From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10818 invoked by alias); 16 Sep 2013 19:49:58 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 10808 invoked by uid 89); 16 Sep 2013 19:49:58 -0000 Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 16 Sep 2013 19:49:58 +0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-4.1 required=5.0 tests=AWL,BAYES_00,KHOP_THREADED,RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id r8GJntOY014317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Mon, 16 Sep 2013 15:49:55 -0400 Received: from [10.13.129.101] (dhcp129-101.rdu.redhat.com [10.13.129.101]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id r8GJntxZ030794 for ; Mon, 16 Sep 2013 15:49:55 -0400 Message-ID: <523760E3.5060608@redhat.com> Date: Mon, 16 Sep 2013 19:49:00 -0000 From: William Cohen User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130805 Thunderbird/17.0.8 MIME-Version: 1.0 To: systemtap@sourceware.org Subject: Re: ARM, SystemTap, userspace probing, and hardware assisted virtualization References: <522F7C22.1010901@redhat.com> In-Reply-To: <522F7C22.1010901@redhat.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2013-q3/txt/msg00315.txt.bz2 On 09/10/2013 04:08 PM, William Cohen wrote: > Last week Frank mentioned there were some patches for uprobes on ARM (https://blueprints.launchpad.net/linux-linaro/+spec/arm-uprobes). I have taken a look at the patches and built a local kernel for my Samsung Chromebook that included those patches. I thought this is cool! These allow probing user-space applications on ARM. But then the question was "What would be an interesting user-space application to probe?" Then I thought about another new feature that is available on ARM, kvm hardware acceleration for virtualization. With some more tweaking of the 3.11 kernel I was able to get a kernel that supports KVM on arm. I also needed very new versions of elfutils, qemu, and systemtap rpms installed on the machine. > > With the host set up I was able to set up a guest Fedora 18 vm based on the instructions at https://fedoraproject.org/wiki/Architectures/ARM/F18/Versatile_Express. With this guest vm running I can run the qemu_count.stp example. Things are not perfect (some args locations can't be parsed), but at least to the point of getting some interesting information on ARM: A bit more playing around with hardware virtuatlization acceleration on arm. I got a stock fedora 19 image guest image set up on the chromebook. The kvm support is working well enough to build systemtap and test systemtap within the guest. The results look pretty respectable. This is the stock fedora arm 3.9.5-301.fc19.armv7hl kernel that doesn't support uprobes and a older elfutils that may not find argument in some cases (https://admin.fedoraproject.org/updates/FEDORA-2013-15993/elfutils-0.156-5.fc19?_csrf_token=5628cac0c8d25fdcd58f68f73a4cc019fcd0439c). === systemtap Summary === # of expected passes 1744 # of unexpected failures 85 # of expected failures 280 # of known failures 10 # of untested testcases 367 # of unsupported tests 12 More detailed breakdown of the results are at: https://web.elastic.org/~dejazilla/viewsummary.php?summary=%3D%27%3C52375620.5080708%40redhat.com%3E%27 -Will