u32 dynamic_sz = 1; int kprobe2_res = 0; int kretprobe2_res = 0; int uprobe_byname_res = 0; int uretprobe_byname_res = 0; int uprobe_byname2_res = 0; int uretprobe_byname2_res = 0; int uprobe_byname3_sleepable_res = 0; int uprobe_byname3_str_sleepable_res = 0; int uprobe_byname3_res = 0; int uretprobe_byname3_sleepable_res = 0; int uretprobe_byname3_str_sleepable_res = 0; int uretprobe_byname3_res = 0; void *user_ptr = 0;
int bpf_copy_from_user_str(void *dst, u32, constvoid *, u64) __weak __ksym;
/* use auto-attach format for section definition. */
SEC("uretprobe//proc/self/exe:trigger_func2") int handle_uretprobe_byname(struct pt_regs *ctx)
{
uretprobe_byname_res = 6; return 0;
}
ret = bpf_copy_from_user_str(data_short, sizeof(data_short), user_ptr, 0);
if (bpf_strncmp(data_short, 4, "tes\0") != 0 || ret != 4) returnfalse;
ret = bpf_copy_from_user_str(data_short_pad, sizeof(data_short_pad), user_ptr, BPF_F_PAD_ZEROS);
if (bpf_strncmp(data_short, 4, "tes\0") != 0 || ret != 4) returnfalse;
/* Make sure this passes the verifier */
ret = bpf_copy_from_user_str(data_long, dynamic_sz & sizeof(data_long), user_ptr, 0);
if (ret != 0) returnfalse;
ret = bpf_copy_from_user_str(data_long, sizeof(data_long), user_ptr, 0);
if (bpf_strncmp(data_long, 10, "test_data\0") != 0 || ret != 10) returnfalse;
ret = bpf_copy_from_user_str(data_long_pad, sizeof(data_long_pad), user_ptr, BPF_F_PAD_ZEROS);
if (bpf_strncmp(data_long_pad, 10, "test_data\0") != 0 || ret != 10 || data_long_pad[19] != '\0') returnfalse;
ret = bpf_copy_from_user_str(data_long_err, sizeof(data_long_err), (void *)data_long, BPF_F_PAD_ZEROS);
if (ret > 0 || data_long_err[19] != '\0') returnfalse;
ret = bpf_copy_from_user_str(data_long, sizeof(data_long), user_ptr, 2);
if (ret != -EINVAL) returnfalse;
returntrue;
}
SEC("uprobe.s//proc/self/exe:trigger_func3") int handle_uprobe_byname3_sleepable(struct pt_regs *ctx)
{ if (verify_sleepable_user_copy())
uprobe_byname3_sleepable_res = 9; if (verify_sleepable_user_copy_str())
uprobe_byname3_str_sleepable_res = 10; return 0;
}
/** * same target as the uprobe.s above to force sleepable and non-sleepable * programs in the same bpf_prog_array
*/
SEC("uprobe//proc/self/exe:trigger_func3") int handle_uprobe_byname3(struct pt_regs *ctx)
{
uprobe_byname3_res = 11; return 0;
}
SEC("uretprobe.s//proc/self/exe:trigger_func3") int handle_uretprobe_byname3_sleepable(struct pt_regs *ctx)
{ if (verify_sleepable_user_copy())
uretprobe_byname3_sleepable_res = 12; if (verify_sleepable_user_copy_str())
uretprobe_byname3_str_sleepable_res = 13; return 0;
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.