diff --git a/examples/syscall-steal.c b/examples/syscall-steal.c index e885c84..e0d5bd3 100644 --- a/examples/syscall-steal.c +++ b/examples/syscall-steal.c @@ -93,6 +93,7 @@ static struct kprobe syscall_kprobe = { .symbol_name = "__x64_sys_openat", .pre_handler = sys_call_kprobe_pre_handler, }; + #else static unsigned long **sys_call_table_stolen; @@ -240,7 +241,6 @@ static void disable_write_protection(void) static int __init syscall_steal_start(void) { #if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL - int err; /* use symbol name from the module parameter */ syscall_kprobe.symbol_name = syscall_sym; @@ -250,7 +250,6 @@ static int __init syscall_steal_start(void) pr_err("Please check the symbol name from 'syscall_sym' parameter.\n"); return err; } - #else if (!(sys_call_table_stolen = acquire_sys_call_table())) return -1; @@ -264,7 +263,6 @@ static int __init syscall_steal_start(void) sys_call_table_stolen[__NR_openat] = (unsigned long *)our_sys_openat; enable_write_protection(); - #endif pr_info("Spying on UID:%d\n", uid);