From nobody Mon Apr 6 11:51:44 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id ED9A7C433F5 for ; Fri, 30 Sep 2022 08:07:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230507AbiI3IHB (ORCPT ); Fri, 30 Sep 2022 04:07:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229689AbiI3IG6 (ORCPT ); Fri, 30 Sep 2022 04:06:58 -0400 Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 568A5120866 for ; Fri, 30 Sep 2022 01:06:57 -0700 (PDT) Received: by mail-pj1-x1035.google.com with SMTP id c6-20020a17090a4d0600b0020958fcd9acso2302557pjg.4 for ; Fri, 30 Sep 2022 01:06:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date; bh=EyMhbdcoCnd7nyiVH5VQAszJwrQE+nYROXNJQfleck8=; b=O2O90zAeIuFYyG62iQQibTBwDvEVS3Jn9RDsylTH+BF+2LSJINhkzwpSd00EwA/PL6 J2Q8qKa77MT/uawOar1QKH7eBC34/0ZbPLDQ6RRqGiwW/e7oT0sTZDsLcT1OlvcleQke eWVk/4s1UBPArTXJJEsl1X3UznAyuaAea3A91/Eaq4b1NVlSQFVT2w1k3GlZWFgLqhud DIDcfAduuQIGDO50maIMtDke2ihPhddhZDttBCPuVDnb9md5X6PPw258kYGFt/SO4iRK smH9MBUpnJ0Iys8sKngG40ZqCwE0WKSJ+yEj0g0O82idZ7BYMZb+n/IE0+X3GC1G5rCJ SZmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date; bh=EyMhbdcoCnd7nyiVH5VQAszJwrQE+nYROXNJQfleck8=; b=nlO+v0CFSy3x6yJvHxy7x7FEaTXlX8i3z+8Y7jU0bcAFDp8KXsJ9OTOIz3gKMH4IDu wjydoY4zWonZzLosrMfxSKy0dHMP5kfI+cq14kJ/26Ldm75DbZCdkpqeB/8NaKStIX/Q Tn4zg1VuCLExtvBgyDXFNOzkvmrJ+KB3+DMdmzS33bS4bIIgoyHqFQ5AR69SicWgBtOB zf5djF1Q1/DuNy9FgX02gGN85waBO1mWhZcT2fMqAj4iwPWmd+FIzJO6THHR4b4nlEW7 4NM2aw8HNGfHW33iYTG5IWl7Sk+0UlHn/ctMRY7CNuTDmZEdqogasFFa2ELdYfTn2zXq Ge+Q== X-Gm-Message-State: ACrzQf1dvePAmfeU2f4DHoJYV1IsuhdtR0KYRtFtq9X2WI3ArnS8DMq4 dumkBDShnmxRgrmHOurzJ8U= X-Google-Smtp-Source: AMsMyM5zPdySTy5l+1y12PJ8ZL9Ygqs58Wn00ZRmy64QnAEVdCP4aTfVCuy3NawAbuw7i6YIfZVdZA== X-Received: by 2002:a17:902:7887:b0:178:5e8a:e84e with SMTP id q7-20020a170902788700b001785e8ae84emr7784938pll.64.1664525216726; Fri, 30 Sep 2022 01:06:56 -0700 (PDT) Received: from localhost.localdomain (l3b2w1.cn. [159.138.1.25]) by smtp.gmail.com with ESMTPSA id kb16-20020a17090ae7d000b001f8c532b93dsm1089432pjb.15.2022.09.30.01.06.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Sep 2022 01:06:56 -0700 (PDT) From: Binglei Wang X-Google-Original-From: Binglei Wang To: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, naveen.n.rao@linux.ibm.com, anil.s.keshavamurthy@intel.com, davem@davemloft.net, mhiramat@kernel.org Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Binglei Wang Subject: [PATCH v7] rethook: add riscv rethook implementation Date: Fri, 30 Sep 2022 16:06:50 +0800 Message-Id: <20220930080650.651587-1-l3b2w1@gmail.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" From: Binglei Wang Implement the kretprobes on riscv arch by using rethook machenism which abstracts general kretprobe info into a struct rethook_node to be embedded in the struct kretprobe_instance. Signed-off-by: Binglei Wang --- Notes: v7: Add the changelog. v6: Remove the kretprobes trampoline. v5: Trt to fix robot compiling error and warnings. v4: Add patch version number. v3: Trt to fix robot compiling error and warnings. v2: Add comit log to explain reasons behind changes. Use my personal email instead of work email to avoid the attachments of company informaton. Make the kprobes_trampoline.S code to be shared. v1: Add riscv rethook implementation. arch/riscv/Kconfig | 1 + arch/riscv/include/asm/kprobes.h | 2 -- arch/riscv/kernel/probes/Makefile | 2 +- arch/riscv/kernel/probes/kprobes.c | 13 --------- arch/riscv/kernel/probes/rethook.c | 27 +++++++++++++++++++ ...obes_trampoline.S =3D> rethook_trampoline.S} | 6 ++--- 6 files changed, 32 insertions(+), 19 deletions(-) create mode 100644 arch/riscv/kernel/probes/rethook.c rename arch/riscv/kernel/probes/{kprobes_trampoline.S =3D> rethook_trampol= ine.S} (94%) diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index 59d18881f..bfb66cdc5 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -97,6 +97,7 @@ config RISCV select HAVE_KPROBES if !XIP_KERNEL select HAVE_KPROBES_ON_FTRACE if !XIP_KERNEL select HAVE_KRETPROBES if !XIP_KERNEL + select HAVE_RETHOOK if !XIP_KERNEL select HAVE_MOVE_PMD select HAVE_MOVE_PUD select HAVE_PCI diff --git a/arch/riscv/include/asm/kprobes.h b/arch/riscv/include/asm/kpro= bes.h index 217ef89f2..e7882ccb0 100644 --- a/arch/riscv/include/asm/kprobes.h +++ b/arch/riscv/include/asm/kprobes.h @@ -40,8 +40,6 @@ void arch_remove_kprobe(struct kprobe *p); int kprobe_fault_handler(struct pt_regs *regs, unsigned int trapnr); bool kprobe_breakpoint_handler(struct pt_regs *regs); bool kprobe_single_step_handler(struct pt_regs *regs); -void __kretprobe_trampoline(void); -void __kprobes *trampoline_probe_handler(struct pt_regs *regs); =20 #endif /* CONFIG_KPROBES */ #endif /* _ASM_RISCV_KPROBES_H */ diff --git a/arch/riscv/kernel/probes/Makefile b/arch/riscv/kernel/probes/M= akefile index 7f0840dcc..c40139e9c 100644 --- a/arch/riscv/kernel/probes/Makefile +++ b/arch/riscv/kernel/probes/Makefile @@ -1,6 +1,6 @@ # SPDX-License-Identifier: GPL-2.0 obj-$(CONFIG_KPROBES) +=3D kprobes.o decode-insn.o simulate-insn.o -obj-$(CONFIG_KPROBES) +=3D kprobes_trampoline.o +obj-$(CONFIG_RETHOOK) +=3D rethook.o rethook_trampoline.o obj-$(CONFIG_KPROBES_ON_FTRACE) +=3D ftrace.o obj-$(CONFIG_UPROBES) +=3D uprobes.o decode-insn.o simulate-insn.o CFLAGS_REMOVE_simulate-insn.o =3D $(CC_FLAGS_FTRACE) diff --git a/arch/riscv/kernel/probes/kprobes.c b/arch/riscv/kernel/probes/= kprobes.c index e6e950b7c..f21592d20 100644 --- a/arch/riscv/kernel/probes/kprobes.c +++ b/arch/riscv/kernel/probes/kprobes.c @@ -345,19 +345,6 @@ int __init arch_populate_kprobe_blacklist(void) return ret; } =20 -void __kprobes __used *trampoline_probe_handler(struct pt_regs *regs) -{ - return (void *)kretprobe_trampoline_handler(regs, NULL); -} - -void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri, - struct pt_regs *regs) -{ - ri->ret_addr =3D (kprobe_opcode_t *)regs->ra; - ri->fp =3D NULL; - regs->ra =3D (unsigned long) &__kretprobe_trampoline; -} - int __kprobes arch_trampoline_kprobe(struct kprobe *p) { return 0; diff --git a/arch/riscv/kernel/probes/rethook.c b/arch/riscv/kernel/probes/= rethook.c new file mode 100644 index 000000000..cbd0da059 --- /dev/null +++ b/arch/riscv/kernel/probes/rethook.c @@ -0,0 +1,27 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Generic return hook for riscv. + */ + +#include +#include +#include "rethook.h" + +/* This is called from arch_rethook_trampoline() */ +unsigned long __used arch_rethook_trampoline_callback(struct pt_regs *regs) +{ + return rethook_trampoline_handler(regs, regs->s0); +} +NOKPROBE_SYMBOL(arch_rethook_trampoline_callback); + + +void arch_rethook_prepare(struct rethook_node *rhn, struct pt_regs *regs, = bool mcount) +{ + rhn->ret_addr =3D regs->ra; + rhn->frame =3D regs->s0; + + /* replace return addr with trampoline */ + regs->ra =3D (unsigned long)arch_rethook_trampoline; +} +NOKPROBE_SYMBOL(arch_rethook_prepare); + diff --git a/arch/riscv/kernel/probes/kprobes_trampoline.S b/arch/riscv/ker= nel/probes/rethook_trampoline.S similarity index 94% rename from arch/riscv/kernel/probes/kprobes_trampoline.S rename to arch/riscv/kernel/probes/rethook_trampoline.S index 7bdb09ded..21bac92a1 100644 --- a/arch/riscv/kernel/probes/kprobes_trampoline.S +++ b/arch/riscv/kernel/probes/rethook_trampoline.S @@ -75,13 +75,13 @@ REG_L x31, PT_T6(sp) .endm =20 -ENTRY(__kretprobe_trampoline) +ENTRY(arch_rethook_trampoline) addi sp, sp, -(PT_SIZE_ON_STACK) save_all_base_regs =20 move a0, sp /* pt_regs */ =20 - call trampoline_probe_handler + call arch_rethook_trampoline_callback =20 /* use the result as the return-address */ move ra, a0 @@ -90,4 +90,4 @@ ENTRY(__kretprobe_trampoline) addi sp, sp, PT_SIZE_ON_STACK =20 ret -ENDPROC(__kretprobe_trampoline) +ENDPROC(arch_rethook_trampoline) --=20 2.27.0