Reputation: 1
I want to use Kprobe in eBPF to fetch the syscall addresses from the syscall table. How can I perform this task?
I wrote, but I do not know how to find the symbol table corresponding to the kernel.
Upvotes: 0
Views: 188
Reputation: 130
There are a few ways to do this:
Use the bpf_probe_read() function to read the syscall table from memory.
Use the bpf_kprobe__read() function to read the syscall table from the kernel's kprobes.
Use the bpf_usdt_read() function to read the syscall table from the kernel's USDT probes.
Upvotes: 0