Function report | 
Source Code:lib\error-inject.c | 
Create Date:2022-07-28 07:12:22 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:Lookup and populate the error_injection_list.* For safety reasons we only allow certain functions to be overridden with* bpf_error_injection, so we need to populate the list of the symbols that have* been marked as safe for overriding.
Proto:static void populate_error_injection_list(struct error_injection_entry *start, struct error_injection_entry *end, void *priv)
Type:void
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct error_injection_entry * | start | |
| struct error_injection_entry * | end | |
| void * | priv | 
| 65 | mutex_lock( & ei_mutex) | 
| 67 | entry = arch_deref_entry_point((void * )addr) | 
| 69 | If Not kernel_text_address(entry) || Not Lookup an address but don't bother to find any names. Then | 
| 76 | ent = kmalloc( size of ent , GFP_KERNEL) | 
| 77 | If Not ent Then Break | 
| 79 | start_addr = entry | 
| 86 | mutex_unlock( & ei_mutex) | 
| Name | Describe | 
|---|---|
| populate_kernel_ei_list | |
| module_load_ei_list | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |