On 01/21, Steven Rostedt wrote:
I think this may have been mentioned, but is there a way that the kernel could know that this system call is being monitored by seccomp, and if so, just stick with the interrupt version? If not, enable the system call?
Consider
int func_to_uretprobe() { seccomp(SECCOMP_SET_MODE_STRICT/whatever); return 123; }
by the time it is called, the kernel can't know that this function will call seccomp/install-the-filters/etc, so prepare_uretprobe() can't know if it is safe to use uretprobe or not.
Oleg.