From 3d97a834097948bff2230363fb8bca4c7dc3f155 Mon Sep 17 00:00:00 2001 From: hengyoush Date: Tue, 10 Sep 2024 20:42:09 +0800 Subject: [PATCH] [Fix] fix 3.10 bugs --- bpf/pktlatency.bpf.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/bpf/pktlatency.bpf.c b/bpf/pktlatency.bpf.c index 1f64f939..efa7a1c1 100644 --- a/bpf/pktlatency.bpf.c +++ b/bpf/pktlatency.bpf.c @@ -1279,14 +1279,19 @@ int tracepoint__syscalls__sys_exit_read(struct trace_event_raw_sys_exit *ctx) { bpf_map_delete_elem(&read_args_map, &id); return 0; } - +struct my_user_msghdr { + void *msg_name; + int msg_namelen; + struct iovec *msg_iov; + __kernel_size_t msg_iovlen; +}; SEC("tracepoint/syscalls/sys_enter_recvmsg") int tracepoint__syscalls__sys_enter_recvmsg(struct trace_event_raw_sys_enter *ctx) { // SEC("kprobe/__x64_sys_recvmsg") // int BPF_KSYSCALL(recvmsg_enter, int sockfd, struct user_msghdr* msghdr) { uint64_t id = bpf_get_current_pid_tgid(); - struct user_msghdr* msghdr; + struct my_user_msghdr* msghdr; TP_ARGS(&msghdr, 1, ctx) int sockfd ; TP_ARGS(&sockfd, 0, ctx) @@ -1425,7 +1430,7 @@ SEC("tracepoint/syscalls/sys_enter_sendmsg") // int BPF_KSYSCALL(sendmsg_enter, int sockfd, const struct user_msghdr* msghdr) { int tracepoint__syscalls__sys_enter_sendmsg(struct trace_event_raw_sys_enter *ctx) { uint64_t id = bpf_get_current_pid_tgid(); - struct user_msghdr* msghdr; + struct my_user_msghdr* msghdr; TP_ARGS(&msghdr, 1, ctx) int sockfd ; TP_ARGS(&sockfd, 0, ctx)