Skip to content

Commit

Permalink
Reorganization of the structure of the document
Browse files Browse the repository at this point in the history
  • Loading branch information
Wh1isper committed Oct 21, 2023
1 parent c7a2282 commit c63b9cd
Show file tree
Hide file tree
Showing 10 changed files with 19 additions and 6 deletions.
13 changes: 13 additions & 0 deletions docs/draft/case-mnist/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# MNIST Case

This is an analysis report for MNIST, which contains a PyTorch-based analysis of the MNIST experimental code and process, including analyze the trace-points in it related to data manipulation.

# What's next

We will add this into our example case later:

- [Support mnist case · Issue #85 · hitsz-ids/duetector (github.com)](https://github.com/hitsz-ids/duetector/issues/85)

# Anouncement

Thanks to the students from HITSZ for providing us this analysis report!
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
12 changes: 6 additions & 6 deletions docs/draft/lab report.md → docs/draft/case-mnist/report.md
Original file line number Diff line number Diff line change
Expand Up @@ -191,7 +191,7 @@ key_pressed = cv2.waitKey(0)

## 梳理并输出数据流程图

![数据流分析](./Src/Imgs/DataStream.png)
![数据流分析](./imgs/DataStream.png)

## 实验过程中可能涉及的系统调用和网络调用,eBPF的hook点分析

Expand All @@ -203,7 +203,7 @@ sudo cat /sys/kernel/debug/tracing/available_events |grep ‘系统调用名称

对实验过程的strace部分例子分析:

![部分产生的系统调用](./Src/Imgs/Analysis.png)
![部分产生的系统调用](./imgs/Analysis.png)

这一系列系统调研对应于实验中下载minist训练集的代码

Expand Down Expand Up @@ -259,11 +259,11 @@ def read_sn3_pascalvincent_tensor(path: str, strict: bool = True) -> torch.Tenso
```

利用sudo cat /sys/kernel/debug/tracing/available_events |grep ‘系统调用名称命令可以打印系统调用对应的trace_point作为ebpf的hook点。
![command0](Src/Imgs/command0.png)
![command1](Src/Imgs/command1.png)
![command2](Src/Imgs/command2.png)
![command0](imgs/command0.png)
![command1](imgs/command1.png)
![command2](imgs/command2.png)
更多系统调用分析和对应源码的分析,以及相应的bpf的hook点略,可参见下图。

## 梳理并画出实验中Trace points 和 Kprobes 、Kretprobes串连起来的流程图

![流程图](Src/Imgs/ProcessionandHooks.png)
![流程图](imgs/ProcessionandHooks.png)
File renamed without changes.
File renamed without changes.

0 comments on commit c63b9cd

Please sign in to comment.