;
Signed-off-by: Howard McLauchlan <hmclauch...@fb.com>
---
kernel/trace/trace_uprobe.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c
index 2014f4351ae0..17c65fa4136d 100644
--- a/kernel/trace/trace_uprobe.c
rlayfs(and similar fs) we will
obtain the underlying dentry and corresponding inode, upon which uprobes
can successfully register.
Running the example above with the patch applied, we can see that the
uprobe is enabled and will output to trace as expected.
Reviewed-by: Josef Bacik
Signed-off-by: Howard McLa
ALL_DEFINE for error injection. These changes are not
intended to be considered stable, and would normally be configured off.
Signed-off-by: Howard McLauchlan <hmclauch...@fb.com>
---
Dominik,
I've updated the patch to support compat syscalls. Please let me know if there
are additional changes to be m
ALL_DEFINE for error injection. These changes are not
intended to be considered stable, and would normally be configured off.
Signed-off-by: Howard McLauchlan
---
Dominik,
I've updated the patch to support compat syscalls. Please let me know if there
are additional changes to be made.
Cheers,
V
On 03/18/2018 07:13 PM, Andy Lutomirski wrote:
On Sun, Mar 18, 2018 at 6:47 AM, Dominik Brodowski
<li...@dominikbrodowski.net> wrote:
On Fri, Mar 16, 2018 at 03:55:04PM -0700, Howard McLauchlan wrote:
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
On Tue, Mar 13, 2018 at 11:16 PM,
On 03/18/2018 07:13 PM, Andy Lutomirski wrote:
On Sun, Mar 18, 2018 at 6:47 AM, Dominik Brodowski
wrote:
On Fri, Mar 16, 2018 at 03:55:04PM -0700, Howard McLauchlan wrote:
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
On Tue, Mar 13, 2018 at 11:16 PM, Howard McLauchlan wrote:
Error
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
> On Tue, Mar 13, 2018 at 11:16 PM, Howard McLauchlan <hmclauch...@fb.com>
> wrote:
>> Error injection is a useful mechanism to fail arbitrary kernel
>> functions. However, it is often hard to guarantee an error propagates
On 03/13/2018 04:56 PM, Andy Lutomirski wrote:
> On Tue, Mar 13, 2018 at 11:16 PM, Howard McLauchlan
> wrote:
>> Error injection is a useful mechanism to fail arbitrary kernel
>> functions. However, it is often hard to guarantee an error propagates
>> appropriatel
On 03/13/2018 04:49 PM, Yonghong Song wrote:
>
>
> On 3/13/18 4:45 PM, Omar Sandoval wrote:
>> On Tue, Mar 13, 2018 at 04:16:27PM -0700, Howard McLauchlan wrote:
>>> Error injection is a useful mechanism to fail arbitrary kernel
>>> functions. However, it is
On 03/13/2018 04:49 PM, Yonghong Song wrote:
>
>
> On 3/13/18 4:45 PM, Omar Sandoval wrote:
>> On Tue, Mar 13, 2018 at 04:16:27PM -0700, Howard McLauchlan wrote:
>>> Error injection is a useful mechanism to fail arbitrary kernel
>>> functions. However, it is
name, int flags)
{
u32 pid = bpf_get_current_pid_tgid();
if (pid == %s)
bpf_override_return(ctx, -ENOENT);
return 0;
}
""" % pid
b = BPF(text = prog)
while 1:
b.perf_buffer_poll()
This patch whitelists all syscalls defined with SYSCALL_DEFINE for error
injection.
Si
name, int flags)
{
u32 pid = bpf_get_current_pid_tgid();
if (pid == %s)
bpf_override_return(ctx, -ENOENT);
return 0;
}
""" % pid
b = BPF(text = prog)
while 1:
b.perf_buffer_poll()
This patch whitelists all syscalls defined with SYSCALL_DEFINE for error
injection.
Si
rlayfs(and similar fs) we will
obtain the underlying dentry and corresponding inode, upon which uprobes
can successfully register.
Running the example above with the patch applied, we can see that the
uprobe is enabled and will output to trace as expected.
Signed-off-by: Howard McLauchlan <hmclauch.
rlayfs(and similar fs) we will
obtain the underlying dentry and corresponding inode, upon which uprobes
can successfully register.
Running the example above with the patch applied, we can see that the
uprobe is enabled and will output to trace as expected.
Signed-off-by: Howard McLauchlan
---
kernel
14 matches
Mail list logo