You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The bpf_attach_event indicates when an eBPF program is attached to a perf
event. The event includes arguments describing the eBPF program AND arguments
describing the perf event the program was attached to.
Fixes: #2003
eBPF programs can be attached to a perf event by 2 different means:
1. calling ioctl syscall w/ PERF_EVENT_IOC_SET_BPF command.
2. calling bpf syscall w/ BPF_LINK_CREATE command (newer kernels).
In both cases, the attachment happens in between an already loaded eBPF program
and an already created perf event.
NOTE:
The "prog_write_user" argument: this argument indicates whether or not the
bpf program uses the "bpf_probe_write_user" helper (to be used in
signatures).
This information comes from some kprobes added to the eBPF verifier logic,
requiring some temporary eBPF maps for the logic to work: check_helper_call,
check_map_func_compatibility and security_bpf_prog use information from a
temporary map because they're all executed in the same syscall context.
Prerequisites
Select one OR another:
Feature description
This feature is about adding
bpf_attach
event.This event will indicate bpf program being attached to a system event (kprobe, tracepoint, etc.).
This event will be then used in signatures.
The text was updated successfully, but these errors were encountered: