Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2135482ybd; Thu, 27 Jun 2019 07:20:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqz7arzUHGnfMq9OeHREVR457k1uYe1tLnT43KrLBMmr19imnXpDVV7VQf3C0GioSSQs/LtX X-Received: by 2002:a17:90a:3544:: with SMTP id q62mr6466717pjb.53.1561645254395; Thu, 27 Jun 2019 07:20:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561645254; cv=none; d=google.com; s=arc-20160816; b=OWbmSY8jfLwhaOC0rTe1QGkCc29cyRn1tFHUOGZTmc5uBoK7qjKW5rsTk94LM6ARse f2lrefO5Nsbxy7r4ezUJFOzJ9r8sACdi+F5J1xZ5Ewn9RdBrslVGsO+I4jXp4pd+oNLt iQtQfYQYPrByRN1J3ft2Ui6y/g/+HePekOIczJp4lfVookNZEN+tHbf3kMec5QCNACLW 1GlyD2k64HsvMlMxI/jjO4AOrIaCER8YKG6psflvhQULgIE7UDzkXMcCsXDpSI/Sw8em SsxOCMQTv1VWr9W2Xzn4UlTqBGzUYXiNMd+BegHc4m9vi7kIM8fRO5h9yvG+EkkYVKMO dXHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=y2ecUb2iqja/ynGBbvNjsXELfwojKiGS9CyCox+IH+M=; b=jE/cxXHH4oPglG8SJ/z0dRRdEO7F+WB2oeBdrgJ3OZaCfkTbBUpZof3c2xOVTHesrF PiJFksOIhptFACiARX250ctUIArRQvzp/m+0xyGWZfGyA/no2AJekU65mlcI+W5sgYYz Kg8sS5068LCWTv6SEsug8qU/8HnI0M58VGYNGLm/DXYMFdB2YREvLQSCA+8OD+eNw8La D1T69lhZPJnTLty1NtE4a1MDvpdHEWyhJRqHH0zhjjCGEj4mWS2bZjyeq/kaXWDedNMc 8RUwqlGTkp+gq4FmmX2OeQdyDC/Ea0uGI+34+PYXdHgOl7uhGF+cXdj1GaNGSWf5/qaQ rHKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vuaBI8+R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bg11si5102318pjb.72.2019.06.27.07.20.36; Thu, 27 Jun 2019 07:20:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vuaBI8+R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726675AbfF0OTI (ORCPT + 99 others); Thu, 27 Jun 2019 10:19:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:53254 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726370AbfF0OTI (ORCPT ); Thu, 27 Jun 2019 10:19:08 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8E7C82085A; Thu, 27 Jun 2019 14:19:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561645147; bh=7l+G3OI0iTgTgknQe8KxTvPvTzZQhJrekFsGJa7hyYg=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=vuaBI8+RGyRA8VSmPV72RvBXWywSPtbT9Vo+BrkEqDUqYYOiMToYzu3B05OxLgjSA A4k/L1zJOW1anoyAmsHn+oh686egYKzYMeia7AUFamQ18WFYuEMXkrtBOVRxub9nDe WznU6i9/a3Y5YxGxGbvPJ1vk9Vv+8tdN9KAlG+0I= Date: Thu, 27 Jun 2019 23:19:03 +0900 From: Masami Hiramatsu To: "Naveen N. Rao" Cc: Michael Ellerman , Steven Rostedt , Ingo Molnar , Nicholas Piggin , , Subject: Re: [PATCH v2 7/7] powerpc/kprobes: Allow probing on any ftrace address Message-Id: <20190627231903.79166dc2647c475de245b37d@kernel.org> In-Reply-To: References: X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 27 Jun 2019 16:53:55 +0530 "Naveen N. Rao" wrote: > With KPROBES_ON_FTRACE, kprobe is allowed to be inserted on instructions > that branch to _mcount (referred to as ftrace location). With > -mprofile-kernel, we now include the preceding 'mflr r0' as being part > of the ftrace location. > > However, by default, probing on an instruction that is not actually the > branch to _mcount() is prohibited, as that is considered to not be at an > instruction boundary. This is not the case on powerpc, so allow the same > by overriding arch_check_ftrace_location() > > In addition, we update kprobe_ftrace_handler() to detect this scenarios > and to pass the proper nip to the pre and post probe handlers. > > Signed-off-by: Naveen N. Rao Looks good to me. Reviewed-by: Masami Hiramatsu Thank you! > --- > arch/powerpc/kernel/kprobes-ftrace.c | 32 +++++++++++++++++++++++++++- > 1 file changed, 31 insertions(+), 1 deletion(-) > > diff --git a/arch/powerpc/kernel/kprobes-ftrace.c b/arch/powerpc/kernel/kprobes-ftrace.c > index 972cb28174b2..23c840748183 100644 > --- a/arch/powerpc/kernel/kprobes-ftrace.c > +++ b/arch/powerpc/kernel/kprobes-ftrace.c > @@ -12,15 +12,35 @@ > #include > #include > > +/* > + * With -mprofile-kernel, we patch two instructions -- the branch to _mcount > + * as well as the preceding 'mflr r0'. Both these instructions are claimed > + * by ftrace and we should allow probing on either instruction. > + */ > +int arch_check_ftrace_location(struct kprobe *p) > +{ > + if (ftrace_location((unsigned long)p->addr)) > + p->flags |= KPROBE_FLAG_FTRACE; > + return 0; > +} > + > /* Ftrace callback handler for kprobes */ > void kprobe_ftrace_handler(unsigned long nip, unsigned long parent_nip, > struct ftrace_ops *ops, struct pt_regs *regs) > { > struct kprobe *p; > + int mflr_kprobe = 0; > struct kprobe_ctlblk *kcb; > > p = get_kprobe((kprobe_opcode_t *)nip); > - if (unlikely(!p) || kprobe_disabled(p)) > + if (!p) { > + p = get_kprobe((kprobe_opcode_t *)(nip - MCOUNT_INSN_SIZE)); > + if (unlikely(!p)) > + return; > + mflr_kprobe = 1; > + } > + > + if (kprobe_disabled(p)) > return; > > kcb = get_kprobe_ctlblk(); > @@ -33,6 +53,9 @@ void kprobe_ftrace_handler(unsigned long nip, unsigned long parent_nip, > */ > regs->nip -= MCOUNT_INSN_SIZE; > > + if (mflr_kprobe) > + regs->nip -= MCOUNT_INSN_SIZE; > + > __this_cpu_write(current_kprobe, p); > kcb->kprobe_status = KPROBE_HIT_ACTIVE; > if (!p->pre_handler || !p->pre_handler(p, regs)) { > @@ -45,6 +68,8 @@ void kprobe_ftrace_handler(unsigned long nip, unsigned long parent_nip, > kcb->kprobe_status = KPROBE_HIT_SSDONE; > p->post_handler(p, regs, 0); > } > + if (mflr_kprobe) > + regs->nip += MCOUNT_INSN_SIZE; > } > /* > * If pre_handler returns !0, it changes regs->nip. We have to > @@ -57,6 +82,11 @@ NOKPROBE_SYMBOL(kprobe_ftrace_handler); > > int arch_prepare_kprobe_ftrace(struct kprobe *p) > { > + if ((unsigned long)p->addr & 0x03) { > + pr_err("Attempt to register kprobe at an unaligned address\n"); > + return -EILSEQ; > + } > + > p->ainsn.insn = NULL; > p->ainsn.boostable = -1; > return 0; > -- > 2.22.0 > -- Masami Hiramatsu