Message ID | 1669986505-11322-1-git-send-email-yangtiezhu@loongson.cn |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp850443wrr; Fri, 2 Dec 2022 05:24:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf4KfI6PhFONGdl6ZyXkbSoebAH4GWazNF89YVxj2ANqM2o7OiJvnYXCIrbPlIJDisMu1OdY X-Received: by 2002:a05:6402:1381:b0:468:5b78:6381 with SMTP id b1-20020a056402138100b004685b786381mr52098795edv.373.1669987493708; Fri, 02 Dec 2022 05:24:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669987493; cv=none; d=google.com; s=arc-20160816; b=zKtxhmccTTG2TU05o21OyENVkBbjiyHfEMzryZBx/uWW3OLW5vQYHmKaGrZB7FIKpn 62Zp9RL2ATO830+T2xIJDwAjS8x8Gsm0AWCqN42BNs55mQC9wmq6eW5MLKdYrYXyjRzI 3vRntwE15rp3Q3GbNk7VmiFOLNYy7/7CkQmvwoooW5gw1XkESrlGIuDFeKYiJtLOtFkq Oyv1wKaBoq94kHTMPK8b9gQU1HtGrrtUoQ+2wqFsUsf9l27OxRN2pywHC8kOXzKTRbYc nuvZrqw6O+GbY+XJMJj9veUTD1GfW6+kyhSOjPWsTjsqCq5YHCE9Qn6tWOGiiRxgYH/y U+QA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=aLCiTMbX7fx4bCOxFWZgg+4nDM1qqphlQsnO3T4JcNY=; b=xtHt7xV1B94vBMDq2tNv4ZRap7WmZyR4QKWkPWpK7Z+ejKqHO0RO5LnHk8dFInr+mW vIFo+XZXmvXOM4q+5fzF4eIKPWiIqTiPx8V+XThLsQ2KtL1UFBkdKMBLNnXGGVKzpWYk gW78UnqhfrJg8/I5fLoSUUTKvAqh6mHd13SNCIdIk4RANllh2HEzVAHQIREn/GkHxWjK 2vl+MMF1p3UoE+zxB3cInws+bmO1hI1fMwMsabO6Zs8biPKH2L8HegIBjq61/6aLmRn6 ObTyDhJ1dlqbIzYAyTapMhvOhnhkSnTm/izBDRhFIzzx6FKqaqI7CjNqJpB0ZEAXJjxQ BNGQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dz19-20020a0564021d5300b00469045e6a07si6214017edb.540.2022.12.02.05.24.29; Fri, 02 Dec 2022 05:24:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233690AbiLBNIk (ORCPT <rfc822;lhua1029@gmail.com> + 99 others); Fri, 2 Dec 2022 08:08:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41682 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232532AbiLBNIc (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 2 Dec 2022 08:08:32 -0500 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 785349D2DC for <linux-kernel@vger.kernel.org>; Fri, 2 Dec 2022 05:08:27 -0800 (PST) Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8Cx5vDK+IljmsoCAA--.6438S3; Fri, 02 Dec 2022 21:08:26 +0800 (CST) Received: from linux.localdomain (unknown [113.200.148.30]) by localhost.localdomain (Coremail) with SMTP id AQAAf8BxV1fJ+IljAHEkAA--.6253S2; Fri, 02 Dec 2022 21:08:25 +0800 (CST) From: Tiezhu Yang <yangtiezhu@loongson.cn> To: Huacai Chen <chenhuacai@kernel.org>, WANG Xuerui <kernel@xen0n.name>, Masami Hiramatsu <mhiramat@kernel.org> Cc: loongarch@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH v7 0/4] Add kprobe and kretprobe support for LoongArch Date: Fri, 2 Dec 2022 21:08:21 +0800 Message-Id: <1669986505-11322-1-git-send-email-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.1.0 X-CM-TRANSID: AQAAf8BxV1fJ+IljAHEkAA--.6253S2 X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Coremail-Antispam: 1Uk129KBjvJXoW7AF1rJryUtF45Jw1rZrWUJwb_yoW8ur1fpF 9rAwn8Kr4rGr93Jr9xJw1Uur1ftw4kG3y7W3W2yryrA3W7ZryUAr4fKrZrXa4rGw4aqr1S qr1rX3yagFyxJa7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUj1kv1TuYvTs0mT0YCTnIWj qI5I8CrVACY4xI64kE6c02F40Ex7xfYxn0WfASr-VFAUDa7-sFnT9fnUUIcSsGvfJTRUUU b7AYFVCjjxCrM7AC8VAFwI0_Jr0_Gr1l1xkIjI8I6I8E6xAIw20EY4v20xvaj40_Wr0E3s 1l1IIY67AEw4v_JrI_Jryl8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xv wVC0I7IYx2IY67AKxVWUJVWUCwA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwA2z4 x0Y4vEx4A2jsIE14v26r4UJVWxJr1l84ACjcxK6I8E87Iv6xkF7I0E14v26r4UJVWxJr1l e2I262IYc4CY6c8Ij28IcVAaY2xG8wAqjxCEc2xF0cIa020Ex4CE44I27wAqx4xG64xvF2 IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r4U McvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwCF04k20xvY0x0EwIxGrwCFx2 IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE14v2 6r106r1rMI8E67AF67kF1VAFwI0_JF0_Jw1lIxkGc2Ij64vIr41lIxAIcVC0I7IYx2IY67 AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF04k26cxKx2IY s7xG6r1j6r1xMIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Jr 0_GrUvcSsGvfC2KfnxnUUI43ZEXa7IU8czVUUUUUU== X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1751108806173626500?= X-GMAIL-MSGID: =?utf-8?q?1751108806173626500?= |
Series |
Add kprobe and kretprobe support for LoongArch
|
|
Message
Tiezhu Yang
Dec. 2, 2022, 1:08 p.m. UTC
v7: -- Remove stop_machine_cpuslocked() related code v6: -- Add a new patch to redefine larch_insn_patch_text() with stop_machine_cpuslocked() -- Modify kprobe_breakpoint_handler() to consider the original insn is break and return the correct value -- Modify do_bp() to refresh bcode when original insn is break v5: -- Rebase on the latest code -- Use stop_machine_cpuslocked() to modify insn to avoid CPU race v4: -- Remove kprobe_exceptions_notify() in kprobes.c -- Call kprobe_breakpoint_handler() and kprobe_singlestep_handler() in do_bp() v3: -- Rebase on the latest code -- Check the alignment of PC in simu_branch() and simu_pc() -- Add ibar in flush_insn_slot() -- Rename kprobe_{pre,post}_handler() to {post_}kprobe_handler -- Add preempt_disable() and preempt_enable_no_resched() -- Remove r0 save/restore and do some minor changes in kprobes_trampoline.S -- Do not enable CONFIG_KPROBES by default v2: -- Split simu_branch() and simu_pc() into a single patch -- Call kprobe_page_fault() in do_page_fault() -- Add kprobes_trampoline.S for kretprobe Tiezhu Yang (4): LoongArch: Simulate branch and PC instructions LoongArch: Add kprobe support LoongArch: Add kretprobe support samples/kprobes: Add LoongArch support arch/loongarch/Kconfig | 2 + arch/loongarch/include/asm/inst.h | 27 +++ arch/loongarch/include/asm/kprobes.h | 59 +++++ arch/loongarch/include/asm/ptrace.h | 1 + arch/loongarch/kernel/Makefile | 2 + arch/loongarch/kernel/inst.c | 123 +++++++++++ arch/loongarch/kernel/kprobes.c | 335 +++++++++++++++++++++++++++++ arch/loongarch/kernel/kprobes_trampoline.S | 96 +++++++++ arch/loongarch/kernel/traps.c | 13 +- arch/loongarch/mm/fault.c | 4 + samples/kprobes/kprobe_example.c | 8 + 11 files changed, 666 insertions(+), 4 deletions(-) create mode 100644 arch/loongarch/include/asm/kprobes.h create mode 100644 arch/loongarch/kernel/kprobes.c create mode 100644 arch/loongarch/kernel/kprobes_trampoline.S