【发布时间】:2019-04-26 17:11:43
【问题描述】:
Kprobe 有一个预处理函数,模糊记录如下:
User's pre-handler (kp->pre_handler)::
#include <linux/kprobes.h>
#include <linux/ptrace.h>
int pre_handler(struct kprobe *p, struct pt_regs *regs);
Called with p pointing to the kprobe associated with the breakpoint,
and regs pointing to the struct containing the registers saved when
the breakpoint was hit. Return 0 here unless you're a Kprobes geek.
我想知道是否可以使用此功能(或任何其他 Kprobe 功能)来防止进程被执行\分叉。
【问题讨论】:
标签: linux security callback linux-kernel kprobe