You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 11, 2023. It is now read-only.
Hey Guys, I'm trying to write a probe that inspects data passed to the kernel. It attaches and instruments the right sys call, but it seems like I'm not casting to the correct types for each parm. Can you help point me in the right direction?
Version
2.3.0
Example Data
The output looks like this for full or empty buffer. { sock_fd: 0xffffbe1780eeff58, buf: 0x0, len: 18446744073709551615 }
When using architecture-specific syscalls ("__x64_sys") you sadly have to parse the pt_regs argument yourselves - redBPF doesn't do this at this time. See issue #295, which includes an example how to do this.
If you want to trace the syscall in a less arch-specific manner, you might want to look into tracepoints (#331). Those are slightly better in this regard.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hey Guys, I'm trying to write a probe that inspects data passed to the kernel. It attaches and instruments the right sys call, but it seems like I'm not casting to the correct types for each parm. Can you help point me in the right direction?
Version
2.3.0
Example Data
The output looks like this for full or empty buffer.
{ sock_fd: 0xffffbe1780eeff58, buf: 0x0, len: 18446744073709551615 }
The hex output for the parm's
Example Probe
The text was updated successfully, but these errors were encountered: