Function report |
Source Code:lib\error-inject.c |
Create Date:2022-07-28 07:12:22 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Lookup and populate the error_injection_list.* For safety reasons we only allow certain functions to be overridden with* bpf_error_injection, so we need to populate the list of the symbols that have* been marked as safe for overriding.
Proto:static void populate_error_injection_list(struct error_injection_entry *start, struct error_injection_entry *end, void *priv)
Type:void
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct error_injection_entry * | start | |
| struct error_injection_entry * | end | |
| void * | priv |
| 65 | mutex_lock( & ei_mutex) |
| 67 | entry = arch_deref_entry_point((void * )addr) |
| 69 | If Not kernel_text_address(entry) || Not Lookup an address but don't bother to find any names. Then |
| 76 | ent = kmalloc( size of ent , GFP_KERNEL) |
| 77 | If Not ent Then Break |
| 79 | start_addr = entry |
| 86 | mutex_unlock( & ei_mutex) |
| Name | Describe |
|---|---|
| populate_kernel_ei_list | |
| module_load_ei_list |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |