On Wed, Jul 23, 2014 at 4:46 PM, Kees Cook wrote:
>>
>> eBPF programs can call in-kernel helper functions to:
>> - lookup/update/delete elements in maps
>> - memcmp
>> - trace_printk
>> - load_pointer
>> - dump_stack
>
> Ah, this must be the pointer leaking you mentioned. :)
>
>
> Can the
On Thu, Jul 17, 2014 at 9:20 PM, Alexei Starovoitov wrote:
> User interface:
> fd = open("/sys/kernel/debug/tracing/__event__/filter")
>
> write(fd, "bpf_123")
>
> where 123 is process local FD associated with eBPF program previously loaded.
> __event__ is static tracepoint event.
> (kprobe
On Thu, Jul 17, 2014 at 9:20 PM, Alexei Starovoitov a...@plumgrid.com wrote:
User interface:
fd = open(/sys/kernel/debug/tracing/__event__/filter)
write(fd, bpf_123)
where 123 is process local FD associated with eBPF program previously loaded.
__event__ is static tracepoint event.
(kprobe
On Wed, Jul 23, 2014 at 4:46 PM, Kees Cook keesc...@chromium.org wrote:
eBPF programs can call in-kernel helper functions to:
- lookup/update/delete elements in maps
- memcmp
- trace_printk
- load_pointer
- dump_stack
Ah, this must be the pointer leaking you mentioned. :)
Can the
User interface:
fd = open("/sys/kernel/debug/tracing/__event__/filter")
write(fd, "bpf_123")
where 123 is process local FD associated with eBPF program previously loaded.
__event__ is static tracepoint event.
(kprobe events will be supported in the future patches)
Once program is successfully
User interface:
fd = open(/sys/kernel/debug/tracing/__event__/filter)
write(fd, bpf_123)
where 123 is process local FD associated with eBPF program previously loaded.
__event__ is static tracepoint event.
(kprobe events will be supported in the future patches)
Once program is successfully
6 matches
Mail list logo