From nobody Wed Nov 27 10:43:55 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B08241CF2A8; Thu, 10 Oct 2024 20:10:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728591017; cv=none; b=CFmW/U/ENlTzlAdy/y+xUbBJr2ohuO1Mw3y+qp/oMJv3gfC3lH8MUgPpRceHqB3rgDH1fQmHnoTaUomd8q4Jfq/gjticQeDoy2E/oZijkRrIWJfSCN3DuzSvWbYXLUJXwQeYCYo2RVdtYDkllDPJ2rPDAkdhcv0LJDnr5rt41sI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728591017; c=relaxed/simple; bh=lyivNG7QkcWF//27U5OwYwaUvTLVf7GexR1n3yjWShI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=TiK1lw3hIEG2zlnRp+qorXoWS2Y3hDUv1Ji/m6/dXcC5ufrHcJNjOgSLp2BYBfZ2ErbJIV0RptAM8JT5TKgAYHp4FuBXcOmEct8YSncXvbMuqNgGR4re7EPU2jp3MLFaWzbHeBCA1/uJQvRGgysvbjAdmaTFwjn9JRxa1OWKwNw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=K/QqtC7J; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="K/QqtC7J" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1BFD8C4CEC5; Thu, 10 Oct 2024 20:10:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728591017; bh=lyivNG7QkcWF//27U5OwYwaUvTLVf7GexR1n3yjWShI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=K/QqtC7Jo0JuyAmgfy2kv4VPsb9kariht0APfShst0S5gGC3lf8xDj8bWM2ntpvUW VIDxyHDHjo1Ki899ETpwyNMHHNuOod/FDUsYb93Pr1THGhj10N8ibkIesULnEh7e+C 2Ym4I4H7iJMI0F1FaNb2WalNZxrkV2X7hNbOSmc4U1NVADV1EwdAEyidZknSCVvfSL C+wllFf+onU9BeIrIzqq1TP0DJ8BjttVSpu+qfWFXIILaY5+c6s5HUTuJkKfIN9p5q FsYKTMIEpcQTe6iMDjCudwWX8yIqhSWP1vhMJjWQh8gvSBH3/5FxSiDp3tdTCatiu2 4yToljIBtrZoQ== From: Jiri Olsa To: Oleg Nesterov , Peter Zijlstra , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko Cc: bpf@vger.kernel.org, Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Steven Rostedt , Masami Hiramatsu , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCHv6 perf/core 01/16] uprobe: Add data pointer to consumer handlers Date: Thu, 10 Oct 2024 22:09:42 +0200 Message-ID: <20241010200957.2750179-2-jolsa@kernel.org> X-Mailer: git-send-email 2.46.2 In-Reply-To: <20241010200957.2750179-1-jolsa@kernel.org> References: <20241010200957.2750179-1-jolsa@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Adding data pointer to both entry and exit consumer handlers and all its users. The functionality itself is coming in following change. Acked-by: Oleg Nesterov Acked-by: Andrii Nakryiko Signed-off-by: Jiri Olsa Acked-by: Masami Hiramatsu (Google) --- include/linux/uprobes.h | 4 ++-- kernel/events/uprobes.c | 4 ++-- kernel/trace/bpf_trace.c | 6 ++++-- kernel/trace/trace_uprobe.c | 12 ++++++++---- .../testing/selftests/bpf/bpf_testmod/bpf_testmod.c | 2 +- 5 files changed, 17 insertions(+), 11 deletions(-) diff --git a/include/linux/uprobes.h b/include/linux/uprobes.h index 2b294bf1881f..bb265a632b91 100644 --- a/include/linux/uprobes.h +++ b/include/linux/uprobes.h @@ -37,10 +37,10 @@ struct uprobe_consumer { * for the current process. If filter() is omitted or returns true, * UPROBE_HANDLER_REMOVE is effectively ignored. */ - int (*handler)(struct uprobe_consumer *self, struct pt_regs *regs); + int (*handler)(struct uprobe_consumer *self, struct pt_regs *regs, __u64 = *data); int (*ret_handler)(struct uprobe_consumer *self, unsigned long func, - struct pt_regs *regs); + struct pt_regs *regs, __u64 *data); bool (*filter)(struct uprobe_consumer *self, struct mm_struct *mm); =20 struct list_head cons_node; diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c index 2a0059464383..6b44c386a5df 100644 --- a/kernel/events/uprobes.c +++ b/kernel/events/uprobes.c @@ -2090,7 +2090,7 @@ static void handler_chain(struct uprobe *uprobe, stru= ct pt_regs *regs) int rc =3D 0; =20 if (uc->handler) { - rc =3D uc->handler(uc, regs); + rc =3D uc->handler(uc, regs, NULL); WARN(rc & ~UPROBE_HANDLER_MASK, "bad rc=3D0x%x from %ps()\n", rc, uc->handler); } @@ -2128,7 +2128,7 @@ handle_uretprobe_chain(struct return_instance *ri, st= ruct pt_regs *regs) rcu_read_lock_trace(); list_for_each_entry_rcu(uc, &uprobe->consumers, cons_node, rcu_read_lock_= trace_held()) { if (uc->ret_handler) - uc->ret_handler(uc, ri->func, regs); + uc->ret_handler(uc, ri->func, regs, NULL); } rcu_read_unlock_trace(); } diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index a582cd25ca87..fdab7ecd8dfa 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -3244,7 +3244,8 @@ uprobe_multi_link_filter(struct uprobe_consumer *con,= struct mm_struct *mm) } =20 static int -uprobe_multi_link_handler(struct uprobe_consumer *con, struct pt_regs *reg= s) +uprobe_multi_link_handler(struct uprobe_consumer *con, struct pt_regs *reg= s, + __u64 *data) { struct bpf_uprobe *uprobe; =20 @@ -3253,7 +3254,8 @@ uprobe_multi_link_handler(struct uprobe_consumer *con= , struct pt_regs *regs) } =20 static int -uprobe_multi_link_ret_handler(struct uprobe_consumer *con, unsigned long f= unc, struct pt_regs *regs) +uprobe_multi_link_ret_handler(struct uprobe_consumer *con, unsigned long f= unc, struct pt_regs *regs, + __u64 *data) { struct bpf_uprobe *uprobe; =20 diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index c40531d2cbad..5895eabe3581 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -89,9 +89,11 @@ static struct trace_uprobe *to_trace_uprobe(struct dyn_e= vent *ev) static int register_uprobe_event(struct trace_uprobe *tu); static int unregister_uprobe_event(struct trace_uprobe *tu); =20 -static int uprobe_dispatcher(struct uprobe_consumer *con, struct pt_regs *= regs); +static int uprobe_dispatcher(struct uprobe_consumer *con, struct pt_regs *= regs, + __u64 *data); static int uretprobe_dispatcher(struct uprobe_consumer *con, - unsigned long func, struct pt_regs *regs); + unsigned long func, struct pt_regs *regs, + __u64 *data); =20 #ifdef CONFIG_STACK_GROWSUP static unsigned long adjust_stack_addr(unsigned long addr, unsigned int n) @@ -1517,7 +1519,8 @@ trace_uprobe_register(struct trace_event_call *event,= enum trace_reg type, } } =20 -static int uprobe_dispatcher(struct uprobe_consumer *con, struct pt_regs *= regs) +static int uprobe_dispatcher(struct uprobe_consumer *con, struct pt_regs *= regs, + __u64 *data) { struct trace_uprobe *tu; struct uprobe_dispatch_data udd; @@ -1548,7 +1551,8 @@ static int uprobe_dispatcher(struct uprobe_consumer *= con, struct pt_regs *regs) } =20 static int uretprobe_dispatcher(struct uprobe_consumer *con, - unsigned long func, struct pt_regs *regs) + unsigned long func, struct pt_regs *regs, + __u64 *data) { struct trace_uprobe *tu; struct uprobe_dispatch_data udd; diff --git a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c b/tools/= testing/selftests/bpf/bpf_testmod/bpf_testmod.c index 8835761d9a12..12005e3dc3e4 100644 --- a/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c +++ b/tools/testing/selftests/bpf/bpf_testmod/bpf_testmod.c @@ -461,7 +461,7 @@ static struct bin_attribute bin_attr_bpf_testmod_file _= _ro_after_init =3D { =20 static int uprobe_ret_handler(struct uprobe_consumer *self, unsigned long func, - struct pt_regs *regs) + struct pt_regs *regs, __u64 *data) =20 { regs->ax =3D 0x12345678deadbeef; --=20 2.46.2