From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 45427386100B; Mon, 11 Jan 2021 03:45:51 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 45427386100B From: "wcohen at redhat dot com" To: systemtap@sourceware.org Subject: [Bug bpf/27152] Missing tracepoints for for stap --bpf -L 'kernel.trace("*")' Date: Mon, 11 Jan 2021 03:45:51 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: bpf X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: wcohen at redhat dot com X-Bugzilla-Status: RESOLVED X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: systemtap@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Systemtap mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jan 2021 03:45:51 -0000 https://sourceware.org/bugzilla/show_bug.cgi?id=3D27152 William Cohen changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|NEW |RESOLVED --- Comment #2 from William Cohen --- Adjusted the test for BPF raw tracepoint support to accept the new function name in the following kernel patch in linux 5.7: commit 70ed506c3bbcfa846d4636b23051ca79fa4781f7 Author: Andrii Nakryiko 2020-03-02 23:31:57 Committer: Alexei Starovoitov 2020-03-03 01:06:27 Parent: 775a2be52da1c55fc810a5d151049f86f0fd5362 (selftests/bpf: Declare bpf_log_buf variables as static) Child: c016b68edc7a2adf3db0f11fb649797c1f9216ea (libbpf: Add bpf_link pinning/unpinning) Branches: master, remotes/origin/master Follows: v5.6-rc3 Precedes: v5.7-rc1 bpf: Introduce pinnable bpf_link abstraction Introduce bpf_link abstraction, representing an attachment of BPF progr= am to a BPF hook point (e.g., tracepoint, perf event, etc). bpf_link encapsul= ates ownership of attached BPF program, reference counting of a link itself, when reference from multiple anonymous inodes, as well as ensures that relea= se callback will be called from a process context, so that users can safely take mutex locks and sleep. Additionally, with a new abstraction it's now possible to generalize pinning of a link object in BPF FS, allowing to explicitly prevent BPF program detachment on process exit by pinning it in a BPF FS and let it open fr= om independent other process to keep working with it. Convert two existing bpf_link-like objects (raw tracepoint and tracing = BPF program attachments) into utilizing bpf_link framework, making them pinnable in BPF FS. More FD-based bpf_links will be added in follow up patches. Signed-off-by: Andrii Nakryiko Signed-off-by: Alexei Starovoitov Link: https://lore.kernel.org/bpf/20200303043159.323675-2-andriin@fb.com --=20 You are receiving this mail because: You are the assignee for the bug.=