Function report |
Source Code:lib\error-inject.c |
Create Date:2022-07-28 07:12:22 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Lookup and populate the error_injection_list.* For safety reasons we only allow certain functions to be overridden with* bpf_error_injection, so we need to populate the list of the symbols that have* been marked as safe for overriding.
Proto:static void populate_error_injection_list(struct error_injection_entry *start, struct error_injection_entry *end, void *priv)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
struct error_injection_entry * | start | |
struct error_injection_entry * | end | |
void * | priv |
65 | mutex_lock( & ei_mutex) |
67 | entry = arch_deref_entry_point((void * )addr) |
69 | If Not kernel_text_address(entry) || Not Lookup an address but don't bother to find any names. Then |
76 | ent = kmalloc( size of ent , GFP_KERNEL) |
77 | If Not ent Then Break |
79 | start_addr = entry |
86 | mutex_unlock( & ei_mutex) |
Name | Describe |
---|---|
populate_kernel_ei_list | |
module_load_ei_list |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |