-
Event scope filter is currently running in userspace, but it should be straight forward to move it into the kernel since we can use the same logic we use today to compute our scopes in the kernel.
Th…
-
E.g. :
```objdump
716: 7a 0a f8 ff 00 00 00 00
...
720: 62 0a 8c ff 02 02 00 00
```
Where these instructions were defined in:
https://docs.kernel.org/bpf/instruction…
-
### Windows Version
Microsoft Windows [Version 10.0.22621.2215]
### WSL Version
1.2.5.0
### Are you using WSL 1 or WSL 2?
- [X] WSL 2
- [ ] WSL 1
### Kernel Version
5.15.90.1
…
-
As far as I can tell, when using the SEC("maps") convention, there is no definition of bpf_map_def in a header file accessible outside the kernel. So it's necessary for the user's program to explicitl…
-
### Describe the Bug
After installing PCSX2 on macOS, I got this scary warning in Little Snitch with the Endpoint Security System Extension installed
![PCSX2_bpf_issue](https://github.com/PCSX2/pc…
-
bpf: Failed to load program: Invalid argument
Traceback (most recent call last):
File "examples/hello_world.py", line 12, in
BPF(text='int kprobe__sys_clone(void *ctx) { bpf_trace_printk("…
-
The sv_subscriber example does not work on FreeBSD. It does not print anything. The problem was traced to hal/ethernet/bsd/ethernet_bsd.c
The patch to make it work is:
`--- hal/ethernet/bsd/ethern…
-
#### Problem
SBF C++ toolchain doesn't include a standard C++ library for on-chain developers to use. This severely limits the development of on-chain programs in C++.
#### Proposed Solution
…
-
Ubuntu 12.04 LTS comes with "mode 2 seccomp" and the mainline kernel is
currenly in the process of accepting seccomp patches.
In short, "mode 2 seccomp" adds an ability to apply s…
-
Environment: Arch Linux, Linux 6.4.7
MRE:
1. Create a kprobe project with aya-template, attaching `__x64_sys_execve`
2. Use `aya-tool` to generate vmlinux: `aya-tool generate task_struct > aya-…