You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This should maybe be two issues but I'm posting them as one for now because maybe the root cause is the same i.e. user error on my part.
I've added ply to buildroot and have basic scripts like the snippet below working on x86_64. I'm using kernel 5.4. buildroot is building that kernel alongside the toolchain so I don't think this is a problem with the kernel headers and toolchain being out of sync.
kprobe:vfs_read
{
@[caller] = count();
}
I'm having problems getting wildcards and quantize() working.
if I change vfs_read to vfs_* in the above snippet it looks like attaching the probes fails:
This seems to be output from the bpf verification in the kernel? I'm pretty new to bpf so I don't think I'll have much hope of debugging that. If posting the complete output/the code ply generates would be helpful I can do that.
Thanks,
Daniel
The text was updated successfully, but these errors were encountered:
Thanks for this bug report. I've not had time to look into the quantize issue, other than to confirm that it is utterly broken. Weirdly enough it only seems to affect 64-bit targets, aarch64 and x86_64 are broken while arm and powerpc work as expected.
Wildcard matches on probes should work better using the latest wkz/ply now.
Hi,
This should maybe be two issues but I'm posting them as one for now because maybe the root cause is the same i.e. user error on my part.
I've added ply to buildroot and have basic scripts like the snippet below working on x86_64. I'm using kernel 5.4. buildroot is building that kernel alongside the toolchain so I don't think this is a problem with the kernel headers and toolchain being out of sync.
I'm having problems getting wildcards and quantize() working.
if I change
vfs_read
tovfs_*
in the above snippet it looks like attaching the probes fails:If I change the above snippet to this:
I get a huge wall of output like this:
This seems to be output from the bpf verification in the kernel? I'm pretty new to bpf so I don't think I'll have much hope of debugging that. If posting the complete output/the code ply generates would be helpful I can do that.
Thanks,
Daniel
The text was updated successfully, but these errors were encountered: