@@ -171,7 +171,7 @@ static int process_sip_data(struct pt_regs *ctx, u64 id, enum sip_data_event_typ
171
171
{
172
172
dest_info_t dest ;
173
173
bpf_probe_read (& dest .to , sizeof (union sockaddr_union ), data -> socketun );
174
- //bpf_probe_read(&dest.send_sock, sizeof(struct socket_info), data->rcvinfo);
174
+ // bpf_probe_read(&dest.send_sock, sizeof(struct socket_info), data->rcvinfo);
175
175
176
176
u16 dst_port = su_getport (& dest .to );
177
177
char fmt1 [] = "PORT DST: %d\n" ;
@@ -180,7 +180,7 @@ static int process_sip_data(struct pt_regs *ctx, u64 id, enum sip_data_event_typ
180
180
event -> rcinfo .dst_port = dst_port ;
181
181
su2ip_addr (& event -> rcinfo .dst_ip , & dest .to );
182
182
183
- //data->rcvinfo = &dest.send_sock;
183
+ // data->rcvinfo = &dest.send_sock;
184
184
185
185
u32 kZero = 0 ;
186
186
struct socket_info * send_sock = bpf_map_lookup_elem (& socket_info_heap , & kZero );
@@ -301,15 +301,14 @@ SEC("uprobe/msg_send_udp")
301
301
int msg_send_udp (struct pt_regs * ctx )
302
302
{
303
303
// int run_onsend(sip_msg_t *orig_msg, dest_info_t *dst, char *buf, int len)
304
- //debug_bpf_printk("opensips ======================================= d\n");
304
+ // debug_bpf_printk("opensips ======================================= d\n");
305
305
// static inline int msg_send_buffer(struct dest_info *dst, char *buf, int len, int flags)
306
306
// int udp_send(struct dest_info* dst, char *buf, unsigned len);
307
- //OPENSIPS
308
- //static int proto_udp_send(struct socket_info* source,
307
+ // OPENSIPS
308
+ // static int proto_udp_send(struct socket_info* source,
309
309
// char* buf, unsigned int len, union sockaddr_union* to,
310
310
// unsigned int id)
311
311
312
-
313
312
u64 timestamp = bpf_ktime_get_ns ();
314
313
u64 current_pid_tgid = bpf_get_current_pid_tgid ();
315
314
u32 pid = current_pid_tgid >> 32 ;
@@ -355,7 +354,6 @@ int msg_send_udp(struct pt_regs *ctx)
355
354
const void * rcvinfo = (void * )PT_REGS_PARM1 (ctx );
356
355
data .rcvinfo = rcvinfo ;
357
356
358
-
359
357
bpf_map_update_elem (& sip_hash_send , & current_pid_tgid , & data , BPF_ANY );
360
358
361
359
// struct socket_info send_sock = {};
@@ -437,7 +435,7 @@ int msg_send_tcp(struct pt_regs *ctx)
437
435
}
438
436
#endif
439
437
440
- u64 len = (u64 )PT_REGS_PARM4 (ctx );
438
+ u64 len = (u64 )PT_REGS_PARM3 (ctx );
441
439
442
440
char fmt2 [] = "msg_tcp_send: %lld\n" ;
443
441
bpf_trace_printk (fmt2 , sizeof (fmt2 ), timestamp );
@@ -453,9 +451,12 @@ int msg_send_tcp(struct pt_regs *ctx)
453
451
data .timestamp = timestamp ;
454
452
data .retval = -1 ;
455
453
456
- const char * buf = (const char * )PT_REGS_PARM3 (ctx );
454
+ const char * buf = (const char * )PT_REGS_PARM2 (ctx );
457
455
data .buf = buf ;
458
456
457
+ const void * socketun = (void * )PT_REGS_PARM4 (ctx );
458
+ data .socketun = socketun ;
459
+
459
460
const void * rcvinfo = (void * )PT_REGS_PARM1 (ctx );
460
461
data .rcvinfo = rcvinfo ;
461
462
@@ -478,9 +479,9 @@ int msg_ret_send_tcp(struct pt_regs *ctx)
478
479
u64 current_uid_gid = bpf_get_current_uid_gid ();
479
480
u32 uid = current_uid_gid ;
480
481
481
- int len = (int )PT_REGS_RC (ctx );
482
- char fmt2 [] = "msg_tcp_send return: %d\n" ;
483
- bpf_trace_printk (fmt2 , sizeof (fmt2 ), len );
482
+ //// int len = (int)PT_REGS_RC(ctx);
483
+ // char fmt2[] = "msg_tcp_send return: %d\n";
484
+ // bpf_trace_printk(fmt2, sizeof(fmt2), len);
484
485
485
486
struct data_t * data = bpf_map_lookup_elem (& sip_hash_send , & current_pid_tgid );
486
487
if (!data )
0 commit comments