Open dlescos opened 1 year ago
Maybe we should have a look at the comments of those commits:
Hi @dlescos,
I was encountering the same problem you're describing. Thanks for the details you've posted! This helped a lot in finding an actual solution to the problem. While my first attempt at this was to simply use a patched version of the zero crate that got rid of the check, this clearly doesn't fix the underlying alignment issue.
Long story short, it seems like the folks over at aya were facing similar problems and found a solution in the form of a macro that ensures correct alignment of the included bpf program (byte array). The relevant code is located here:
@rsdy: So far I've only tested this locally using Rust 1.60, using llvm 13 to build the bpf code and llvm 14 for the rest. Testing has been done on Ubuntu 22.04 as well as Debian Buster. I cannot say for sure that this will work in all supported environments. However, if this works, it would be preferable to reverting the zero dependency to the previous version or patching it, effectively ignoring potential trouble at runtime.
Hope this helps.
Cheers, Ben
I got a strange error while testing the tutorial, related to the assert that checks for the alignment in the
read_array
function of thezero
crate used by redbpf:The error happens randomly, for example while commenting out the code that attach the probe to
do_sys_openat2
.I think redbpf was not affected until recently, as they pushed it a few days ago to crate.io (as explained here).
A quick fix would be to call
read_array_unsafe
instead ofread_array
(same with allread
occurrences, if any).But I'm not sure I understand why this assert fails.