Re: [PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-23 Thread Alexei Starovoitov
On Wed, Jul 23, 2014 at 4:46 PM, Kees Cook wrote: >> >> eBPF programs can call in-kernel helper functions to: >> - lookup/update/delete elements in maps >> - memcmp >> - trace_printk >> - load_pointer >> - dump_stack > > Ah, this must be the pointer leaking you mentioned. :) > > > Can the

Re: [PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-23 Thread Kees Cook
On Thu, Jul 17, 2014 at 9:20 PM, Alexei Starovoitov wrote: > User interface: > fd = open("/sys/kernel/debug/tracing/__event__/filter") > > write(fd, "bpf_123") > > where 123 is process local FD associated with eBPF program previously loaded. > __event__ is static tracepoint event. > (kprobe

Re: [PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-23 Thread Kees Cook
On Thu, Jul 17, 2014 at 9:20 PM, Alexei Starovoitov a...@plumgrid.com wrote: User interface: fd = open(/sys/kernel/debug/tracing/__event__/filter) write(fd, bpf_123) where 123 is process local FD associated with eBPF program previously loaded. __event__ is static tracepoint event. (kprobe

Re: [PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-23 Thread Alexei Starovoitov
On Wed, Jul 23, 2014 at 4:46 PM, Kees Cook keesc...@chromium.org wrote: eBPF programs can call in-kernel helper functions to: - lookup/update/delete elements in maps - memcmp - trace_printk - load_pointer - dump_stack Ah, this must be the pointer leaking you mentioned. :) Can the

[PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-17 Thread Alexei Starovoitov
User interface: fd = open("/sys/kernel/debug/tracing/__event__/filter") write(fd, "bpf_123") where 123 is process local FD associated with eBPF program previously loaded. __event__ is static tracepoint event. (kprobe events will be supported in the future patches) Once program is successfully

[PATCH RFC v2 net-next 13/16] tracing: allow eBPF programs to be attached to events

2014-07-17 Thread Alexei Starovoitov
User interface: fd = open(/sys/kernel/debug/tracing/__event__/filter) write(fd, bpf_123) where 123 is process local FD associated with eBPF program previously loaded. __event__ is static tracepoint event. (kprobe events will be supported in the future patches) Once program is successfully