Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp334088ybh; Wed, 22 Jul 2020 01:41:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJJk6pTQKGNV0NntqlX6/loJ7QJUFpoYFYMVYn3VJHQjvNcO5odmcg+GGks+cHXJD+had7 X-Received: by 2002:a17:906:c30b:: with SMTP id s11mr29674342ejz.263.1595407262858; Wed, 22 Jul 2020 01:41:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595407262; cv=none; d=google.com; s=arc-20160816; b=PTW1zJXT0sGwQAsHb1UEwY6a+Yry24QuC2w6fQEIwZ2bRHmAXbqMouyCw3VkoVlXko B4DYMS1CK8TNMHKXhnnu6zdgm17zL+W9TpyPasknmD2ijdoGstJU/Fj+hSV1XkyouN/l 1ZbSFKRfuQEENBjBUMHolnoEoD+hTy1WgRscrn3UcjS6AI2u2ggSDeOvAYMaUHZfvMB4 /xdB+MJMLrppIqtdV0ZlX/fWLm1shansjpr769CvpNSm+JH73ziuBgnYcmg+OMHhuM8I jDerDFSLRRftpLYjicYNGa+9+LG3pA3Ts+gxpaGH/pQfeLGlNan3XF1huotR4jJoWcjk 226Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=/tZKhhl60zBo+76HONg+bdQXcTgT6eq3hvBOmUnJdQI=; b=VDLhdiiXaBKcKUcDzzV7KdV8pC13jrQBjwcOY+fmI7o4A4JDOHjXUC7jo64Pqpm113 7s4pnMWbHtt9G1DHkg4XdFnqnJiirwR6OR8Hw5iMfUDFM7eK4tLjI2/bZoxbNjBIkKdy 93uDXo1Z9fqgKAGoQkOQ7er9Vpz4jDXmafGTSKnlSUu42gFIi7BIOZcHv7KCczopd0jY T8MqXc76SGwI/MugCu3YVFzKlFkCjaTPuzYUfXz4Xyqs/QhFmElZG6khcSfowzhciWKo LesI7VypJU/mxPiefwWwAOFW1FGtBRNDzKatM2pN0Oix3m59LPpf/RPFm4I2w5JrYfdO 9R9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XMHZYDe+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u23si13878265eds.479.2020.07.22.01.40.40; Wed, 22 Jul 2020 01:41:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XMHZYDe+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728870AbgGVIkI (ORCPT + 99 others); Wed, 22 Jul 2020 04:40:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:40854 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726930AbgGVIkI (ORCPT ); Wed, 22 Jul 2020 04:40:08 -0400 Received: from mail-lf1-f43.google.com (mail-lf1-f43.google.com [209.85.167.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 31C932084D; Wed, 22 Jul 2020 08:40:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595407207; bh=VE9TEy4TaBrXAUOfVps22D3GyNc1Lgjd/KIVOsr7iRE=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=XMHZYDe+HsqdgolM4FM11vgpgBo8oGNFi12pM1TVZ6sjBUvaLd9cUwKAOd7RYyuxP MBUaWckX7gAQthcfoY7rZOdxuysoT0ZKMswKBL6X/iA+JS2AIm7g7d3FOVHpmAxFXO MnPJx7OxZLdvV0r/ix+jzajqQAJpF+NAUyrRVZNQ= Received: by mail-lf1-f43.google.com with SMTP id u25so871745lfm.1; Wed, 22 Jul 2020 01:40:07 -0700 (PDT) X-Gm-Message-State: AOAM530ALQBhhL6yH+zCbKaGHPJbSxIGVB5BC8WpnnrZ60ysQBIQbeov B9F/d4P2YXsFlvbjU/2LMEEtXVY02w8sQO+8lKI= X-Received: by 2002:ac2:5935:: with SMTP id v21mr15443904lfi.135.1595407205384; Wed, 22 Jul 2020 01:40:05 -0700 (PDT) MIME-Version: 1.0 References: <1594683562-68149-1-git-send-email-guoren@kernel.org> <1594683562-68149-7-git-send-email-guoren@kernel.org> <20200714203757.512ce7fb5fa61a88b1dbb2f3@kernel.org> <20200721222701.3074315f6a9f6c42c5963f40@kernel.org> In-Reply-To: <20200721222701.3074315f6a9f6c42c5963f40@kernel.org> From: Guo Ren Date: Wed, 22 Jul 2020 16:39:53 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 6/7] riscv: Add KPROBES_ON_FTRACE supported To: Masami Hiramatsu Cc: Palmer Dabbelt , Paul Walmsley , Oleg Nesterov , linux-riscv , Linux Kernel Mailing List , Anup Patel , linux-csky@vger.kernel.org, Greentime Hu , Zong Li , =?UTF-8?Q?Patrick_St=C3=A4hlin?= , =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , Guo Ren , Pekka Enberg Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Masami, On Tue, Jul 21, 2020 at 9:27 PM Masami Hiramatsu wrot= e: > > On Wed, 15 Jul 2020 00:24:54 +0800 > Guo Ren wrote: > > > Thx Masami, > > > > On Tue, Jul 14, 2020 at 7:38 PM Masami Hiramatsu = wrote: > > > > > > On Mon, 13 Jul 2020 23:39:21 +0000 > > > guoren@kernel.org wrote: > > > > > > > From: Guo Ren > > > > > > > > This patch adds support for kprobes on ftrace call sites to avoids > > > > much of the overhead with regular kprobes. Try it with simple > > > > steps: > > > > > > > > 1. Get _do_fork ftrace call site. > > > > Dump of assembler code for function _do_fork: > > > > 0xffffffe00020af64 <+0>: addi sp,sp,-128 > > > > 0xffffffe00020af66 <+2>: sd s0,112(sp) > > > > 0xffffffe00020af68 <+4>: sd ra,120(sp) > > > > 0xffffffe00020af6a <+6>: addi s0,sp,128 > > > > 0xffffffe00020af6c <+8>: sd s1,104(sp) > > > > 0xffffffe00020af6e <+10>: sd s2,96(sp) > > > > 0xffffffe00020af70 <+12>: sd s3,88(sp) > > > > 0xffffffe00020af72 <+14>: sd s4,80(sp) > > > > 0xffffffe00020af74 <+16>: sd s5,72(sp) > > > > 0xffffffe00020af76 <+18>: sd s6,64(sp) > > > > 0xffffffe00020af78 <+20>: sd s7,56(sp) > > > > 0xffffffe00020af7a <+22>: mv s4,a0 > > > > 0xffffffe00020af7c <+24>: mv a0,ra > > > > 0xffffffe00020af7e <+26>: nop <<<<<<<< here! > > > > 0xffffffe00020af82 <+30>: nop > > > > 0xffffffe00020af86 <+34>: ld s3,0(s4) > > > > > > > > 2. Set _do_fork+26 as the kprobe. > > > > echo 'p:myprobe _do_fork+26 dfd=3D%a0 filename=3D%a1 flags=3D%a2 = mode=3D+4($stack)' > /sys/kernel/debug/tracing/kprobe_events > > > > echo 1 > /sys/kernel/debug/tracing/events/kprobes/enable > > > > cat /sys/kernel/debug/tracing/trace > > > > tracer: nop > > > > > > > > entries-in-buffer/entries-written: 3/3 #P:1 > > > > > > > > _-----=3D> irqs-off > > > > / _----=3D> need-resched > > > > | / _---=3D> hardirq/softirq > > > > || / _--=3D> preempt-depth > > > > ||| / delay > > > > TASK-PID CPU# |||| TIMESTAMP FUNCTION > > > > | | | |||| | | > > > > sh-87 [000] .... 551.557031: myprobe: (_do_fork+= 0x1a/0x2e6) dfd=3D0xffffffe00020af7e filename=3D0xffffffe00020b34e flags=3D= 0xffffffe00101e7c0 mode=3D0x20af86ffffffe0 > > > > > > > > cat /sys/kernel/debug/kprobes/list > > > > ffffffe00020af7e k _do_fork+0x1a [FTRACE] > > > > ^^^^^^ > > > > > > Hmm, this seems fentry is not supported on RISC-V yet. But anyway, > > > it will be useful for users (if they can find the offset). > > > > Seems only x86 & =E2=AC=86=EF=B8=8F90 use fentry=EF=BC=8Ccan you elabor= ate more about fentry's > > benefit and how the user could set kprobe on ftrace call site without > > disassemble? > > On x86, the fentry replaces the mcount with just one call instruction, wi= thout > saving any arguments. This means all probes which are puts on the address= of > target symbol, are automatically using ftrace. IOW, all probes on _do_for= k+0 > will use ftrace. We don't need any disassembling. > > I think if RISC-V already support "-fpatchable-function-entry=3D2" option= on > GCC, you can easily enable it as same as arm64. See https://lkml.org/lkml= /2019/6/18/648 the link is: [PATCH 0/7] powerpc/ftrace: Patch out -mprofile-kernel instructions Is that right? --=20 Best Regards Guo Ren ML: https://lore.kernel.org/linux-csky/