Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp2669080rwi; Tue, 1 Nov 2022 10:14:56 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6NolbW57KoaL0eCk/WnVGfuHXqq8gwmVZZwLEgR1ADee91xTHiNzxE/DK5hYq4LYWKtT+T X-Received: by 2002:a05:6402:3896:b0:45c:93c3:3569 with SMTP id fd22-20020a056402389600b0045c93c33569mr20465845edb.37.1667322896106; Tue, 01 Nov 2022 10:14:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667322896; cv=none; d=google.com; s=arc-20160816; b=GN/ZC3vrfsDB9EzCYlrfec1knUDO+q8gpow+Jl3PN9MqURmjlpkJZ38vUOpLHIFCtm s43qCvftsCVi0R6EpMyFbTxuVOYCnAUghfK9em++75eWG3QqIfCYifH5xvXFtGBIWq3v f4Ct9HLURFz9Wori3mU2mgHg99jetpmNpI2bUKLBHdmI6wfONVbdiMLXt9TgGNuW1F5j MMkjjVeZ/okCAJMQtbVdIv8r1SlKjv4LiC28e+Dxeyf2/d2a3w79s1WgsvpeoWcDb1Ul Ck/u8cnHYdsIG/aVz1NC363CLBS55v8QOgxrLt5TohXc3G5P3Cjjalwjld0Mp8pXZzNx S1nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=qBN2F9e7cbWd5bBuKbRWxlxH6fk1It18fkiIFdKcewU=; b=yIYgZerXfxqfb1Z1Gc7TqhY+cpDFj0XCwbzTA17kNF0muY3JRlmCNfk5d+yFQL26/P d+AMNJ5YH5syC+8DToYquGBklfrb5sBC7WfTb+BeDNZ8RCaiMA/EF5CRqpOUyavpyTnT n5HZHF8cMLR9/kSkVXA73QUw5ZSq2iFkl06H90Ow8NPnwnmQY5a1aFLP7rJbXmrdzwZ6 4Cv9HV2OiEIr4Rjn+bKLUARCB/8ggaULFb97FCTk0rr5SaHBIrjFZjCez1H7EvW8QiRX Xd45yv9X0RmuHsq2lQi/R0dbjbWFKBUwfO8NU3rVWi2oP624lDTs2t485jUS7AW83Gnr EQqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tA0ddphq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gb42-20020a170907962a00b007ad95fdd21csi12923439ejc.761.2022.11.01.10.14.31; Tue, 01 Nov 2022 10:14:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tA0ddphq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230106AbiKARIJ (ORCPT + 97 others); Tue, 1 Nov 2022 13:08:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35908 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229761AbiKARIH (ORCPT ); Tue, 1 Nov 2022 13:08:07 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F399D8B for ; Tue, 1 Nov 2022 10:08:02 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 25EC261656 for ; Tue, 1 Nov 2022 17:08:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 54410C433D6; Tue, 1 Nov 2022 17:07:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1667322481; bh=2Y4FXSKTEjF1qcYmzzsY+q+7a2NVRoQEVXrR1FcCVUw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=tA0ddphq6ZwqaV0xWZCkp4pEcY+OkbDE5oOQ20B1NJIg0FozRlhFhoyURR1kcsuxF UEDIX59usJVYSRW10N+LTLu7FEP2dnpLIdBBv6r/wUpIxp3eThbdqrsCGZk5e0JxTV KDhO5w3b2LhVhBaVCyPfwc+N1LpT6Z8T4Xui5tvJAllXrfXW0YdW9lpVfHZ0xCnh14 u2JKSYVFyoMnXyPGWJxU9VqYUaUkqfBsnedrUtAYXZAr5LwqM5VsS/yOUNw0h7pM5g 5Ce//sdIikux7UK1eMgr1xDJhxg0I0iG5isX4uFKJMFNBX63Gp5erpr+Gc9umYqxo2 pq1za7wo5ObLA== Date: Tue, 1 Nov 2022 17:07:56 +0000 From: Conor Dooley To: binglei wang Cc: aou@eecs.berkeley.edu, linux-riscv@lists.infradead.org, palmer@dabbelt.com, paul.walmsley@sifive.com, anil.s.keshavamurthy@intel.com, davem@davemloft.net, linux-kernel@vger.kernel.org, mhiramat@kernel.org, naveen.n.rao@linux.ibm.com, Conor Dooley Subject: Re: [PATCH RESEND v9] riscv: add riscv rethook implementation Message-ID: References: <20221025151831.1097417-1-conor@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-8.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 01, 2022 at 09:40:23PM +0800, binglei wang wrote: > Hi Conor, > > Thanks for your resending. > What to do next is just to wait patently, right ? Yup.. You'll get at least one email when it gets applied. It's in patchwork [0] so it should not get forgotten about. 0 - https://patchwork.kernel.org/project/linux-riscv/patch/20221025151831.1097417-1-conor@kernel.org/ > > Binglei Wang > Best wishes. > > > Conor Dooley 于2022年10月25日周二 23:19写道: > > > > From: Binglei Wang > > > > Implement the kretprobes on riscv arch by using rethook machenism > > which abstracts general kretprobe info into a struct rethook_node > > to be embedded in the struct kretprobe_instance. > > > > Acked-by: Masami Hiramatsu (Google) > > Signed-off-by: Binglei Wang > > Signed-off-by: Conor Dooley > > --- > > Binglei's patches do not seem to make it to the linux-riscv list, so > > blindly resending on their behalf, with Masami's ack from v8 added. > > > > arch/riscv/Kconfig | 1 + > > arch/riscv/include/asm/kprobes.h | 2 -- > > arch/riscv/kernel/probes/Makefile | 2 +- > > arch/riscv/kernel/probes/kprobes.c | 13 --------- > > arch/riscv/kernel/probes/rethook.c | 27 +++++++++++++++++++ > > arch/riscv/kernel/probes/rethook.h | 8 ++++++ > > ...obes_trampoline.S => rethook_trampoline.S} | 6 ++--- > > 7 files changed, 40 insertions(+), 19 deletions(-) > > create mode 100644 arch/riscv/kernel/probes/rethook.c > > create mode 100644 arch/riscv/kernel/probes/rethook.h > > rename arch/riscv/kernel/probes/{kprobes_trampoline.S => rethook_trampoline.S} (94%) > > > > diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig > > index 6b48a3ae9843..413aeca71ca0 100644 > > --- a/arch/riscv/Kconfig > > +++ b/arch/riscv/Kconfig > > @@ -99,6 +99,7 @@ config RISCV > > select HAVE_KPROBES if !XIP_KERNEL > > select HAVE_KPROBES_ON_FTRACE if !XIP_KERNEL > > select HAVE_KRETPROBES if !XIP_KERNEL > > + select HAVE_RETHOOK if !XIP_KERNEL > > select HAVE_MOVE_PMD > > select HAVE_MOVE_PUD > > select HAVE_PCI > > diff --git a/arch/riscv/include/asm/kprobes.h b/arch/riscv/include/asm/kprobes.h > > index 217ef89f22b9..e7882ccb0fd4 100644 > > --- a/arch/riscv/include/asm/kprobes.h > > +++ b/arch/riscv/include/asm/kprobes.h > > @@ -40,8 +40,6 @@ void arch_remove_kprobe(struct kprobe *p); > > int kprobe_fault_handler(struct pt_regs *regs, unsigned int trapnr); > > bool kprobe_breakpoint_handler(struct pt_regs *regs); > > bool kprobe_single_step_handler(struct pt_regs *regs); > > -void __kretprobe_trampoline(void); > > -void __kprobes *trampoline_probe_handler(struct pt_regs *regs); > > > > #endif /* CONFIG_KPROBES */ > > #endif /* _ASM_RISCV_KPROBES_H */ > > diff --git a/arch/riscv/kernel/probes/Makefile b/arch/riscv/kernel/probes/Makefile > > index 7f0840dcc31b..c40139e9ca47 100644 > > --- a/arch/riscv/kernel/probes/Makefile > > +++ b/arch/riscv/kernel/probes/Makefile > > @@ -1,6 +1,6 @@ > > # SPDX-License-Identifier: GPL-2.0 > > obj-$(CONFIG_KPROBES) += kprobes.o decode-insn.o simulate-insn.o > > -obj-$(CONFIG_KPROBES) += kprobes_trampoline.o > > +obj-$(CONFIG_RETHOOK) += rethook.o rethook_trampoline.o > > obj-$(CONFIG_KPROBES_ON_FTRACE) += ftrace.o > > obj-$(CONFIG_UPROBES) += uprobes.o decode-insn.o simulate-insn.o > > CFLAGS_REMOVE_simulate-insn.o = $(CC_FLAGS_FTRACE) > > diff --git a/arch/riscv/kernel/probes/kprobes.c b/arch/riscv/kernel/probes/kprobes.c > > index e6e950b7cf32..f21592d20306 100644 > > --- a/arch/riscv/kernel/probes/kprobes.c > > +++ b/arch/riscv/kernel/probes/kprobes.c > > @@ -345,19 +345,6 @@ int __init arch_populate_kprobe_blacklist(void) > > return ret; > > } > > > > -void __kprobes __used *trampoline_probe_handler(struct pt_regs *regs) > > -{ > > - return (void *)kretprobe_trampoline_handler(regs, NULL); > > -} > > - > > -void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri, > > - struct pt_regs *regs) > > -{ > > - ri->ret_addr = (kprobe_opcode_t *)regs->ra; > > - ri->fp = NULL; > > - regs->ra = (unsigned long) &__kretprobe_trampoline; > > -} > > - > > int __kprobes arch_trampoline_kprobe(struct kprobe *p) > > { > > return 0; > > diff --git a/arch/riscv/kernel/probes/rethook.c b/arch/riscv/kernel/probes/rethook.c > > new file mode 100644 > > index 000000000000..5c27c1f50989 > > --- /dev/null > > +++ b/arch/riscv/kernel/probes/rethook.c > > @@ -0,0 +1,27 @@ > > +// SPDX-License-Identifier: GPL-2.0-only > > +/* > > + * Generic return hook for riscv. > > + */ > > + > > +#include > > +#include > > +#include "rethook.h" > > + > > +/* This is called from arch_rethook_trampoline() */ > > +unsigned long __used arch_rethook_trampoline_callback(struct pt_regs *regs) > > +{ > > + return rethook_trampoline_handler(regs, regs->s0); > > +} > > + > > +NOKPROBE_SYMBOL(arch_rethook_trampoline_callback); > > + > > +void arch_rethook_prepare(struct rethook_node *rhn, struct pt_regs *regs, bool mcount) > > +{ > > + rhn->ret_addr = regs->ra; > > + rhn->frame = regs->s0; > > + > > + /* replace return addr with trampoline */ > > + regs->ra = (unsigned long)arch_rethook_trampoline; > > +} > > + > > +NOKPROBE_SYMBOL(arch_rethook_prepare); > > diff --git a/arch/riscv/kernel/probes/rethook.h b/arch/riscv/kernel/probes/rethook.h > > new file mode 100644 > > index 000000000000..4758f7e3ce88 > > --- /dev/null > > +++ b/arch/riscv/kernel/probes/rethook.h > > @@ -0,0 +1,8 @@ > > +/* SPDX-License-Identifier: GPL-2.0-only */ > > +#ifndef __RISCV_RETHOOK_H > > +#define __RISCV_RETHOOK_H > > + > > +unsigned long arch_rethook_trampoline_callback(struct pt_regs *regs); > > +void arch_rethook_prepare(struct rethook_node *rhn, struct pt_regs *regs, bool mcount); > > + > > +#endif > > diff --git a/arch/riscv/kernel/probes/kprobes_trampoline.S b/arch/riscv/kernel/probes/rethook_trampoline.S > > similarity index 94% > > rename from arch/riscv/kernel/probes/kprobes_trampoline.S > > rename to arch/riscv/kernel/probes/rethook_trampoline.S > > index 7bdb09ded39b..21bac92a170a 100644 > > --- a/arch/riscv/kernel/probes/kprobes_trampoline.S > > +++ b/arch/riscv/kernel/probes/rethook_trampoline.S > > @@ -75,13 +75,13 @@ > > REG_L x31, PT_T6(sp) > > .endm > > > > -ENTRY(__kretprobe_trampoline) > > +ENTRY(arch_rethook_trampoline) > > addi sp, sp, -(PT_SIZE_ON_STACK) > > save_all_base_regs > > > > move a0, sp /* pt_regs */ > > > > - call trampoline_probe_handler > > + call arch_rethook_trampoline_callback > > > > /* use the result as the return-address */ > > move ra, a0 > > @@ -90,4 +90,4 @@ ENTRY(__kretprobe_trampoline) > > addi sp, sp, PT_SIZE_ON_STACK > > > > ret > > -ENDPROC(__kretprobe_trampoline) > > +ENDPROC(arch_rethook_trampoline) > > -- > > 2.38.0 > >