diff options
author | Kees Cook <keescook@chromium.org> | 2022-11-18 00:43:23 +0100 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2022-12-01 17:50:38 +0100 |
commit | 9db89b41117024f80b38b15954017fb293133364 (patch) | |
tree | ef440809489f6dba2ba0622c870344b8e1f0b9a3 /MAINTAINERS | |
parent | exit: Put an upper limit on how often we can oops (diff) | |
download | linux-9db89b41117024f80b38b15954017fb293133364.tar.xz linux-9db89b41117024f80b38b15954017fb293133364.zip |
exit: Expose "oops_count" to sysfs
Since Oops count is now tracked and is a fairly interesting signal, add
the entry /sys/kernel/oops_count to expose it to userspace.
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Cc: Jann Horn <jannh@google.com>
Cc: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20221117234328.594699-3-keescook@chromium.org
Diffstat (limited to 'MAINTAINERS')
-rw-r--r-- | MAINTAINERS | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/MAINTAINERS b/MAINTAINERS index 1cd80c113721..0a1e95a58e54 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -11106,6 +11106,7 @@ M: Kees Cook <keescook@chromium.org> L: linux-hardening@vger.kernel.org S: Supported T: git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git for-next/hardening +F: Documentation/ABI/testing/sysfs-kernel-oops_count F: include/linux/overflow.h F: include/linux/randomize_kstack.h F: mm/usercopy.c |