From b1f95ee75f1ef5a4c69a8d6df499c4187120a811 Mon Sep 17 00:00:00 2001 From: Dom Del Nano Date: Mon, 8 May 2023 14:32:21 +0000 Subject: [PATCH] Remove update to BPF map not used in status quo tls tracing Signed-off-by: Dom Del Nano --- .../socket_tracer/bcc_bpf/openssl_trace.c | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/src/stirling/source_connectors/socket_tracer/bcc_bpf/openssl_trace.c b/src/stirling/source_connectors/socket_tracer/bcc_bpf/openssl_trace.c index 88f068b4a19..4675373d877 100644 --- a/src/stirling/source_connectors/socket_tracer/bcc_bpf/openssl_trace.c +++ b/src/stirling/source_connectors/socket_tracer/bcc_bpf/openssl_trace.c @@ -147,11 +147,6 @@ int probe_entry_SSL_write(struct pt_regs* ctx) { void* ssl = (void*)PT_REGS_PARM1(ctx); update_node_ssl_tls_wrap_map(ssl); - struct nested_syscall_fd_t nested_syscall_fd = { - .fd = kInvalidFD, - }; - ssl_user_space_call_map.update(&id, &nested_syscall_fd); - char* buf = (char*)PT_REGS_PARM2(ctx); int32_t fd = get_fd(tgid, ssl); @@ -192,11 +187,6 @@ int probe_entry_SSL_read(struct pt_regs* ctx) { void* ssl = (void*)PT_REGS_PARM1(ctx); update_node_ssl_tls_wrap_map(ssl); - struct nested_syscall_fd_t nested_syscall_fd = { - .fd = kInvalidFD, - }; - ssl_user_space_call_map.update(&id, &nested_syscall_fd); - char* buf = (char*)PT_REGS_PARM2(ctx); int32_t fd = get_fd(tgid, ssl);