I am experimenting with the malloc example. It works successfully with victim. I changed the UProbe offset from 0 to 135 (here). 135 is a valid offset in the system glibc:
0x00000000000970a4 <+132>: mov %rbx,%rsi0x00000000000970a7 <+135>: callq 0x94330 <_int_malloc>0x00000000000970ac <+140>: test %rax,%rax
The kernel eBPF (i.e., running without bpftime) shows probe hits, while running victim with bpftime causes no hit.
Any hint is appreciated!
The offset was not touched by victim. The kernel eBPF traces all running processes. Some non-victim running processes were touching the offset, causing probe hits for the kernel eBPF.
Hi,
I am experimenting with the malloc example. It works successfully with victim. I changed the UProbe offset from
0
to135
(here).135
is a valid offset in the systemglibc
:0x00000000000970a4 <+132>: mov %rbx,%rsi
0x00000000000970a7 <+135>: callq 0x94330 <_int_malloc>
0x00000000000970ac <+140>: test %rax,%rax
The kerneleBPF
(i.e., running withoutbpftime
) shows probe hits, while runningvictim
withbpftime
causes no hit. Any hint is appreciated!Regards.