Kris Van Hees
Kris Van Hees
# dtrace -s /dev/stdin n[0] = 1; } EOT dtrace: script '/dev/stdin' matched 1 probe dtrace: error on enabled probe ID 1 (ID 1: dtrace:::BEGIN): invalid address (0x0) in action...
Consider the following: dtrace -n BEGIN'{ x = "a|b|c|"; trace(x); trace(strtok(x, "|")); trace(strtok(NULL, "|")); trace(strtok(NULL, "|")); trace(strtok(NULL, "|")); exit(0); }' dtrace: description 'BEGIN' matched 1 probe dtrace: error on enabled...
The strjoin() implementation is currently simply adding the length of the two component strings and storing that as length for the result. This can cause the stored length to be...
The result string of a substr() subroutine call can have the wrong length stored in its prefix. This can cause issues with other string operations that the substr() provides arguments...
Right now we have a loop over the argN values that need to be retrieved from the stack, and retrieve them one by one, using the bpf_probe_read_kernel helper. But, since...
This is a script to test whether CTF supports bitfields, and uses objdump on vmlinux.ctfa without redirecting its output properly.
Right now, "static" providers (pretty much anything other than pid-providers, USDT-providers, and profile/tick) populate the list of known probes for every dtrace invocation. Probe matching is done based on the...
The copyinstr() subroutine is declared as: stirng copyinstr(uintptr_t addr [, size_t maxlen]) which in some aspects makes sense because it is to read bytes from a given userspace address (up...
The printf action's %s (and %S) conversion accepts an array of char or a string as argument, but not char*. This is documented as such, but there is not really...