[iovisor-dev] Question about IO Visor coverage.

2017-06-08 Thread Tetsuo Handa via iovisor-dev
Hello. I'm using SystemTap, and I want to know how many of hooks I implement using SystemTap can be replaced by IO Visor. (1) My understanding is that, due to restriction of available instruction set in eBPF, it is impossible to call arbitrary kernel functions. There is no way to i

Re: [iovisor-dev] [iovisor/bcc] USDT broken by b0f891d129a9b372

2017-06-05 Thread Tetsuo Handa via iovisor-dev
Hello. I changed the hook as below and confirmed that cp == NULL at bpf_probe_read(). That is, it is bpf_usdt_readarg() which got broken. -- int do_start(struct pt_regs *ctx) { char *cp = NULL; bpf_usdt_readarg(1, ctx, &cp); struct { char query[QUERY_MAX]; } data = { }; if

[iovisor-dev] [iovisor/bcc] USDT broken by b0f891d129a9b372

2017-06-05 Thread Tetsuo Handa via iovisor-dev
Hello. I noticed that b0f891d129a9b372 ("Force udst ctx->#reg load to be volatile") broke an USDT probe example shown below. -- #!/usr/bin/python >from bcc import BPF, USDT import sys import ctypes as ct def usage(): print("USAGE: usdt PID") exit() if len(sys.argv) < 1: usage