Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1355115pxu; Thu, 17 Dec 2020 08:08:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJwO+pqMZAKDW7vslOJo9NVNUvxmHe7tLyYf0R+SSlD5PveXDcAT4yKy19DSxd+DoeAGi3gD X-Received: by 2002:a17:906:3513:: with SMTP id r19mr35449340eja.445.1608221290172; Thu, 17 Dec 2020 08:08:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608221290; cv=none; d=google.com; s=arc-20160816; b=CbLD1XOieSJUgfG/f71IUYDAr1zGzzJO6K8/gRTt+gnEEocR0GcZz8jAoxzqRqKjy3 ZMwoXJNeUmj5Mh9aE4w8M86tsdNXd3pSLoYq3xOmEC4ye+MEaOVQjBijaeqTyqU+SqK6 ZlRFvnZ2sr2uySqHHCRg1Ryo6QGXEqHtVKztvaEG6mFwtFqthxvbtb9oUKw5jDd3JabH hTXRYiTRx+x+5C5+n9q8R+5jcs+0bvRNnT9r1QhHTWCXGg1Dk0QfXi0BsP4fUUg/VXdr a34jRp9aJwy6npEX8NXPoS0czDfI6r9xZQs4l1+s+aBNrymJjN/KIuwxWclhQL8BCvQl 9kOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=IhKluxZqmms4G+KMLbkvM9BgsHYmRNyR7T59PfUWTO4=; b=NJnAKt7phZRHM9nokSt6dm6LzY7+NQJWbmor5R8vuv7UJ/HXDpwWGMclt7WMPohKJR PE0q6lpkg5dYGfi8177Y6Scj3Wqe29GgIHCesa7Kcr8cDKP5DJGkCBj8CfOWmlgjKAo1 xB2RXKrFAi8ugjk6rMcSQm4Fj2br7bEuwoYp/tbShkyxfHK0CsQx+Fy4Jrftm52TD19j cC2dUCSBYXxOihP2PZdLTQfvjSZZt6spDwgPJe8nj02xyNrG8ZtoCMJDn7IwwQGtq9Hr x6c6Gjyx1Y84Z4VQvnnWCzi/tJd/Nu87aqR96rdpREIqAt6gs8bHPfmKQ5km+QhUNAF7 lhow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m17si2986607ejn.194.2020.12.17.08.07.47; Thu, 17 Dec 2020 08:08:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729970AbgLQQFz (ORCPT + 99 others); Thu, 17 Dec 2020 11:05:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:53944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729951AbgLQQFx (ORCPT ); Thu, 17 Dec 2020 11:05:53 -0500 From: guoren@kernel.org Authentication-Results: mail.kernel.org; dkim=permerror (bad message/signature format) To: palmerdabbelt@google.com, paul.walmsley@sifive.com, mhiramat@kernel.org, alankao@andestech.com, rostedt@goodmis.org, bjorn.topel@intel.com, pdp7pdp7@gmail.com Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, anup@brainfault.org, linux-csky@vger.kernel.org, greentime.hu@sifive.com, zong.li@sifive.com, guoren@kernel.org, me@packi.ch, Guo Ren Subject: [PATCH v5 9/9] riscv: Add support for function error injection Date: Thu, 17 Dec 2020 16:01:45 +0000 Message-Id: <1608220905-1962-10-git-send-email-guoren@kernel.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1608220905-1962-1-git-send-email-guoren@kernel.org> References: <1608220905-1962-1-git-send-email-guoren@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guo Ren Inspired by the commit 42d038c4fb00 ("arm64: Add support for function error injection"), this patch supports function error injection for riscv. This patch mainly support two functions: one is regs_set_return_value() which is used to overwrite the return value; the another function is override_function_with_return() which is to override the probed function returning and jump to its caller. Test log: cd /sys/kernel/debug/fail_function echo sys_clone > inject echo 100 > probability echo 1 > interval ls / [ 313.176875] FAULT_INJECTION: forcing a failure. [ 313.176875] name fail_function, interval 1, probability 100, space 0, times 1 [ 313.184357] CPU: 0 PID: 87 Comm: sh Not tainted 5.8.0-rc5-00007-g6a758cc #117 [ 313.187616] Call Trace: [ 313.189100] [] walk_stackframe+0x0/0xc2 [ 313.191626] [] show_stack+0x40/0x4c [ 313.193927] [] dump_stack+0x7c/0x96 [ 313.194795] [] should_fail+0x140/0x142 [ 313.195923] [] fei_kprobe_handler+0x2c/0x5a [ 313.197687] [] kprobe_breakpoint_handler+0xb4/0x18a [ 313.200054] [] do_trap_break+0x36/0xca [ 313.202147] [] ret_from_exception+0x0/0xc [ 313.204556] [] ret_from_syscall+0x0/0x2 -sh: can't fork: Invalid argument Signed-off-by: Guo Ren Reviewed-by: Masami Hiramatsu Cc: Palmer Dabbelt Cc: Paul Walmsley --- arch/riscv/Kconfig | 1 + arch/riscv/include/asm/ptrace.h | 6 ++++++ arch/riscv/lib/Makefile | 2 ++ arch/riscv/lib/error-inject.c | 10 ++++++++++ 4 files changed, 19 insertions(+) create mode 100644 arch/riscv/lib/error-inject.c diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index af0ec36..a627ae2 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -67,6 +67,7 @@ config RISCV select HAVE_EBPF_JIT if MMU select HAVE_FUTEX_CMPXCHG if FUTEX select HAVE_GCC_PLUGINS + select HAVE_FUNCTION_ERROR_INJECTION select HAVE_GENERIC_VDSO if MMU && 64BIT select HAVE_KPROBES select HAVE_KPROBES_ON_FTRACE diff --git a/arch/riscv/include/asm/ptrace.h b/arch/riscv/include/asm/ptrace.h index 23372bb..cb4abb6 100644 --- a/arch/riscv/include/asm/ptrace.h +++ b/arch/riscv/include/asm/ptrace.h @@ -109,6 +109,12 @@ static inline unsigned long regs_return_value(struct pt_regs *regs) return regs->a0; } +static inline void regs_set_return_value(struct pt_regs *regs, + unsigned long val) +{ + regs->a0 = val; +} + extern int regs_query_register_offset(const char *name); extern unsigned long regs_get_kernel_stack_nth(struct pt_regs *regs, unsigned int n); diff --git a/arch/riscv/lib/Makefile b/arch/riscv/lib/Makefile index 47e7a82..699ed20 100644 --- a/arch/riscv/lib/Makefile +++ b/arch/riscv/lib/Makefile @@ -4,3 +4,5 @@ lib-y += memcpy.o lib-y += memset.o lib-$(CONFIG_MMU) += uaccess.o lib-$(CONFIG_64BIT) += tishift.o + +obj-$(CONFIG_FUNCTION_ERROR_INJECTION) += error-inject.o diff --git a/arch/riscv/lib/error-inject.c b/arch/riscv/lib/error-inject.c new file mode 100644 index 00000000..d667ade --- /dev/null +++ b/arch/riscv/lib/error-inject.c @@ -0,0 +1,10 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include + +void override_function_with_return(struct pt_regs *regs) +{ + instruction_pointer_set(regs, regs->ra); +} +NOKPROBE_SYMBOL(override_function_with_return); -- 2.7.4