graymon

Results 155 comments of graymon

oh never mind, I figured it out using telnet... ``` $ telnet localhost 2375 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. POST /v1.40/exec/cbaba521569293af53a3814af10a19272b0e7be0087129df7fc3bcd6d5ddd319/start HTTP/1.1 Host: localhost:2375 User-Agent: Docker-Client/19.03.2...

oh oh much appreciate but I had completed my task, I can just wait for stable one.. thank you very much all the same!

I've written my version of grpcdump to workaround this issue, have a try: https://github.com/jschwinger233/grpcdump

> Does the non-stripped binary work? yes. ``` $ sudo bpftrace --unsafe -e 'uprobe:/home/gray/Documents/src/tmp/hello/hello-debug:0x0000000000498e00 {printf("called\n")}' Attaching 1 probe... called ^C ``` and for the stripped binary, bcc also works. >...

Just figured out for uprobes the syntax `uprobe:library_name:address` is misleading, and the correct statement should be `uprobe:library_name:offset`. We know a symbol's address is different from its offset, generally speaking, one's...

I opened a PR https://github.com/iovisor/bpftrace/pull/2352 to clear the air.

Martynas, this is the guy @Asphaltt who managed to trace bpf tailcalls using kernel module, as I mentioned this Tuesday. :grin:

> it's to map addr -> name for bpf prog actually, no matter whether tag is unique. You are right, after all pwru will translate address to symbol name, so...

oh, 都忘了还有这个 issue, 大概就是说检查一个一个死掉的容器时拼出来的 netloc 是 `:8000` 这种, 导致 agent 去 net.Dial 这个地址会去连到 localhost:8000, 如果恰好宿主机上有个基础服务绑定了这个端口, 那这个死容器的 healthy 会被设为 true.