public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug bpf/23475] New: bpf backtrace tapset
@ 2018-08-01 18:49 me at serhei dot io
  0 siblings, 0 replies; only message in thread
From: me at serhei dot io @ 2018-08-01 18:49 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=23475

            Bug ID: 23475
           Summary: bpf backtrace tapset
           Product: systemtap
           Version: unspecified
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: bpf
          Assignee: systemtap at sourceware dot org
          Reporter: me at serhei dot io
  Target Milestone: ---

From the 'language features' brainstorm:

# Backtrace tapset

Backtraces can be recorded to eBPF's BPF_MAP_TYPE_STACK_TRACE. Backtrace
analysis+printing can be handled in userspace. This requires replacing the
trace_printk() functionality with a messaging protocol that offloads printing
to userspace (PR22330), then adding a new message type that requests a
backtrace to be printed.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2018-08-01 18:49 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-01 18:49 [Bug bpf/23475] New: bpf backtrace tapset me at serhei dot io

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).