Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp772290rwd; Mon, 12 Jun 2023 23:27:45 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7TWI76yM01h6gcmTV0A+S0hEKJxuH3oEv0EI2d8r1giq8qVlOnshFq04QIKEjBqqpMcxdb X-Received: by 2002:a05:6402:414:b0:514:9e81:906f with SMTP id q20-20020a056402041400b005149e81906fmr5926745edv.27.1686637665609; Mon, 12 Jun 2023 23:27:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686637665; cv=none; d=google.com; s=arc-20160816; b=ignIxItP+GE97MTcL44aYJvj3lkqe4DDEyOavUZbKlIZ/vskVhdsI6PjO8r6lT7JQ+ fCfOGdJ2J1rS8gJO4R3GbcmdNuiIGRSbPim6Y4XCb9WUY6hmV/0y+5J3sl4cOB3MNjnH RdTk/DANoBfC6VbudmjzEtT5KdspQ8Q10VtNRT88tz4Gn41D3HyDepftnABAQkFP3vXI p4+XvzfmYDfWyMv4gk1iE7T4Hgf33AxapZn9CPOM3l9Ka9L5+62jKT6uJ4iw14gLqpsF PHafl03jqjaoZvy+cp4qtow9aoh+IH5ni+kN0M0HFUgjOiLUcZXUBUtMhHrscvA1qv6q pyGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=pZ+krOLtObkZVfcEKAsiTCsY/oZ3NLxfHMrZMI7BLx8=; b=Q9ztK7aEfIsS9Vp5rESPuafrfmAH5g4FHafY9pvcvfHlqxH3nZP+Dp7lGo0AdjuAC5 eWbw6m2TYyECSmiH4ulof64ayNf2O58ImjxzO0N9q/UGE6Ll0OCL2aUm9cgmQoPulBLn fLd8iR7wbUxv4aHKGTE9okClQ2vfOP/hoFLPoZ8MT1SefXuofyO2IUNKxah8EDuhjyc+ UbOEB2MbPy1wI9Ydt8cnsM5/kxPn/mC/H0NVsd90aVRGuN23IyFFQRDGZ4dB/n/qR3Vl p51iK8u6bmVblJ9uMrXo0jtN2ye5tstHWFFoO1ge1RxRTzrawaYjRVAclLH664OxOWpJ KV0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g4-20020a056402180400b00510d91f80aesi6968105edy.73.2023.06.12.23.27.21; Mon, 12 Jun 2023 23:27:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239965AbjFMGJM (ORCPT + 99 others); Tue, 13 Jun 2023 02:09:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58324 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238727AbjFMGJI (ORCPT ); Tue, 13 Jun 2023 02:09:08 -0400 Received: from mailgw.kylinos.cn (mailgw.kylinos.cn [124.126.103.232]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD968AA for ; Mon, 12 Jun 2023 23:09:05 -0700 (PDT) X-UUID: d19af8c6f57343e3905741d00c96f208-20230613 X-CID-P-RULE: Release_Ham X-CID-O-INFO: VERSION:1.1.22,REQID:c5a6ae68-30ef-42d4-8f93-34414e48ee36,IP:25, URL:0,TC:0,Content:-25,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,AC TION:release,TS:-15 X-CID-INFO: VERSION:1.1.22,REQID:c5a6ae68-30ef-42d4-8f93-34414e48ee36,IP:25,UR L:0,TC:0,Content:-25,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTI ON:release,TS:-15 X-CID-META: VersionHash:120426c,CLOUDID:5556713e-7aa7-41f3-a6bd-0433bee822f3,B ulkID:2306131408572XCVVZAK,BulkQuantity:0,Recheck:0,SF:24|17|19|44|102,TC: nil,Content:0,EDM:-3,IP:-2,URL:11|1,File:nil,Bulk:nil,QS:nil,BEC:nil,COL:0 ,OSI:0,OSA:0,AV:0 X-CID-BVR: 0 X-CID-BAS: 0,_,0,_ X-UUID: d19af8c6f57343e3905741d00c96f208-20230613 X-User: jianghaoran@kylinos.cn Received: from localhost.localdomain [(39.156.73.12)] by mailgw (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 128/128) with ESMTP id 638067123; Tue, 13 Jun 2023 14:08:56 +0800 From: Haoran Jiang To: jianghaoran@kylinos.cn Cc: chenhuacai@kernel.org, conor.dooley@microchip.com, hejinyang@loongson.cn, jhrhhao@163.com, kernel@xen0n.name, l3b2w1@gmail.com, linux-kernel@vger.kernel.org, loongarch@lists.linux.dev, masahiroy@kernel.org, mhiramat@kernel.org, palmer@rivosinc.com, tangyouling@loongson.cn, yangtiezhu@loongson.cn, zhangqing@loongson.cn Subject: [PATCH v3] LoongArch/rethook: Replace kretprobe with rethook on LoongArch Date: Tue, 13 Jun 2023 14:03:29 +0800 Message-Id: <20230613060329.356201-1-jianghaoran@kylinos.cn> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20230613011439.59168-1-jianghaoran@kylinos.cn> References: <20230613011439.59168-1-jianghaoran@kylinos.cn> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org That's an adaptation of commit f3a112c0c40d ("x86,rethook,kprobes: Replace kretprobe with rethook on x86")and commit b57c2f124098 ("riscv: add riscv rethook implementation") to LoongArch. Mainly refer to this commit b57c2f124098 ("riscv: add riscv rethook implementation"). Replaces the kretprobe code with rethook on LoongArch. With this patch, kretprobe on LoongArch uses the rethook instead of kretprobe specific trampoline code. Signed-off-by: Haoran Jiang --- v3: 1,Fixed some format and spelling issues 2,According to this commit 571a2a50a8fc (rethook, fprobe: do not trace rethook related functions), the problem described in this commit Should be modified on LoongArch. v2: Modified the patch format and commit message. --- arch/loongarch/Kconfig | 1 + arch/loongarch/include/asm/kprobes.h | 3 --- arch/loongarch/kernel/Makefile | 7 ++++- arch/loongarch/kernel/kprobes.c | 20 -------------- arch/loongarch/kernel/rethook.c | 27 +++++++++++++++++++ arch/loongarch/kernel/rethook.h | 8 ++++++ ...obes_trampoline.S => rethook_trampoline.S} | 6 ++--- 7 files changed, 45 insertions(+), 27 deletions(-) create mode 100644 arch/loongarch/kernel/rethook.c create mode 100644 arch/loongarch/kernel/rethook.h rename arch/loongarch/kernel/{kprobes_trampoline.S => rethook_trampoline.S} (93%) diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig index d38b066fc931..5800aa52c82f 100644 --- a/arch/loongarch/Kconfig +++ b/arch/loongarch/Kconfig @@ -120,6 +120,7 @@ config LOONGARCH select HAVE_PERF_REGS select HAVE_PERF_USER_STACK_DUMP select HAVE_REGS_AND_STACK_ACCESS_API + select HAVE_RETHOOK select HAVE_RSEQ select HAVE_SAMPLE_FTRACE_DIRECT select HAVE_SAMPLE_FTRACE_DIRECT_MULTI diff --git a/arch/loongarch/include/asm/kprobes.h b/arch/loongarch/include/asm/kprobes.h index 798020ae02c6..7b9fc3ed71c3 100644 --- a/arch/loongarch/include/asm/kprobes.h +++ b/arch/loongarch/include/asm/kprobes.h @@ -49,9 +49,6 @@ bool kprobe_fault_handler(struct pt_regs *regs, int trapnr); bool kprobe_breakpoint_handler(struct pt_regs *regs); bool kprobe_singlestep_handler(struct pt_regs *regs); -void __kretprobe_trampoline(void); -void *trampoline_probe_handler(struct pt_regs *regs); - #else /* !CONFIG_KPROBES */ static inline bool kprobe_breakpoint_handler(struct pt_regs *regs) { return false; } diff --git a/arch/loongarch/kernel/Makefile b/arch/loongarch/kernel/Makefile index 9a72d91cd104..7106ca996e55 100644 --- a/arch/loongarch/kernel/Makefile +++ b/arch/loongarch/kernel/Makefile @@ -52,6 +52,11 @@ obj-$(CONFIG_UNWINDER_PROLOGUE) += unwind_prologue.o obj-$(CONFIG_PERF_EVENTS) += perf_event.o perf_regs.o obj-$(CONFIG_HAVE_HW_BREAKPOINT) += hw_breakpoint.o -obj-$(CONFIG_KPROBES) += kprobes.o kprobes_trampoline.o +obj-$(CONFIG_KPROBES) += kprobes.o +obj-$(CONFIG_RETHOOK) += rethook.o rethook_trampoline.o + +CFLAGS_REMOVE_rethook.o = $(CC_FLAGS_FTRACE) +CFLAGS_REMOVE_rethook_trampoline.o = $(CC_FLAGS_FTRACE) + CPPFLAGS_vmlinux.lds := $(KBUILD_CFLAGS) diff --git a/arch/loongarch/kernel/kprobes.c b/arch/loongarch/kernel/kprobes.c index 56c8c4b09a42..dbce23ba9970 100644 --- a/arch/loongarch/kernel/kprobes.c +++ b/arch/loongarch/kernel/kprobes.c @@ -378,26 +378,6 @@ int __init arch_init_kprobes(void) return 0; } -/* ASM function that handles the kretprobes must not be probed */ -NOKPROBE_SYMBOL(__kretprobe_trampoline); - -/* Called from __kretprobe_trampoline */ -void __used *trampoline_probe_handler(struct pt_regs *regs) -{ - return (void *)kretprobe_trampoline_handler(regs, NULL); -} -NOKPROBE_SYMBOL(trampoline_probe_handler); - -void arch_prepare_kretprobe(struct kretprobe_instance *ri, - struct pt_regs *regs) -{ - ri->ret_addr = (kprobe_opcode_t *)regs->regs[1]; - ri->fp = NULL; - - /* Replace the return addr with trampoline addr */ - regs->regs[1] = (unsigned long)&__kretprobe_trampoline; -} -NOKPROBE_SYMBOL(arch_prepare_kretprobe); int arch_trampoline_kprobe(struct kprobe *p) { diff --git a/arch/loongarch/kernel/rethook.c b/arch/loongarch/kernel/rethook.c new file mode 100644 index 000000000000..b5e7f62f7dea --- /dev/null +++ b/arch/loongarch/kernel/rethook.c @@ -0,0 +1,27 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Generic return hook for LoongArch. + */ + +#include +#include +#include "rethook.h" + +/* This is called from arch_rethook_trampoline() */ +unsigned long __used arch_rethook_trampoline_callback(struct pt_regs *regs) +{ + return rethook_trampoline_handler(regs, 0); +} + +NOKPROBE_SYMBOL(arch_rethook_trampoline_callback); + +void arch_rethook_prepare(struct rethook_node *rhn, struct pt_regs *regs, bool mcount) +{ + rhn->ret_addr = regs->regs[1]; + rhn->frame = 0; + + /* replace return addr with trampoline */ + regs->regs[1] = (unsigned long)arch_rethook_trampoline; +} + +NOKPROBE_SYMBOL(arch_rethook_prepare); diff --git a/arch/loongarch/kernel/rethook.h b/arch/loongarch/kernel/rethook.h new file mode 100644 index 000000000000..3f1c1edf0d0b --- /dev/null +++ b/arch/loongarch/kernel/rethook.h @@ -0,0 +1,8 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef __LOONGARCH_RETHOOK_H +#define __LOONGARCH_RETHOOK_H + +unsigned long arch_rethook_trampoline_callback(struct pt_regs *regs); +void arch_rethook_prepare(struct rethook_node *rhn, struct pt_regs *regs, bool mcount); + +#endif diff --git a/arch/loongarch/kernel/kprobes_trampoline.S b/arch/loongarch/kernel/rethook_trampoline.S similarity index 93% rename from arch/loongarch/kernel/kprobes_trampoline.S rename to arch/loongarch/kernel/rethook_trampoline.S index af94b0d213fa..bd5772c96338 100644 --- a/arch/loongarch/kernel/kprobes_trampoline.S +++ b/arch/loongarch/kernel/rethook_trampoline.S @@ -75,7 +75,7 @@ csrxchg t0, t1, LOONGARCH_CSR_CRMD .endm -SYM_CODE_START(__kretprobe_trampoline) +SYM_CODE_START(arch_rethook_trampoline) addi.d sp, sp, -PT_SIZE save_all_base_regs @@ -84,7 +84,7 @@ SYM_CODE_START(__kretprobe_trampoline) move a0, sp /* pt_regs */ - bl trampoline_probe_handler + bl arch_rethook_trampoline_callback /* use the result as the return-address */ move ra, a0 @@ -93,4 +93,4 @@ SYM_CODE_START(__kretprobe_trampoline) addi.d sp, sp, PT_SIZE jr ra -SYM_CODE_END(__kretprobe_trampoline) +SYM_CODE_END(arch_rethook_trampoline) -- 2.27.0