From 5cccdcf1e0397d033c987a81ed52cdbd3f893d7e Mon Sep 17 00:00:00 2001 From: Andrew Morton Date: Mon, 26 Nov 2007 20:42:19 +0100 Subject: [PATCH] --- yaml --- r: 74156 b: refs/heads/master c: 8645419cdb588a743060175c1efbe23f6e44b29b h: refs/heads/master v: v3 --- [refs] | 2 +- trunk/arch/x86/kernel/kprobes_64.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/[refs] b/[refs] index e7d10af90073..6d438dd552b7 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: c82bc5ad5411ccd61d26355088e2f5c9e95ef54b +refs/heads/master: 8645419cdb588a743060175c1efbe23f6e44b29b diff --git a/trunk/arch/x86/kernel/kprobes_64.c b/trunk/arch/x86/kernel/kprobes_64.c index 3db3611933d8..0c467644589c 100644 --- a/trunk/arch/x86/kernel/kprobes_64.c +++ b/trunk/arch/x86/kernel/kprobes_64.c @@ -58,7 +58,7 @@ const int kretprobe_blacklist_size = ARRAY_SIZE(kretprobe_blacklist); /* * returns non-zero if opcode modifies the interrupt flag. */ -static __always_inline int is_IF_modifier(kprobe_opcode_t *insn) +static int __kprobes is_IF_modifier(kprobe_opcode_t *insn) { switch (*insn) { case 0xfa: /* cli */