US 12,141,049 B2
Automatic injection of agents into processes executing statically linked binaries
Gernot Reisinger, Linz (AT); Thomas Koeckerbauer, Mittertreffling (AT); and Michael Obermueller, Alkoven (AT)
Assigned to Dynatrace LLC, Waltham, MA (US)
Filed by Dynatrace LLC, Waltham, MA (US)
Filed on Dec. 8, 2023, as Appl. No. 18/533,483.
Application 18/533,483 is a continuation of application No. 17/194,861, filed on Mar. 8, 2021, granted, now 11,892,939.
Claims priority of provisional application 62/992,928, filed on Mar. 21, 2020.
Prior Publication US 2024/0111659 A1, Apr. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 11/36 (2006.01); G06F 9/445 (2018.01)
CPC G06F 11/3644 (2013.01) [G06F 9/44521 (2013.01)] 23 Claims
OG exemplary drawing
 
13. A computer-implemented method for injecting agents into process executing on a host computer, comprising:
intercepting, by a container manager agent, calls of a container manager process to execute a given binary in a given process running in a container and determining linking status of the given binary;
redirecting, by the container manager agent, the call for a given binary to a proxy launcher in response to a determination that the given binary is statically linked to, where the proxy launcher executes in a proxy process, where the proxy process is running in the container and processes running in the container are isolated from processes running directly on the operating system using operating-system level virtualization;
launching, by the proxy launcher, a child process for executing the given binary;
starting, by the proxy launcher, execution of the memory image of the given binary in the proxy process.