* [Bug tapsets/28443] New: Provide syscall_any tapset for bpf @ 2021-10-11 15:53 wcohen at redhat dot com 2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com ` (2 more replies) 0 siblings, 3 replies; 4+ messages in thread From: wcohen at redhat dot com @ 2021-10-11 15:53 UTC (permalink / raw) To: systemtap https://sourceware.org/bugzilla/show_bug.cgi?id=28443 Bug ID: 28443 Summary: Provide syscall_any tapset for bpf Product: systemtap Version: unspecified Status: NEW Severity: normal Priority: P2 Component: tapsets Assignee: systemtap at sourceware dot org Reporter: wcohen at redhat dot com Target Milestone: --- A number of systemtap examples use the syscall_any tapset. Providing a BPF version of the syscall_any tapset would allow additional examples to run with as BPF. Looked into how to implement this. The raw tracepoints sys_enter and sys_exit make the pt_regs available. The sys_enter also has $id (don't know why they didn't decide to include $id in the sys_exit). A helper function can pick out the appropriate register from the pt_regs to get the syscall number. The bpf backend also provides information about which target architecture the machine is. As experiment I was ableo to put guards around the initiatization code in each of the tapset/linux/*/syscall_num.stp files to made the initializer only run on the specific architecture and then have symbolic links from tapset/bpf to the arch-specific syscall_num.stp files. Will need to add the generation of these guards to scripts/dump-syscalls.sh. Haven't seen a way to get information whether this is 32-bit user-space code running on 64-bit platform. The existing tapset code to do that is using C include files to get bit mask to determine whether things are running in compat mode. There doesn't seem to be a BPF function to extract that information. -- You are receiving this mail because: You are the assignee for the bug. ^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf 2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com @ 2021-10-11 15:57 ` dichen at redhat dot com 2021-10-11 21:35 ` wcohen at redhat dot com 2021-10-27 13:37 ` wcohen at redhat dot com 2 siblings, 0 replies; 4+ messages in thread From: dichen at redhat dot com @ 2021-10-11 15:57 UTC (permalink / raw) To: systemtap https://sourceware.org/bugzilla/show_bug.cgi?id=28443 Di Chen <dichen at redhat dot com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dichen at redhat dot com -- You are receiving this mail because: You are the assignee for the bug. ^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf 2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com 2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com @ 2021-10-11 21:35 ` wcohen at redhat dot com 2021-10-27 13:37 ` wcohen at redhat dot com 2 siblings, 0 replies; 4+ messages in thread From: wcohen at redhat dot com @ 2021-10-11 21:35 UTC (permalink / raw) To: systemtap https://sourceware.org/bugzilla/show_bug.cgi?id=28443 --- Comment #1 from William Cohen <wcohen at redhat dot com> --- There are patches on https://sourceware.org/git/?p=systemtap.git;a=shortlog;h=refs/heads/wcohen/bpf_syscall_any_v2 that implment this. -- You are receiving this mail because: You are the assignee for the bug. ^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug tapsets/28443] Provide syscall_any tapset for bpf 2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com 2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com 2021-10-11 21:35 ` wcohen at redhat dot com @ 2021-10-27 13:37 ` wcohen at redhat dot com 2 siblings, 0 replies; 4+ messages in thread From: wcohen at redhat dot com @ 2021-10-27 13:37 UTC (permalink / raw) To: systemtap https://sourceware.org/bugzilla/show_bug.cgi?id=28443 William Cohen <wcohen at redhat dot com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #2 from William Cohen <wcohen at redhat dot com> --- The patches for syscall_any bpf support have been merged into the main branch of the systemtap git repository. Doesn't currently support 32-bit user-space on 64-bit systems. -- You are receiving this mail because: You are the assignee for the bug. ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2021-10-27 13:37 UTC | newest] Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2021-10-11 15:53 [Bug tapsets/28443] New: Provide syscall_any tapset for bpf wcohen at redhat dot com 2021-10-11 15:57 ` [Bug tapsets/28443] " dichen at redhat dot com 2021-10-11 21:35 ` wcohen at redhat dot com 2021-10-27 13:37 ` wcohen at redhat dot com
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).