public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug tapsets/28443] New: Provide syscall_any tapset for bpf
@ 2021-10-11 15:53 wcohen at redhat dot com
  2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-11 15:53 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=28443

            Bug ID: 28443
           Summary: Provide syscall_any tapset for bpf
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tapsets
          Assignee: systemtap at sourceware dot org
          Reporter: wcohen at redhat dot com
  Target Milestone: ---

A number of systemtap examples use the syscall_any tapset.  Providing a BPF
version of the syscall_any tapset would allow additional examples to run with
as BPF.

Looked into how to implement this.  The raw tracepoints sys_enter and sys_exit
make the pt_regs available.  The sys_enter also has $id (don't know why they
didn't decide to include $id in the sys_exit). A helper function can pick out
the appropriate register from the pt_regs to get the syscall number. The bpf
backend also provides information about which target architecture the machine
is.  As experiment I was ableo to put guards around the initiatization code in
each of the tapset/linux/*/syscall_num.stp files to made the initializer only
run on the specific architecture and then have symbolic links from tapset/bpf
to the arch-specific syscall_num.stp files.  Will need to add the generation of
these guards to scripts/dump-syscalls.sh.

Haven't seen a way to get information whether this is 32-bit user-space code
running on 64-bit platform.  The existing tapset code to do that is using C
include files to get bit mask to determine whether things are running in compat
mode.  There doesn't seem to be a BPF function to extract that information.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug tapsets/28443] Provide syscall_any tapset for bpf
  2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
@ 2021-10-11 15:57 ` dichen at redhat dot com
  2021-10-11 21:35 ` wcohen at redhat dot com
  2021-10-27 13:37 ` wcohen at redhat dot com
  2 siblings, 0 replies; 4+ messages in thread
From: dichen at redhat dot com @ 2021-10-11 15:57 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=28443

Di Chen <dichen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dichen at redhat dot com

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug tapsets/28443] Provide syscall_any tapset for bpf
  2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
  2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
@ 2021-10-11 21:35 ` wcohen at redhat dot com
  2021-10-27 13:37 ` wcohen at redhat dot com
  2 siblings, 0 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-11 21:35 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=28443

--- Comment #1 from William Cohen <wcohen at redhat dot com> ---
There are patches on
https://sourceware.org/git/?p=systemtap.git;a=shortlog;h=refs/heads/wcohen/bpf_syscall_any_v2
 that implment this.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug tapsets/28443] Provide syscall_any tapset for bpf
  2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
  2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
  2021-10-11 21:35 ` wcohen at redhat dot com
@ 2021-10-27 13:37 ` wcohen at redhat dot com
  2 siblings, 0 replies; 4+ messages in thread
From: wcohen at redhat dot com @ 2021-10-27 13:37 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=28443

William Cohen <wcohen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #2 from William Cohen <wcohen at redhat dot com> ---
The patches for syscall_any bpf support have been merged into the main branch
of the systemtap git repository.  Doesn't currently support 32-bit user-space
on 64-bit systems.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2021-10-27 13:37 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com
2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com
2021-10-11 21:35 ` wcohen at redhat dot com
2021-10-27 13:37 ` wcohen at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).