We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
当劫持的是BPF_PROG_LOAD时,为什么uprobe/uretprobe -> BPF_PROG_TYPE_SOCKET_FILTER?
BPF_PROG_LOAD
uprobe/uretprobe -> BPF_PROG_TYPE_SOCKET_FILTER
假如使用的是bpf_prog_attach_uprobe_with_override去挂载程序(error_inject.c)。
bpf_prog_attach_uprobe_with_override
The text was updated successfully, but these errors were encountered:
But link says uprobe/uretprobe program is BPF_PROG_TYPE_KPROBE
BPF_PROG_TYPE_KPROBE
Sorry, something went wrong.
BTW, After error_inject_bpf__open(), I print out the program type:
# The bpf_prog_type is 2, BPF_PROG_TYPE_KPROBE fprintf(stderr, "!!!!!1: %d\n", skel->progs.do_error_inject_patch->type); fprintf(stderr, "!!!!!2: %s\n", skel->progs.do_error_inject_patch->name);
The key problem is that bpf_prog_attach_uprobe_with_override is not supported by kernel.
It's a self-define type only in bpftime, so we choose a type for that. Maybe we should choose a new one....
No branches or pull requests
问题
当劫持的是
BPF_PROG_LOAD
时,为什么uprobe/uretprobe -> BPF_PROG_TYPE_SOCKET_FILTER
?假如使用的是
bpf_prog_attach_uprobe_with_override
去挂载程序(error_inject.c)。The text was updated successfully, but these errors were encountered: