How to use `bpftrace` for tracing user-space Java functions on Android without recompiling system libraries?
I’m attempting to trace user-space Java function calls using bpftrace
on an Android device, specifically within oat/odex
files (a special type of ELF
file) that contain pre-compiled code. I’ve been using the following bpftrace
script to probe the parameters of the java.lang.String.indexOf
function: