tcptracer-bpf | eBPF program using kprobes to trace TCP events without run | TCP library
kandi X-RAY | tcptracer-bpf Summary
kandi X-RAY | tcptracer-bpf Summary
eBPF program using kprobes to trace TCP events without run-time compilation dependencies
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of tcptracer-bpf
tcptracer-bpf Key Features
tcptracer-bpf Examples and Code Snippets
Community Discussions
Trending Discussions on tcptracer-bpf
QUESTION
I am trying to load a BPF program that simply copies the buf
parameter of tty_write to the BPF stack. My program is as follows:
ANSWER
Answered 2018-Feb-10 at 18:50As you've discovered yourself, the issue comes from the use of additional parameters to kprobe__tty_write
. This works in ttysnoop
because it uses bcc to compile and load BPF programs. bcc actually rewrites the additional parameters to the ctx->xx
dereferences. You can see this with the following snippet:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install tcptracer-bpf
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page