX20_ENV)
- answer2 = try_harder(P, (PROBETYPE *)(2 + (void *)B), L);
-#ifdef OSI_PROBE_DEBUG
- if (probe_debug & 0x0005) {
- printk("<7>osi_probe: %s = 0x%016lx pattern scan (even)\n",
- P->symbol, (unsigned long)(answer));
- printk("<7>osi_probe: %s = 0x%016lx pattern scan (odd)\n",
- P->symbol, (unsigned long)(answer2));
- }
+#if defined(AFS_I386_LINUX26_ENV) || defined(AFS_AMD64_LINUX26_ENV)
+static int check_access(unsigned long address, int mode)
+{
+ pgd_t *pgd = pgd_offset_k(address);
+#ifdef PUD_SIZE
+ pud_t *pud;
#endif
- if (answer && answer2) answer = 0;
- else if (answer2) answer = answer2;
+ pmd_t *pmd;
+ pte_t *pte;
+
+ if (pgd_none(*pgd))
+ return 0;
+#ifdef PUD_SIZE
+ pud = pud_offset(pgd, address);
+ if (pud_none(*pud))
+ return 0;
+ pmd = pmd_offset(pud, address);
+#else
+ pmd = pmd_offset(pgd, address);
#endif
- check_result(answer, "pattern scan");
+ if (pmd_none(*pmd))
+ return 0;
+ if (pmd_large(*pmd))
+ pte = (pte_t *)pmd;
+ else
+ pte = pte_offset_kernel(pmd, address);
+ if (pte_none(*pte) || !pte_present(*pte))
+ return 0;
+ if (mode && !pte_write(*pte))
+ return 0;
+ return 1;
+}
+static int check_table_readable(probectl *P, PROBETYPE *ptr)
+{
+ PROBETYPE *next_page;
+ int i = 0, delta;
+
+ while (i < _SS(NR_syscalls)) {
+ next_page = (PROBETYPE *)PAGE_ALIGN((unsigned long)(ptr+1));
+ delta = next_page - ptr;
+ if (!check_access((unsigned long)ptr, 0)) {
#ifdef OSI_PROBE_DEBUG
- return final_answer;
-#else
- return 0;
+ if (probe_debug & 0x0080)
+ printk("<7>osi_probe: %s 0x%016lx not readable; delta=0x%lx\n",
+ P->symbol, (unsigned long)ptr, delta);
#endif
+ return delta - 1;
+ }
+ ptr += delta;
+ i += delta;
+ }
+ return -1;
}
+#endif
void *osi_find_syscall_table(int which)
{
return 0;
}
printk("Found %s at 0x%lx (%s)\n", P->desc, (unsigned long)answer, method);
+#if defined(AFS_I386_LINUX26_ENV) || defined(AFS_AMD64_LINUX26_ENV)
+ if (!check_access((unsigned long)answer, 1)) {
+ printk("Address 0x%lx is not writable.\n", (unsigned long)answer);
+ printk("System call hooks will not be installed; proceeding anyway\n");
+ return 0;
+ }
+#endif
return answer;
}
module_init(osi_probe_init);
module_exit(osi_probe_exit);
#endif
-#endif
+
+#else
+void *osi_find_syscall_table(int which)
+{
+ return 0;
+}
+#endif /* EXPORTED_INIT_MM */