We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
-> getuid() : 0 -> getpid() : 2468 -> getppid() : 2427 -> Logs : /sys/kernel/tracing/trace_pipe -> Loading eBPF Probe : /root/.boopkit/pr0be.safe.o -> Starting xCap Interface : lo -> Initalizing Ring Buffer libbpf: prog 'handle_getdents_patch': BPF program load failed: Invalid argument libbpf: prog 'handle_getdents_patch': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(off=0,imm=0) R10=fp0 ; size_t pid_tgid = bpf_get_current_pid_tgid(); 0: (85) call bpf_get_current_pid_tgid#14 ; R0_w=scalar() ; size_t pid_tgid = bpf_get_current_pid_tgid(); 1: (7b) *(u64 *)(r10 -8) = r0 ; R0_w=scalar() R10=fp0 fp-8_w=mmmmmmmm 2: (bf) r2 = r10 ; R2_w=fp0 R10=fp0 ; 3: (07) r2 += -8 ; R2_w=fp-8 ; long unsigned int *pbuff_addr = bpf_map_lookup_elem(&map_to_patch, &pid_tgid); 4: (18) r1 = 0xffff99f6c34db400 ; R1_w=map_ptr(off=0,ks=8,vs=8,imm=0) 6: (85) call bpf_map_lookup_elem#1 ; R0_w=map_value_or_null(id=1,off=0,ks=8,vs=8,imm=0) ; if (pbuff_addr == 0) { 7: (15) if r0 == 0x0 goto pc+56 ; R0_w=map_value(off=0,ks=8,vs=8,imm=0) ; long unsigned int buff_addr = *pbuff_addr; 8: (79) r7 = *(u64 *)(r0 +0) ; R0_w=map_value(off=0,ks=8,vs=8,imm=0) R7_w=scalar() 9: (b7) r8 = 0 ; R8_w=0 ; short unsigned int d_reclen_previous = 0; 10: (6b) *(u16 *)(r10 -10) = r8 ; R8_w=P0 R10=fp0 fp-16=00?????? 11: (b7) r9 = 16 ; R9_w=16 12: (bf) r6 = r7 ; R6_w=scalar(id=2) R7_w=scalar(id=2) 13: (0f) r6 += r9 ; R6_w=scalar() R9_w=16 14: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 ; 15: (07) r1 += -10 ; R1_w=fp-10 ; bpf_probe_read_user(&d_reclen_previous, sizeof(d_reclen_previous), 16: (b7) r2 = 2 ; R2_w=2 17: (bf) r3 = r6 ; R3_w=scalar(id=3) R6_w=scalar(id=3) 18: (85) call bpf_probe_read_user#112 ; R0=scalar() fp-16=mm?????? ; (struct linux_dirent64 *)(buff_addr + d_reclen_previous); 19: (69) r1 = *(u16 *)(r10 -10) ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0 ; (struct linux_dirent64 *)(buff_addr + d_reclen_previous); 20: (0f) r7 += r1 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R7_w=scalar() 21: (0f) r7 += r9 ; R7_w=scalar() R9=16 ; short unsigned int d_reclen = 0; 22: (6b) *(u16 *)(r10 -12) = r8 ; R8=P0 R10=fp0 fp-16=mm00???? 23: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 ; 24: (07) r1 += -12 ; R1_w=fp-12 ; bpf_probe_read_user(&d_reclen, sizeof(d_reclen), &dirp->d_reclen); 25: (b7) r2 = 2 ; R2_w=2 26: (bf) r3 = r7 ; R3_w=scalar(id=4) R7_w=scalar(id=4) 27: (85) call bpf_probe_read_user#112 ; R0_w=scalar() fp-16=mmmm???? ; short unsigned int d_reclen_new = d_reclen_previous + d_reclen; 28: (69) r1 = *(u16 *)(r10 -10) ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0 ; short unsigned int d_reclen_new = d_reclen_previous + d_reclen; 29: (69) r2 = *(u16 *)(r10 -12) ; R2_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0 ; short unsigned int d_reclen_new = d_reclen_previous + d_reclen; 30: (0f) r2 += r1 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R2_w=scalar(umax=131070,var_off=(0x0; 0x1ffff)) ; short unsigned int d_reclen_new = d_reclen_previous + d_reclen; 31: (6b) *(u16 *)(r10 -14) = r2 ; R2_w=scalar(umax=131070,var_off=(0x0; 0x1ffff)) R10=fp0 fp-16=mmmmmm?? 32: (bf) r2 = r10 ; R2_w=fp0 R10=fp0 ; 33: (07) r2 += -14 ; R2_w=fp-14 ; long ret = bpf_probe_write_user(&dirp_previous->d_reclen, &d_reclen_new, 34: (bf) r1 = r6 ; R1_w=scalar(id=3) R6=scalar(id=3) 35: (b7) r3 = 2 ; R3_w=2 36: (85) call bpf_probe_write_user#36 unknown func bpf_probe_write_user#36 processed 36 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1 -- END PROG LOAD LOG -- libbpf: prog 'handle_getdents_patch': failed to load: -22 libbpf: failed to load object 'pr0be_safe' libbpf: failed to load BPF skeleton 'pr0be_safe': -22 Unable to load eBPF object: /root/.boopkit/pr0be.safe.o Privileged access required to load eBPF probe! Permission denied.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
-> getuid() : 0
-> getpid() : 2468
-> getppid() : 2427
-> Logs : /sys/kernel/tracing/trace_pipe
-> Loading eBPF Probe : /root/.boopkit/pr0be.safe.o
-> Starting xCap Interface : lo
-> Initalizing Ring Buffer
libbpf: prog 'handle_getdents_patch': BPF program load failed: Invalid argument
libbpf: prog 'handle_getdents_patch': -- BEGIN PROG LOAD LOG --
R1 type=ctx expected=fp
0: R1=ctx(off=0,imm=0) R10=fp0
; size_t pid_tgid = bpf_get_current_pid_tgid();
0: (85) call bpf_get_current_pid_tgid#14 ; R0_w=scalar()
; size_t pid_tgid = bpf_get_current_pid_tgid();
1: (7b) *(u64 *)(r10 -8) = r0 ; R0_w=scalar() R10=fp0 fp-8_w=mmmmmmmm
2: (bf) r2 = r10 ; R2_w=fp0 R10=fp0
;
3: (07) r2 += -8 ; R2_w=fp-8
; long unsigned int *pbuff_addr = bpf_map_lookup_elem(&map_to_patch, &pid_tgid);
4: (18) r1 = 0xffff99f6c34db400 ; R1_w=map_ptr(off=0,ks=8,vs=8,imm=0)
6: (85) call bpf_map_lookup_elem#1 ; R0_w=map_value_or_null(id=1,off=0,ks=8,vs=8,imm=0)
; if (pbuff_addr == 0) {
7: (15) if r0 == 0x0 goto pc+56 ; R0_w=map_value(off=0,ks=8,vs=8,imm=0)
; long unsigned int buff_addr = *pbuff_addr;
8: (79) r7 = *(u64 *)(r0 +0) ; R0_w=map_value(off=0,ks=8,vs=8,imm=0) R7_w=scalar()
9: (b7) r8 = 0 ; R8_w=0
; short unsigned int d_reclen_previous = 0;
10: (6b) *(u16 *)(r10 -10) = r8 ; R8_w=P0 R10=fp0 fp-16=00??????
11: (b7) r9 = 16 ; R9_w=16
12: (bf) r6 = r7 ; R6_w=scalar(id=2) R7_w=scalar(id=2)
13: (0f) r6 += r9 ; R6_w=scalar() R9_w=16
14: (bf) r1 = r10 ; R1_w=fp0 R10=fp0
;
15: (07) r1 += -10 ; R1_w=fp-10
; bpf_probe_read_user(&d_reclen_previous, sizeof(d_reclen_previous),
16: (b7) r2 = 2 ; R2_w=2
17: (bf) r3 = r6 ; R3_w=scalar(id=3) R6_w=scalar(id=3)
18: (85) call bpf_probe_read_user#112 ; R0=scalar() fp-16=mm??????
; (struct linux_dirent64 *)(buff_addr + d_reclen_previous);
19: (69) r1 = *(u16 *)(r10 -10) ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0
; (struct linux_dirent64 *)(buff_addr + d_reclen_previous);
20: (0f) r7 += r1 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R7_w=scalar()
21: (0f) r7 += r9 ; R7_w=scalar() R9=16
; short unsigned int d_reclen = 0;
22: (6b) *(u16 *)(r10 -12) = r8 ; R8=P0 R10=fp0 fp-16=mm00????
23: (bf) r1 = r10 ; R1_w=fp0 R10=fp0
;
24: (07) r1 += -12 ; R1_w=fp-12
; bpf_probe_read_user(&d_reclen, sizeof(d_reclen), &dirp->d_reclen);
25: (b7) r2 = 2 ; R2_w=2
26: (bf) r3 = r7 ; R3_w=scalar(id=4) R7_w=scalar(id=4)
27: (85) call bpf_probe_read_user#112 ; R0_w=scalar() fp-16=mmmm????
; short unsigned int d_reclen_new = d_reclen_previous + d_reclen;
28: (69) r1 = *(u16 *)(r10 -10) ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0
; short unsigned int d_reclen_new = d_reclen_previous + d_reclen;
29: (69) r2 = *(u16 *)(r10 -12) ; R2_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R10=fp0
; short unsigned int d_reclen_new = d_reclen_previous + d_reclen;
30: (0f) r2 += r1 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) R2_w=scalar(umax=131070,var_off=(0x0; 0x1ffff))
; short unsigned int d_reclen_new = d_reclen_previous + d_reclen;
31: (6b) *(u16 *)(r10 -14) = r2 ; R2_w=scalar(umax=131070,var_off=(0x0; 0x1ffff)) R10=fp0 fp-16=mmmmmm??
32: (bf) r2 = r10 ; R2_w=fp0 R10=fp0
;
33: (07) r2 += -14 ; R2_w=fp-14
; long ret = bpf_probe_write_user(&dirp_previous->d_reclen, &d_reclen_new,
34: (bf) r1 = r6 ; R1_w=scalar(id=3) R6=scalar(id=3)
35: (b7) r3 = 2 ; R3_w=2
36: (85) call bpf_probe_write_user#36
unknown func bpf_probe_write_user#36
processed 36 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
-- END PROG LOAD LOG --
libbpf: prog 'handle_getdents_patch': failed to load: -22
libbpf: failed to load object 'pr0be_safe'
libbpf: failed to load BPF skeleton 'pr0be_safe': -22
Unable to load eBPF object: /root/.boopkit/pr0be.safe.o
Privileged access required to load eBPF probe!
Permission denied.
The text was updated successfully, but these errors were encountered: