All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v4 0/3] Fix the incorrect register read for syscalls on x86_64
@ 2022-01-19 13:12 Kenta Tada
  2022-01-19 13:12 ` [PATCH v4 1/3] libbpf: Extract syscall wrapper Kenta Tada
                   ` (2 more replies)
  0 siblings, 3 replies; 10+ messages in thread
From: Kenta Tada @ 2022-01-19 13:12 UTC (permalink / raw)
  To: andrii, bpf
  Cc: ast, daniel, kafai, songliubraving, yhs, john.fastabend, kpsingh,
	Kenta Tada

Currently, rcx is read as the fourth parameter of syscall on x86_64.
But x86_64 Linux System Call convention uses r10 actually.
This commit adds the wrapper for users who want to access to
syscall params to analyze the user space.

Changelog:
----------
v1 -> v2:
- Rebase to current bpf-next
https://lore.kernel.org/bpf/20211222213924.1869758-1-andrii@kernel.org/

v2 -> v3:
- Modify the definition of SYSCALL macros for only targeted archs.
- Define __BPF_TARGET_MISSING variants for completeness.
- Remove CORE variants. These macros will not be used.
- Add a selftest.

v3 -> v4:
- Modify a selftest not to use serial tests.
- Modify a selftest to use ASSERT_EQ().
- Extract syscall wrapper for all the other tests.
- Add CORE variants.

Kenta Tada (3):
  libbpf: Extract syscall wrapper
  libbpf: Fix the incorrect register read for syscalls on x86_64
  libbpf: Add a test to confirm PT_REGS_PARM4_SYSCALL

 tools/lib/bpf/bpf_tracing.h                   | 34 +++++++++++++
 .../bpf/prog_tests/test_bpf_syscall_macro.c   | 49 ++++++++++++++++++
 tools/testing/selftests/bpf/progs/bpf_misc.h  | 19 +++++++
 .../selftests/bpf/progs/bpf_syscall_macro.c   | 51 +++++++++++++++++++
 .../selftests/bpf/progs/test_probe_user.c     | 15 +-----
 5 files changed, 154 insertions(+), 14 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/prog_tests/test_bpf_syscall_macro.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_misc.h
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_syscall_macro.c

-- 
2.32.0


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2022-01-20 23:39 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-01-19 13:12 [PATCH v4 0/3] Fix the incorrect register read for syscalls on x86_64 Kenta Tada
2022-01-19 13:12 ` [PATCH v4 1/3] libbpf: Extract syscall wrapper Kenta Tada
2022-01-19 13:12 ` [PATCH v4 2/3] libbpf: Fix the incorrect register read for syscalls on x86_64 Kenta Tada
2022-01-19 18:33   ` Andrii Nakryiko
2022-01-20 22:56     ` Kenta.Tada
2022-01-20 23:01       ` Andrii Nakryiko
2022-01-20 23:34         ` Kenta.Tada
2022-01-20 23:38           ` Kenta.Tada
2022-01-19 13:12 ` [PATCH v4 3/3] libbpf: Add a test to confirm PT_REGS_PARM4_SYSCALL Kenta Tada
2022-01-19 18:37   ` Andrii Nakryiko

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.