* [Bug tapsets/28443] New: Provide syscall_any tapset for bpf
@ 2021-10-11 15:53 wcohen at redhat dot com
2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-11 15:53 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=28443
Bug ID: 28443
Summary: Provide syscall_any tapset for bpf
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
Assignee: systemtap at sourceware dot org
Reporter: wcohen at redhat dot com
Target Milestone: ---
A number of systemtap examples use the syscall_any tapset. Providing a BPF
version of the syscall_any tapset would allow additional examples to run with
as BPF.
Looked into how to implement this. The raw tracepoints sys_enter and sys_exit
make the pt_regs available. The sys_enter also has $id (don't know why they
didn't decide to include $id in the sys_exit). A helper function can pick out
the appropriate register from the pt_regs to get the syscall number. The bpf
backend also provides information about which target architecture the machine
is. As experiment I was ableo to put guards around the initiatization code in
each of the tapset/linux/*/syscall_num.stp files to made the initializer only
run on the specific architecture and then have symbolic links from tapset/bpf
to the arch-specific syscall_num.stp files. Will need to add the generation of
these guards to scripts/dump-syscalls.sh.
Haven't seen a way to get information whether this is 32-bit user-space code
running on 64-bit platform. The existing tapset code to do that is using C
include files to get bit mask to determine whether things are running in compat
mode. There doesn't seem to be a BPF function to extract that information.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf
2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
@ 2021-10-11 15:57 ` dichen at redhat dot com
2021-10-11 21:35 ` wcohen at redhat dot com
2021-10-27 13:37 ` wcohen at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: dichen at redhat dot com @ 2021-10-11 15:57 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=28443
Di Chen <dichen at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dichen at redhat dot com
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf
2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
@ 2021-10-11 21:35 ` wcohen at redhat dot com
2021-10-27 13:37 ` wcohen at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-11 21:35 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=28443
--- Comment #1 from William Cohen <wcohen at redhat dot com> ---
There are patches on
https://sourceware.org/git/?p=systemtap.git;a=shortlog;h=refs/heads/wcohen/bpf_syscall_any_v2
that implment this.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf
2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
2021-10-11 21:35 ` wcohen at redhat dot com
@ 2021-10-27 13:37 ` wcohen at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-27 13:37 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=28443
William Cohen <wcohen at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #2 from William Cohen <wcohen at redhat dot com> ---
The patches for syscall_any bpf support have been merged into the main branch
of the systemtap git repository. Doesn't currently support 32-bit user-space
on 64-bit systems.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2021-10-27 13:37 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
2021-10-11 21:35 ` wcohen at redhat dot com
2021-10-27 13:37 ` wcohen at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).