I think there's a TOCTOU in the execveat example o...
# ebpf
a
I think there's a TOCTOU in the execveat example of ebpfpub, though there shouldn't be an issue if you use the tracepoint like in linuxevents
a
Do you mean the kprobe_execsnoop example? I think we are always somehow subject to race conditions, especially when walking dentry structures (because we can't acquire locks from BPF)
a
Yes, that's what I'm talking about
AIUI it's fine if you can instrument after a copy_from_user but I don't think that's possible here