lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1432456091-73384-1-git-send-email-hekuang@huawei.com>
Date:	Sun, 24 May 2015 08:27:56 +0000
From:	He Kuang <hekuang@...wei.com>
To:	<wangnan0@...wei.com>, <paulus@...ba.org>,
	<a.p.zijlstra@...llo.nl>, <mingo@...hat.com>, <acme@...nel.org>,
	<namhyung@...nel.org>, <jolsa@...nel.org>, <ast@...mgrid.com>,
	<masami.hiramatsu.pt@...achi.com>, <dsahern@...il.com>,
	<brendan.d.gregg@...il.com>, <daniel@...earbox.net>
CC:	<lizefan@...wei.com>, <linux-kernel@...r.kernel.org>
Subject: [RFC PATCH v2 00/15] perf bpf: Probing with local variable

This is the 2nd version of perf bpf: Probing with local variable,
original discusions: https://lkml.org/lkml/2015/5/5/260.

Patches based on https://lkml.org/lkml/2015/5/17/84 (perf tools:
introduce 'perf bpf' command to load eBPF programs).

v1-v2:

  - Copy bpf byte-code related headers to tools/lib/bpf.
  
  - Combine pt_regs offset to arch_regs_table, and add
    calling_regs_table.
    
  - Support $params without debuginfo and use the same keyword for
    generating bpf prologue without debuginfo.
    
  - Save bpf prologue intermediate result to stack, so we can use the
    4 regs(R2,R3,R4,R5) for variable passing according to bpf calling
    convention.
    
  - Move bpf prologue code to tools/lib/bpf.
  
  - Sample codes in patch instead of comments.
  
  - Fix code style problems mentioned by Alexei and Masami.

Thanks.

He Kuang (15):
  perf tools: Add lib/bpf to cscope target list
  perf bpf: Support custom vmlinux path
  perf bpf: Save pt_regs info from debuginfo
  perf tools: Add functions to get calling regs
  perf tools: Add pt_regs offsets and calling regs for x86
  bpf tools: Add headers for generating bpf bytecode
  bpf tools: Convert arglist to bpf prologue
  bpf tools: Fetch calling regs to bpf arglist
  perf probe: Support $params without debuginfo
  perf bpf: Process debuginfo for generating bpf prologue
  perf bpf: Synthesize vars to generate bpf prologue
  perf bpf: Generate bpf prologue without debuginfo
  perf bpf: Combine bpf prologue and bpf prog
  samples/bpf: Add sample for testing bpf fetch args
  samples/bpf: Add sample for no-debuginfo case

 samples/bpf/Makefile                              |   2 +
 samples/bpf/sample_bpf_fetch_args.c               |  62 +++++++
 samples/bpf/sample_bpf_fetch_args_without_debug.c |  49 ++++++
 tools/lib/bpf/Build                               |   2 +-
 tools/lib/bpf/bpf.h                               | 187 +++++++++++++++++++++
 tools/lib/bpf/gen_prologue.c                      | 127 ++++++++++++++
 tools/lib/bpf/libbpf.c                            |  27 +++
 tools/lib/bpf/libbpf.h                            |  14 ++
 tools/perf/Makefile.perf                          |   2 +-
 tools/perf/arch/x86/util/dwarf-regs.c             | 100 ++++++++---
 tools/perf/builtin-bpf.c                          |   3 +
 tools/perf/util/bpf-loader.c                      |  27 +++
 tools/perf/util/include/dwarf-regs.h              |  15 ++
 tools/perf/util/probe-event.c                     | 121 ++++++++++++++
 tools/perf/util/probe-event.h                     |   3 +
 tools/perf/util/probe-finder.c                    | 193 ++++++++++++++++++++++
 tools/perf/util/probe-finder.h                    |   4 +
 17 files changed, 915 insertions(+), 23 deletions(-)
 create mode 100644 samples/bpf/sample_bpf_fetch_args.c
 create mode 100644 samples/bpf/sample_bpf_fetch_args_without_debug.c
 create mode 100644 tools/lib/bpf/gen_prologue.c

--
1.8.5.2

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ