linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names
@ 2018-04-18 15:45 Steven Rostedt
  2018-04-18 18:17 ` Dominik Brodowski
  0 siblings, 1 reply; 4+ messages in thread
From: Steven Rostedt @ 2018-04-18 15:45 UTC (permalink / raw)
  To: LKML
  Cc: Ingo Molnar, Thomas Gleixner, H. Peter Anvin,
	Arnaldo Carvalho de Melo, x86, Dominik Brodowski

From: "Steven Rostedt (VMware)" <rostedt@goodmis.org>

Arnaldo noticed that the latest kernel is missing the syscall event system
directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()").

The system call trace events are special, as there is only one trace event
for all system calls (the raw_syscalls). But a macro that wraps the system
calls creates meta data for them that copies the name to find the system
call that maps to the system call table (the number). At boot up, it does a
kallsyms lookup of the system call table to find the function that maps to
the meta data of the system call. If it does not find a function, then that
system call is ignored.

Because the x86 system calls had "__x64_", or "__ia32_" prefixed to the
"sys" for the names, they do not match the default compare algorithm. As
this was a problem for power pc, the algorithm can be overwritten by the
architecture. The solution is to have x86 have its own algorithm to do the
compare and this brings back the system call trace events.

Link: http://lkml.kernel.org/r/20180417174128.0f3457f0@gandalf.local.home

Reported-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Fixes: d5a00528b58c ("syscalls/core, syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()")
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
---

Changes from v2:

  Included check for "__ia32_" as well.

 arch/x86/include/asm/ftrace.h | 12 ++++++++++++
 1 file changed, 12 insertions(+)

diff --git a/arch/x86/include/asm/ftrace.h b/arch/x86/include/asm/ftrace.h
index 09ad88572746..06196a302c89 100644
--- a/arch/x86/include/asm/ftrace.h
+++ b/arch/x86/include/asm/ftrace.h
@@ -31,6 +31,18 @@ static inline unsigned long ftrace_call_adjust(unsigned long addr)
 	return addr;
 }
 
+#define ARCH_HAS_SYSCALL_MATCH_SYM_NAME
+static inline bool arch_syscall_match_sym_name(const char *sym, const char *name)
+{
+	/*
+	 * Compare the symbol name with the system call name. Skip the
+	 * "__x64_sys", "__ia32_sys" or simple "sys" prefix.
+	 */
+	return !strcmp(sym + 3, name + 3) ||
+		(!strncmp(sym, "__x64_", 6) && !strcmp(sym + 9, name + 3)) ||
+		(!strncmp(sym, "__ia32_", 7) && !strcmp(sym + 10, name + 3));
+}
+
 #ifdef CONFIG_DYNAMIC_FTRACE
 
 struct dyn_arch_ftrace {
-- 
2.13.6

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names
  2018-04-18 15:45 [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names Steven Rostedt
@ 2018-04-18 18:17 ` Dominik Brodowski
  2018-04-18 18:19   ` Steven Rostedt
  0 siblings, 1 reply; 4+ messages in thread
From: Dominik Brodowski @ 2018-04-18 18:17 UTC (permalink / raw)
  To: Steven Rostedt
  Cc: LKML, Ingo Molnar, Thomas Gleixner, H. Peter Anvin,
	Arnaldo Carvalho de Melo, x86


On Wed, Apr 18, 2018 at 11:45:09AM -0400, Steven Rostedt wrote:
> From: "Steven Rostedt (VMware)" <rostedt@goodmis.org>
> 
> Arnaldo noticed that the latest kernel is missing the syscall event system
> directory in x86. I bisected it down to d5a00528b58c ("syscalls/core,
> syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()").
> 
> The system call trace events are special, as there is only one trace event
> for all system calls (the raw_syscalls). But a macro that wraps the system
> calls creates meta data for them that copies the name to find the system
> call that maps to the system call table (the number). At boot up, it does a
> kallsyms lookup of the system call table to find the function that maps to
> the meta data of the system call. If it does not find a function, then that
> system call is ignored.
> 
> Because the x86 system calls had "__x64_", or "__ia32_" prefixed to the
> "sys" for the names, they do not match the default compare algorithm. As
> this was a problem for power pc, the algorithm can be overwritten by the
> architecture. The solution is to have x86 have its own algorithm to do the
> compare and this brings back the system call trace events.
> 
> Link: http://lkml.kernel.org/r/20180417174128.0f3457f0@gandalf.local.home
> 
> Reported-by: Arnaldo Carvalho de Melo <acme@redhat.com>
> Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
> Fixes: d5a00528b58c ("syscalls/core, syscalls/x86: Rename struct pt_regs-based sys_*() to __x64_sys_*()")
> Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>

Acked-by: Dominik Brodowski <linux@dominikbrodowski.net>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names
  2018-04-18 18:17 ` Dominik Brodowski
@ 2018-04-18 18:19   ` Steven Rostedt
  2018-04-19 11:15     ` Thomas Gleixner
  0 siblings, 1 reply; 4+ messages in thread
From: Steven Rostedt @ 2018-04-18 18:19 UTC (permalink / raw)
  To: Dominik Brodowski
  Cc: LKML, Ingo Molnar, Thomas Gleixner, H. Peter Anvin,
	Arnaldo Carvalho de Melo, x86

On Wed, 18 Apr 2018 20:17:29 +0200
Dominik Brodowski <linux@dominikbrodowski.net> wrote:

> Acked-by: Dominik Brodowski <linux@dominikbrodowski.net>

Thanks!

Ingo, Thomas, Peter,

I can take this in my tree, as I have a couple of patches that need to
go mainline as well.

OK with you if I do?

-- Steve

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names
  2018-04-18 18:19   ` Steven Rostedt
@ 2018-04-19 11:15     ` Thomas Gleixner
  0 siblings, 0 replies; 4+ messages in thread
From: Thomas Gleixner @ 2018-04-19 11:15 UTC (permalink / raw)
  To: Steven Rostedt
  Cc: Dominik Brodowski, LKML, Ingo Molnar, H. Peter Anvin,
	Arnaldo Carvalho de Melo, x86

On Wed, 18 Apr 2018, Steven Rostedt wrote:
> On Wed, 18 Apr 2018 20:17:29 +0200
> Dominik Brodowski <linux@dominikbrodowski.net> wrote:
> 
> > Acked-by: Dominik Brodowski <linux@dominikbrodowski.net>
> 
> Thanks!
> 
> Ingo, Thomas, Peter,
> 
> I can take this in my tree, as I have a couple of patches that need to
> go mainline as well.
> 
> OK with you if I do?
 
Acked-by: Thomas Gleixner <tglx@linutronix.de>

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2018-04-19 11:15 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-04-18 15:45 [PATCH v3] tracing/x86: Update syscall trace events to handle new prefixed syscall func names Steven Rostedt
2018-04-18 18:17 ` Dominik Brodowski
2018-04-18 18:19   ` Steven Rostedt
2018-04-19 11:15     ` Thomas Gleixner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).