Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp824821iob; Wed, 4 May 2022 08:41:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbGfy64tFYwzhGOd1ZCdkJiBAfs+lwmvKRl5H8Nl8AjJMSlq+TSeAATDxCwg6C7hOyj802 X-Received: by 2002:a05:6402:298c:b0:41d:6b63:aa67 with SMTP id eq12-20020a056402298c00b0041d6b63aa67mr23900932edb.42.1651678888907; Wed, 04 May 2022 08:41:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651678888; cv=none; d=google.com; s=arc-20160816; b=M5CM/WGa1RqJdYSPlU1g7+SQUxyCYCMLDIbCsvScUQMAO68CH54qUdLo1C4tHBwW6b ynJ2UGTFL4ZLG+m0h/8jyjHCaXjRuh09xxlf/64bO4/ty8JfGQUKju0bUPR2WOXmEBZb UmGe9hnKW7kkwJwytcFlA/DAjQ9ULZgnaH8E9EzgsIh6y96I1GGQCJw+jv4ClQSQG+f9 IPREYXbPEfkcGMi67ede3QXCRkSAwaFXSRUp3n+xdlITv6u0eZ28mX9tHfA1SY421UKb bkWmwUKmUr3bDlvH7dh4szU28gMHFjkFu31dp5Zpdahzlw7yfqiA97glXYLtdk6BYRuM DxQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=EEH6+mRacLwScxzcHtUhY9Uf6WIWLmbt94DrbUcdd2E=; b=DhwirjuNGywgBPVj45zuqpRzhEEMuUW/o5ShngKzAl+soS3tsGSoMb+2CBn7P/EVhC baYMWakx8D6DQnVEEW4JkbhigH2WSPwa0s1OwIAXJsmoBZa9lFXxPsDvbpaK34lYWBsW A+lNgVsHUjpYPqwdlSZ7mh+OFy6hFu6+X1PQ2mUcetjkOyqwIhVnrPJEZW+FOHNPjSib EAYBHnfgVPsfcR7dtD5bTQk3Papwsj84YXwloyJVyUYsJP0yzOnoqA3KcKnLC0xipPRB YjnbSlqD+Ngm/5uIyfsyq3EZSFG2hwcrk4QC7mGdy+hmyl3m/MnJEltVx34DHJHPSDjR 48WA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ay5-20020a170907900500b006f4cec022e1si882355ejc.688.2022.05.04.08.41.05; Wed, 04 May 2022 08:41:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348046AbiEDK22 (ORCPT + 99 others); Wed, 4 May 2022 06:28:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38894 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235181AbiEDK20 (ORCPT ); Wed, 4 May 2022 06:28:26 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 3627524F27 for ; Wed, 4 May 2022 03:24:51 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F32C5ED1; Wed, 4 May 2022 03:24:50 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.65.138]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F138B3FA50; Wed, 4 May 2022 03:24:48 -0700 (PDT) Date: Wed, 4 May 2022 11:24:43 +0100 From: Mark Rutland To: Masami Hiramatsu Cc: Steven Rostedt , Wang ShaoBo , cj.chengjian@huawei.com, huawei.libin@huawei.com, xiexiuqi@huawei.com, liwei391@huawei.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, will@kernel.org, zengshun.wu@outlook.com Subject: Re: [RFC PATCH -next v2 3/4] arm64/ftrace: support dynamically allocated trampolines Message-ID: References: <20220421100639.03c0d123@gandalf.local.home> <20220421114201.21228eeb@gandalf.local.home> <20220421130648.56b21951@gandalf.local.home> <20220422114541.34d71ad9@gandalf.local.home> <20220426174749.b5372c5769af7bf901649a05@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220426174749.b5372c5769af7bf901649a05@kernel.org> X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 26, 2022 at 05:47:49PM +0900, Masami Hiramatsu wrote: > Hi Mark, > > On Fri, 22 Apr 2022 18:27:53 +0100 > Mark Rutland wrote: > > > On Fri, Apr 22, 2022 at 11:45:41AM -0400, Steven Rostedt wrote: > > > On Fri, 22 Apr 2022 11:12:39 +0100 > > > Mark Rutland wrote: > > > > > > > As an aside, I'd also love to remove the REGS/!REGs distinction, and always > > > > save a minimum amount of state (like ARGS, but never saving a full pt_regs), > > > > since on arm64 the extra state stored for the REGS case isn't useful (and we > > > > can't reliably capture all of the pt_regs state anyway, so bits of it are made > > > > up or not filled in). > > > > > > Note, the reason for the addition of REGS was a requirement of kprobes. > > > Because before ftrace, kprobes would be triggered at the start of a > > > function by a breakpoint that would load in all the regs. And for backward > > > compatibility, Masami wanted to make sure that kprobes coming from ftrace > > > had all the regs just like it had when coming from a breakpoint. > > Yes. Since this kprobes->ftrace conversion is done by kprobes transparently, > user doesn't know their kprobe handler is called from sw break or ftrace. The big problem is that on arm64 kprobes and ftrace are *very* different, and we can't do that transparently (unless both had a mode which just provided the ARGS). > > > IIUC, kprobes is the only reason we have the "regs" variant (all other use > > > cases could get by with the ARGS version). > > > > I see. FWIW, we don't have KPROBES_ON_FTRACE on arm64. > > Right. Since x86 fentry puts the entry on function address, I need such > compatibility. > > But on arm64, ftrace leads some preparation instructions, kprobes can put > the sw break on the function address there. And may not need to put the > kprobes on it. So it depends on arch. I would like to keep the kprobes > available at the function address so that it can trace any registers. > (like debugger usage) > > > Also, the same problems apply to KRETPROBES: the synthetic `pstate` > > value is bogus and we don't fill in other bits of the regs (e.g. the PMR > > value), so it's not a "real" pt_regs, and things like > > interrupts_enabled(regs) won't work correctly. > > Would you mean the process which kprobes_save/restore_local_irqflag() does? > Is the regs->pstate saved correctly in sw break or ftrace? (sorry, I missed > the context) For `BRK` (SW break) instructions we take an exception, PSTATE (and all of the struct pt_regs) is saved correctly. For ftrace, PSTATE (and other bits of pt_regs) are not saved correctly. Practically speaking it's not feasible to do so reliably without taking an exception, which is why I'd like to reduce ftrace down to just the ARGs. > > In addition, as > > KRETPROBES only hooks function entry/exit and x9-x17 + x19-x28 are > > meaningless at those times, no-one's going to care what they contain > > anyway. > > It depends on what bug they are trying to trace. C source level bug > will not need such information, but assembly level bug (or compiler > level bug) may need such registers. Anyway, this also depends on user. > I just won't like limit the usage. If that's how kretprobes are intended to be used, then I think they must *always* use a BRK as that's the only way to reliably get a complete struct pt_regs. I've implemented that: https://git.kernel.org/pub/scm/linux/kernel/git/mark/linux.git/commit/?h=arm64/kprobes/kretprobe-brk-trampoline&id=80be4ccbf47b0294a02b05b797cbff36364bc435 ... and can send that out as a patch shortly. > > The state we can correctly snapshot (and that would be useful) > > is the same as ARGS. > > > > It'd be nice if KRETPROBES could just use ARGS, but a standard KPROBE > > that traps could provide regs (since it actually gets "real" regs, and > > within a function the other GPRs could be important). > > Here, the KRETPROBES means the exit handler, or including entry handler? > Since kretprobes uses a standard kprobe to trap the function entry. I'm suggesting that (if there are cases where kretprobes are only used to acquire arguments and return vaalues, and not other state), we change things so that kretprobes can use a different entry handler from a regular kprobe, and that new handler only has to acquire the arguments and return values, matching the ftrace ARGS. That way we can have: a) A regular kprobe, which uses BRK as today, and gets a full pt_regs b) A regular kretprobe, which uses BRK for both entry/exit, and gets a full pt_regs in both cases. c) An args-only kretprobe, where the entry/exit handlers only present the ARGS to the registered handlers. If kretprobes always needs the full pt_regs, then (c) isn't necessary, and we don't need to change anything more than the kretprobes trampoline, as above. What I really want to get away from it kretprobes and ftrace having an incomplete pt_regs, and the two ways of doing that are: 1) Save/restore the full pt_regs by taking an exception. 2) Save/restore a minimal ARGS structure, and ensure the interfaces don't have to pass a struct pt_regs pointer. For kretprobes I can implement either, but for ftrace (2) is the only real option. Thanks, Mark. > If you talk about fprobes (ftrace probe interface), it will only use the > ftrace. Thus your idea is acceptable for it (because fprobe is different > from kprobes *). > > * Of course we have to talk with BPF people so that they will only access > ARGS from BPF program on fprobes. > > Thank you, > > -- > Masami Hiramatsu