linux-trace-users.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* arm64 execve/clone sys_exit tracepoints
@ 2022-03-08 10:11 Federico Di Pierro
  2022-03-08 15:01 ` Mathieu Desnoyers
  2022-04-05 13:21 ` Federico Di Pierro
  0 siblings, 2 replies; 4+ messages in thread
From: Federico Di Pierro @ 2022-03-08 10:11 UTC (permalink / raw)
  To: linux-trace-users

Hi everyone,

While testing Falco on arm64 my team and I encountered some weird
issues; basically, it seems like execve() exit tracepoint is never
called.
Moreover, the clone() exit tracepoint referred to the child process is
also missing.
The issue is present on both the kmod and eBPF probe.

I tested on amznlinux2 with kernel 5.10.96-90.460.amzn2.aarch64, but
other team members tested on other kernel versions too (down to
4.14.X).
I was also able to reproduce the problem using bpftrace tool: hooking
on tracepoint:syscalls:sys_exit_execve; no event is received:

bpftrace -e 'tracepoint:syscalls:sys_exit_execve { printf("execve!\n"); }'

Since sys_enter tracepoints are indeed called, we'd expect the
sys_exit ones to be called too, just like it happens on x86.
The question is: are we missing anything obvious here?

Thank you very much for your time,
Regards
Federico

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2022-04-05 20:28 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-08 10:11 arm64 execve/clone sys_exit tracepoints Federico Di Pierro
2022-03-08 15:01 ` Mathieu Desnoyers
2022-03-17 14:02   ` Federico Di Pierro
2022-04-05 13:21 ` Federico Di Pierro

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).