Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp1863646pxa; Sat, 29 Aug 2020 06:04:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJykEYGDLtgTJIrNTAKXbn2Q5q0lJlLxSTCwFtRjLhvwpQsmj5nyRGk66wF4ZZwxH6t8uX1y X-Received: by 2002:a50:8f45:: with SMTP id 63mr3473213edy.52.1598706298060; Sat, 29 Aug 2020 06:04:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598706298; cv=none; d=google.com; s=arc-20160816; b=y8bEescbl+87cEtVRFjyn9qqXLiO7Lq0WGR0hDg5EncUsYgZc3gXF7jE1pJ3L2/ffq tz2OktUmh+jJNCIUTbmLqtBwA7i0VFldGW9D+TZn38BtihsXAWrJPWvMIXEWl4I621Jq 74/2Gc6hnoVf598ElWzK8MZvX0y/KS68k/FJAZ/tQM96SbvSURrKPFwExXBuj5Qh9y40 eynAs649wvJdz2qIpKoBvE7y+F3NclUt9cH45pBr19Xeldq53us6Y01M/DilJHjvgqjw WymjtcOrFZ2sK1OFuiHgE0sOiFY/kkT2fsn9AQFZOXImEb8BOXTngVIAu8CIwQ6EDGJw Whtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Z1hupiGFr3Bh6WbqYAdNVqJtQj6uqMbz2s9B4NoDizE=; b=r/ewoglwif+9yhRkS3SYo/pZ7yiYhCjT9kkXNzzbktLeX1eZjNx0bb2fqlOs3GJbdX UPCwDYvEdjVKFsGN7eq6FGo3yyP7jhQH137ZbqsaphuL4zVXakQkPUJJegiej7vapY+5 GEj3zmXdJjlrsaFzqPx0tXT9bbdINCej0HDDWNFoGpYQkqZYKPiZGHTNz4ztGf+NcKJg rHQILH7/cZxbyxY+QZmlJ5dwN3EcJ5Xf8dRrTouxoJ4ur4sShZMPMHxMEIPC3aA2aNUo DKqHUz4ThSVzrAA/cixo3v01o14uUjrLC65hy/wqjc8FnOUCEKjOy1Jkvd8ZRhHafv9f iWVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lNod0N7K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b9si1359337edn.357.2020.08.29.06.04.35; Sat, 29 Aug 2020 06:04:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lNod0N7K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728164AbgH2NCv (ORCPT + 99 others); Sat, 29 Aug 2020 09:02:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:52114 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728048AbgH2NAT (ORCPT ); Sat, 29 Aug 2020 09:00:19 -0400 Received: from localhost.localdomain (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E37F2207DA; Sat, 29 Aug 2020 13:00:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598706018; bh=t3Ss8BYGx1FsgHE7EPU3Hta7BHA6JM4QHfGWj7yBMLY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lNod0N7KAgm5Adg0poIfn4f+rBeURLKTMc5jQT2tUcVI4FoIgiPSqgW7OtkWr4dBQ nAcjXlu7grHBMXEvYNrgGbQFmkJ3+FXwHkYKLNAcJwMmYxMs7HzxV/2luLYBGn/z1L JunoXCs2ckpMjwJSBFQBTwkVCla8/MYmDcCTwugQ= From: Masami Hiramatsu To: linux-kernel@vger.kernel.org, Peter Zijlstra Cc: Eddy_Wu@trendmicro.com, x86@kernel.org, davem@davemloft.net, rostedt@goodmis.org, naveen.n.rao@linux.ibm.com, anil.s.keshavamurthy@intel.com, linux-arch@vger.kernel.org, cameron@moodycamel.com, oleg@redhat.com, will@kernel.org, paulmck@kernel.org, mhiramat@kernel.org Subject: [PATCH v5 02/21] x86/kprobes: Use generic kretprobe trampoline handler Date: Sat, 29 Aug 2020 22:00:12 +0900 Message-Id: <159870601250.1229682.14598707734683575237.stgit@devnote2> X-Mailer: git-send-email 2.25.1 In-Reply-To: <159870598914.1229682.15230803449082078353.stgit@devnote2> References: <159870598914.1229682.15230803449082078353.stgit@devnote2> User-Agent: StGit/0.19 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Signed-off-by: Masami Hiramatsu --- arch/x86/kernel/kprobes/core.c | 108 +--------------------------------------- 1 file changed, 3 insertions(+), 105 deletions(-) diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c index fdadc37d72af..882b95313ad6 100644 --- a/arch/x86/kernel/kprobes/core.c +++ b/arch/x86/kernel/kprobes/core.c @@ -767,124 +767,22 @@ asm( NOKPROBE_SYMBOL(kretprobe_trampoline); STACK_FRAME_NON_STANDARD(kretprobe_trampoline); + /* * Called from kretprobe_trampoline */ __used __visible void *trampoline_handler(struct pt_regs *regs) { - struct kretprobe_instance *ri = NULL; - struct hlist_head *head, empty_rp; - struct hlist_node *tmp; - unsigned long flags, orig_ret_address = 0; - unsigned long trampoline_address = (unsigned long)&kretprobe_trampoline; - kprobe_opcode_t *correct_ret_addr = NULL; - void *frame_pointer; - bool skipped = false; - - /* - * Set a dummy kprobe for avoiding kretprobe recursion. - * Since kretprobe never run in kprobe handler, kprobe must not - * be running at this point. - */ - kprobe_busy_begin(); - - INIT_HLIST_HEAD(&empty_rp); - kretprobe_hash_lock(current, &head, &flags); /* fixup registers */ regs->cs = __KERNEL_CS; #ifdef CONFIG_X86_32 regs->cs |= get_kernel_rpl(); regs->gs = 0; #endif - /* We use pt_regs->sp for return address holder. */ - frame_pointer = ®s->sp; - regs->ip = trampoline_address; + regs->ip = (unsigned long)&kretprobe_trampoline; regs->orig_ax = ~0UL; - /* - * It is possible to have multiple instances associated with a given - * task either because multiple functions in the call path have - * return probes installed on them, and/or more than one - * return probe was registered for a target function. - * - * We can handle this because: - * - instances are always pushed into the head of the list - * - when multiple return probes are registered for the same - * function, the (chronologically) first instance's ret_addr - * will be the real return address, and all the rest will - * point to kretprobe_trampoline. - */ - hlist_for_each_entry(ri, head, hlist) { - if (ri->task != current) - /* another task is sharing our hash bucket */ - continue; - /* - * Return probes must be pushed on this hash list correct - * order (same as return order) so that it can be popped - * correctly. However, if we find it is pushed it incorrect - * order, this means we find a function which should not be - * probed, because the wrong order entry is pushed on the - * path of processing other kretprobe itself. - */ - if (ri->fp != frame_pointer) { - if (!skipped) - pr_warn("kretprobe is stacked incorrectly. Trying to fixup.\n"); - skipped = true; - continue; - } - - orig_ret_address = (unsigned long)ri->ret_addr; - if (skipped) - pr_warn("%ps must be blacklisted because of incorrect kretprobe order\n", - ri->rp->kp.addr); - - if (orig_ret_address != trampoline_address) - /* - * This is the real return address. Any other - * instances associated with this task are for - * other calls deeper on the call stack - */ - break; - } - - kretprobe_assert(ri, orig_ret_address, trampoline_address); - - correct_ret_addr = ri->ret_addr; - hlist_for_each_entry_safe(ri, tmp, head, hlist) { - if (ri->task != current) - /* another task is sharing our hash bucket */ - continue; - if (ri->fp != frame_pointer) - continue; - - orig_ret_address = (unsigned long)ri->ret_addr; - if (ri->rp && ri->rp->handler) { - __this_cpu_write(current_kprobe, &ri->rp->kp); - ri->ret_addr = correct_ret_addr; - ri->rp->handler(ri, regs); - __this_cpu_write(current_kprobe, &kprobe_busy); - } - - recycle_rp_inst(ri, &empty_rp); - - if (orig_ret_address != trampoline_address) - /* - * This is the real return address. Any other - * instances associated with this task are for - * other calls deeper on the call stack - */ - break; - } - - kretprobe_hash_unlock(current, &flags); - - kprobe_busy_end(); - - hlist_for_each_entry_safe(ri, tmp, &empty_rp, hlist) { - hlist_del(&ri->hlist); - kfree(ri); - } - return (void *)orig_ret_address; + return (void *)kretprobe_trampoline_handler(regs, &kretprobe_trampoline, ®s->sp); } NOKPROBE_SYMBOL(trampoline_handler);