* [Bug bpf/23475] New: bpf backtrace tapset
@ 2018-08-01 18:49 me at serhei dot io
0 siblings, 0 replies; only message in thread
From: me at serhei dot io @ 2018-08-01 18:49 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=23475
Bug ID: 23475
Summary: bpf backtrace tapset
Product: systemtap
Version: unspecified
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: bpf
Assignee: systemtap at sourceware dot org
Reporter: me at serhei dot io
Target Milestone: ---
From the 'language features' brainstorm:
# Backtrace tapset
Backtraces can be recorded to eBPF's BPF_MAP_TYPE_STACK_TRACE. Backtrace
analysis+printing can be handled in userspace. This requires replacing the
trace_printk() functionality with a messaging protocol that offloads printing
to userspace (PR22330), then adding a new message type that requests a
backtrace to be printed.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2018-08-01 18:49 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-01 18:49 [Bug bpf/23475] New: bpf backtrace tapset me at serhei dot io
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).