Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp1843409pxu; Sat, 17 Oct 2020 03:05:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy4hldYC+KacySER+coDAN4lJ1PucmI+LxuTjbbjgEASAIt3WCA+ermea7vKqcCpUnhmsRT X-Received: by 2002:a05:6402:1684:: with SMTP id a4mr8855556edv.319.1602929148471; Sat, 17 Oct 2020 03:05:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602929148; cv=none; d=google.com; s=arc-20160816; b=1EuElvxSlsM3jSGunGF+ZqAvMJAA1sCxEYflMTpTLKCJkgYGUnLESJ9v9nMSSkvZ0u pDHT5N/pkZFAejKASekte8ebvWrBZ65M5hIA/3PijHm7DgKh49UcQjbX4tzP5TEhL3y/ 1hDz33CctpR3gJna6mWDi3XQUOzE/Tb8oQnqqYDglykO3HIK4HsErObTQUtWf3fKqhBI yZp2c36Lokqi1jQp8k/r6nL974MCGlp7PqwS7AdolW77y7b9I8burRAvI66Gu8DFwAH1 ce5ZI1dlu70Ug6I5ZmUhskkKJBLUgY16oUmvAtGEU/MWeRbLvCRiRfmwlIRv/+MaOCH2 yWsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=cXuq/DVVyFadUOiEwe1wRLPXPmx6WhYdU2vf/GVDTNI=; b=TgpmvNlBhAWCXlh0aRj1ZcVB/HQXkbLRVVnmHfNpFEvTwxYtrpSkZhov2VxQvSQENk 6SQHjigdQdER1JSurc+1QWwKsLGGJcBaOQ9QMHczMEqepBJxyWChwdifAA1G7vZnEG4b XopskUAoqNM83+vJzYsCvgny+F3kIcb9Eq3Flz6MnmRT1ymTzBjVWsOI6ryy8zTJ/bAX sszWy0iCz1NVBJ8Haa3+erEIk6Dvu2EfQYIGKf10K+8A5g4Wdg14xyeqW1quMEbXY4/b uqSCTgosKT4sQTMoWUA21sSoZaMjmySi0GHEVF917zrZy6AjbrDGm6EfJREwN8uImx7N g0Vg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BuGT97ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd16si3526006ejb.505.2020.10.17.03.05.26; Sat, 17 Oct 2020 03:05:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BuGT97ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437408AbgJQHHj (ORCPT + 99 others); Sat, 17 Oct 2020 03:07:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:48428 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437262AbgJQHHi (ORCPT ); Sat, 17 Oct 2020 03:07:38 -0400 Received: from localhost.localdomain (89.208.247.74.16clouds.com [89.208.247.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 541C820780; Sat, 17 Oct 2020 07:07:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602918458; bh=cnrTuRuyF661UaIqGnTRsOmgOyysiciU8maSZIvVeyk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BuGT97edZaDOn9C7tZhcrYqX9mJDEmgsJojVtKr/VO2GlOjJMPAXwECNQh0HiUiuA SVmMkFmG2eaYvsi76HKNZx+4vDt1Ao3IgoFlY5vsgrPTNnzSyHSyTbE7JFOu9qoqhL egzzisy2F3iucLcXvL4LoTW1yxkt3wHfZjL1xdM0= From: guoren@kernel.org To: palmerdabbelt@google.com, paul.walmsley@sifive.com, mhiramat@kernel.org, alankao@andestech.com, rostedt@goodmis.org Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, anup@brainfault.org, linux-csky@vger.kernel.org, greentime.hu@sifive.com, zong.li@sifive.com, guoren@kernel.org, me@packi.ch, Guo Ren Subject: [PATCH v4 8/9] riscv: Add support for function error injection Date: Sat, 17 Oct 2020 07:06:16 +0000 Message-Id: <1602918377-23573-9-git-send-email-guoren@kernel.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1602918377-23573-1-git-send-email-guoren@kernel.org> References: <1602918377-23573-1-git-send-email-guoren@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guo Ren Inspired by the commit 42d038c4fb00 ("arm64: Add support for function error injection"), this patch supports function error injection for riscv. This patch mainly support two functions: one is regs_set_return_value() which is used to overwrite the return value; the another function is override_function_with_return() which is to override the probed function returning and jump to its caller. Test log: cd /sys/kernel/debug/fail_function echo sys_clone > inject echo 100 > probability echo 1 > interval ls / [ 313.176875] FAULT_INJECTION: forcing a failure. [ 313.176875] name fail_function, interval 1, probability 100, space 0, times 1 [ 313.184357] CPU: 0 PID: 87 Comm: sh Not tainted 5.8.0-rc5-00007-g6a758cc #117 [ 313.187616] Call Trace: [ 313.189100] [] walk_stackframe+0x0/0xc2 [ 313.191626] [] show_stack+0x40/0x4c [ 313.193927] [] dump_stack+0x7c/0x96 [ 313.194795] [] should_fail+0x140/0x142 [ 313.195923] [] fei_kprobe_handler+0x2c/0x5a [ 313.197687] [] kprobe_breakpoint_handler+0xb4/0x18a [ 313.200054] [] do_trap_break+0x36/0xca [ 313.202147] [] ret_from_exception+0x0/0xc [ 313.204556] [] ret_from_syscall+0x0/0x2 -sh: can't fork: Invalid argument Signed-off-by: Guo Ren Reviewed-by: Masami Hiramatsu Cc: Palmer Dabbelt Cc: Paul Walmsley --- arch/riscv/Kconfig | 1 + arch/riscv/include/asm/ptrace.h | 6 ++++++ arch/riscv/lib/Makefile | 2 ++ arch/riscv/lib/error-inject.c | 10 ++++++++++ 4 files changed, 19 insertions(+) create mode 100644 arch/riscv/lib/error-inject.c diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index 4081ecf..3d094fd 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -66,6 +66,7 @@ config RISCV select HAVE_EBPF_JIT if MMU select HAVE_FUTEX_CMPXCHG if FUTEX select HAVE_GCC_PLUGINS + select HAVE_FUNCTION_ERROR_INJECTION select HAVE_GENERIC_VDSO if MMU && 64BIT select HAVE_KPROBES select HAVE_KPROBES_ON_FTRACE diff --git a/arch/riscv/include/asm/ptrace.h b/arch/riscv/include/asm/ptrace.h index 23372bb..cb4abb6 100644 --- a/arch/riscv/include/asm/ptrace.h +++ b/arch/riscv/include/asm/ptrace.h @@ -109,6 +109,12 @@ static inline unsigned long regs_return_value(struct pt_regs *regs) return regs->a0; } +static inline void regs_set_return_value(struct pt_regs *regs, + unsigned long val) +{ + regs->a0 = val; +} + extern int regs_query_register_offset(const char *name); extern unsigned long regs_get_kernel_stack_nth(struct pt_regs *regs, unsigned int n); diff --git a/arch/riscv/lib/Makefile b/arch/riscv/lib/Makefile index 0d0db80..04baa93 100644 --- a/arch/riscv/lib/Makefile +++ b/arch/riscv/lib/Makefile @@ -4,3 +4,5 @@ lib-y += memcpy.o lib-y += memset.o lib-y += uaccess.o lib-$(CONFIG_64BIT) += tishift.o + +obj-$(CONFIG_FUNCTION_ERROR_INJECTION) += error-inject.o diff --git a/arch/riscv/lib/error-inject.c b/arch/riscv/lib/error-inject.c new file mode 100644 index 00000000..d667ade --- /dev/null +++ b/arch/riscv/lib/error-inject.c @@ -0,0 +1,10 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include + +void override_function_with_return(struct pt_regs *regs) +{ + instruction_pointer_set(regs, regs->ra); +} +NOKPROBE_SYMBOL(override_function_with_return); -- 2.7.4