inode. In the case of overlayfs(and similar fs) we will
obtain the underlying dentry and corresponding inode, upon which uprobes
can successfully register.
Running the example above with the patch applied, we can see that the
uprobe is enabled and will output to trace as expected.
Reviewed-by: Josef Bac
INE for error injection. These changes are not
intended to be considered stable, and would normally be configured off.
Signed-off-by: Howard McLauchlan
---
Dominik,
I've updated the patch to support compat syscalls. Please let me know if there
are additional changes to be made.
Cheers,
On 03/18/2018 07:13 PM, Andy Lutomirski wrote:
On Sun, Mar 18, 2018 at 6:47 AM, Dominik Brodowski
wrote:
On Fri, Mar 16, 2018 at 03:55:04PM -0700, Howard McLauchlan wrote:
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
On Tue, Mar 13, 2018 at 11:16 PM, Howard McLauchlan wrote:
Error
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
> On Tue, Mar 13, 2018 at 11:16 PM, Howard McLauchlan
> wrote:
>> Error injection is a useful mechanism to fail arbitrary kernel
>> functions. However, it is often hard to guarantee an error propagates
>> appropriately to
On 03/13/2018 04:49 PM, Yonghong Song wrote:
>
>
> On 3/13/18 4:45 PM, Omar Sandoval wrote:
>> On Tue, Mar 13, 2018 at 04:16:27PM -0700, Howard McLauchlan wrote:
>>> Error injection is a useful mechanism to fail arbitrary kernel
>>> functions. However, it is
name, int flags)
{
u32 pid = bpf_get_current_pid_tgid();
if (pid == %s)
bpf_override_return(ctx, -ENOENT);
return 0;
}
""" % pid
b = BPF(text = prog)
while 1:
b.perf_buffer_poll()
This patch whitelists all syscalls defined with SYSCALL_DEFINE for error
injection.
Si
inode. In the case of overlayfs(and similar fs) we will
obtain the underlying dentry and corresponding inode, upon which uprobes
can successfully register.
Running the example above with the patch applied, we can see that the
uprobe is enabled and will output to trace as expected.
Signed-off-by:
7 matches
Mail list logo