From patchwork Wed Jan 18 02:00:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tiezhu Yang X-Patchwork-Id: 4139 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp2091909wrn; Tue, 17 Jan 2023 18:03:02 -0800 (PST) X-Google-Smtp-Source: AMrXdXuWpo5Ug90Z3xydJ25R8JNy18o5IsR6JBOt9z1CkQLZvhkMkyDgA4M9+dPvr0VPw7lE2+dD X-Received: by 2002:a05:6a21:1690:b0:b8:e25f:e2a6 with SMTP id np16-20020a056a21169000b000b8e25fe2a6mr2679546pzb.57.1674007382028; Tue, 17 Jan 2023 18:03:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674007382; cv=none; d=google.com; s=arc-20160816; b=CKakvMAs7Fnnbu6ihIsOq+cfVNeu3Umk1m+NTd8EvMy28RFyGxMCrIEuVVO/2vH6bW vRzyFkr9Apy4I3Jw//wslCD3k19V92+4O6PftNI0cP0pgwPYMJngbLjoKuZ6JG++QGUE Z8djPyfGHRayl7vG7eFbQWTVUOtGXhAOOPjxrCksroOjuxCWgzxr7BUfw++cHWaYXvXN KzvLZ4MZiRtGCnued2bGr6l7ej1bVkHHEl/vzjWpTga/CzTnVXHGRVgK4evsU48Cyt1T OwB6jvM9l3zoCI/fn1S0HFaO+1o/9/EleqjO7bOAnPvTNz/eyivgbdq8En7J1BmF9CmF +ANw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=UIJVkNgUZ43dBNyFSK4JFcnXDWMDsVES2E8CgSgz0E0=; b=SOHxQgtF8Jujh7m/ehl4KZ5Jyic2zC0wFEHUXkJnL+cKnwvJPGn2XXF6Mgj3PYn1zF 5+Of9MoG+9ABwtvlvkUu7EKAwpvcuB6BWtvyZh1jhDETq+DvC/O9jVZ30RnrwoVZsaNh M/RKAvhKX69uIQcHqpM8YgzLWDotQfDVYyTMR+zrJfKTk0yrqPv8aIT4BjsyFt3vZhQS vfr4wIR11UlLPe/8vemQDILR+jfMjHjratDPKAPLSrx3dBadntqCTkrOWDTYFm+e+u2R IEBJBm16Nt/oGsqF5TRWefZblQMsFm7wZ4AtujxBLS7JFeKnmb8X81JbaQKJmwuldvXH p2Qg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g32-20020a632020000000b004a5f0b510d2si35238380pgg.258.2023.01.17.18.02.49; Tue, 17 Jan 2023 18:03:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229649AbjARCBQ (ORCPT + 99 others); Tue, 17 Jan 2023 21:01:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39160 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229449AbjARCBK (ORCPT ); Tue, 17 Jan 2023 21:01:10 -0500 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 041A845BEC for ; Tue, 17 Jan 2023 18:01:04 -0800 (PST) Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8AxmOneUsdjPD0CAA--.2967S3; Wed, 18 Jan 2023 10:01:03 +0800 (CST) Received: from linux.localdomain (unknown [113.200.148.30]) by localhost.localdomain (Coremail) with SMTP id AQAAf8DxTuTeUsdjPhYbAA--.17049S2; Wed, 18 Jan 2023 10:01:02 +0800 (CST) From: Tiezhu Yang To: Huacai Chen , WANG Xuerui , Masami Hiramatsu Cc: loongarch@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH v12 0/5] Add kprobe and kretprobe support for LoongArch Date: Wed, 18 Jan 2023 10:00:56 +0800 Message-Id: <1674007261-9198-1-git-send-email-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.1.0 X-CM-TRANSID: AQAAf8DxTuTeUsdjPhYbAA--.17049S2 X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Coremail-Antispam: 1Uk129KBjvJXoWxCr1UXrWUZF1ftFy5Ar1xGrg_yoW5KF1DpF 9rArn8tr4rXrySvr9xJa47ur1Sqw4kG3y7W3W7GrWru3W7XryUAr4xKrsrXFy8Gwsaqr1I qr1fXrWagFy3J37anT9S1TB71UUUUUJqnTZGkaVYY2UrUUUUj1kv1TuYvTs0mT0YCTnIWj qI5I8CrVACY4xI64kE6c02F40Ex7xfYxn0WfASr-VFAUDa7-sFnT9fnUUIcSsGvfJTRUUU b3kYFVCjjxCrM7AC8VAFwI0_Jr0_Gr1l1xkIjI8I6I8E6xAIw20EY4v20xvaj40_Wr0E3s 1l1IIY67AEw4v_JrI_Jryl8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xv wVC0I7IYx2IY67AKxVW8JVW5JwA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwA2z4 x0Y4vEx4A2jsIE14v26r4UJVWxJr1l84ACjcxK6I8E87Iv6xkF7I0E14v26r4UJVWxJr1l n4kS14v26r1Y6r17M2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12xvs2x26I8E6x ACxx1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1Y6r17McIj6I8E 87Iv67AKxVWUJVW8JwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41l42xK82 IYc2Ij64vIr41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1l4IxYO2xFxVAFwI0_Jrv_JF1lx2Iq xVAqx4xG67AKxVWUJVWUGwC20s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r 126r1DMIIYrxkI7VAKI48JMIIF0xvE2Ix0cI8IcVAFwI0_Jr0_JF4lIxAIcVC0I7IYx2IY 6xkF7I0E14v26r1j6r4UMIIF0xvE42xK8VAvwI8IcIk0rVWUJVWUCwCI42IY6I8E87Iv67 AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x 07je0PfUUUUU= X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755323964462002993?= X-GMAIL-MSGID: =?utf-8?q?1755323964462002993?= v12: -- Rebase on the latest code -- Fix -Wmissing-prototypes warning when make W=1 -- Drop patch #6 "Use common function sign_extend64()" since it has been applied yet v11: -- Rebase on the latest code -- Address all the review comments, thank you all -- Modify arch_prepare_kprobe() and setup_singlestep() to make the probe logic more clear -- Mark some assembler symbols as non-kprobe-able -- Use common function sign_extend64() -- Test 20 times about 36 hours for all the 71 assembler functions annotated with SYM_CODE_START and SYM_FUNC_START under arch/loongarch, especially test memset alone for 10 hours, no hang problems v10: -- Remove sign_extend() based on the latest code -- Rename insns_are_not_supported() to insns_not_supported() -- Rename insns_are_not_simulated() to insns_not_simulated() -- Set KPROBE_HIT_SSDONE if cur->post_handler is not NULL -- Enable preemption for KPROBE_REENTER in kprobe_fault_handler() v9: -- Rename sign_extended() to sign_extend() -- Modify kprobe_fault_handler() to handle all of kprobe_status v8: -- Put "regs->csr_prmd &= ~CSR_PRMD_PIE;" ahead to save one line -- Add code comment of preempt_disable() -- Put kprobe_page_fault() in __do_page_fault() -- Modify the check condition of break insn in kprobe_breakpoint_handler() v7: -- Remove stop_machine_cpuslocked() related code v6: -- Add a new patch to redefine larch_insn_patch_text() with stop_machine_cpuslocked() -- Modify kprobe_breakpoint_handler() to consider the original insn is break and return the correct value -- Modify do_bp() to refresh bcode when original insn is break v5: -- Rebase on the latest code -- Use stop_machine_cpuslocked() to modify insn to avoid CPU race v4: -- Remove kprobe_exceptions_notify() in kprobes.c -- Call kprobe_breakpoint_handler() and kprobe_singlestep_handler() in do_bp() v3: -- Rebase on the latest code -- Check the alignment of PC in simu_branch() and simu_pc() -- Add ibar in flush_insn_slot() -- Rename kprobe_{pre,post}_handler() to {post_}kprobe_handler -- Add preempt_disable() and preempt_enable_no_resched() -- Remove r0 save/restore and do some minor changes in kprobes_trampoline.S -- Do not enable CONFIG_KPROBES by default v2: -- Split simu_branch() and simu_pc() into a single patch -- Call kprobe_page_fault() in do_page_fault() -- Add kprobes_trampoline.S for kretprobe Tiezhu Yang (5): LoongArch: Simulate branch and PC* instructions LoongArch: Add kprobe support LoongArch: Add kretprobe support LoongArch: Mark some assembler symbols as non-kprobe-able samples/kprobes: Add LoongArch support arch/loongarch/Kconfig | 2 + arch/loongarch/include/asm/asm.h | 10 + arch/loongarch/include/asm/inst.h | 20 ++ arch/loongarch/include/asm/kprobes.h | 61 +++++ arch/loongarch/include/asm/ptrace.h | 1 + arch/loongarch/kernel/Makefile | 2 + arch/loongarch/kernel/entry.S | 1 + arch/loongarch/kernel/inst.c | 123 +++++++++ arch/loongarch/kernel/kprobes.c | 405 +++++++++++++++++++++++++++++ arch/loongarch/kernel/kprobes_trampoline.S | 96 +++++++ arch/loongarch/kernel/traps.c | 11 +- arch/loongarch/lib/memcpy.S | 3 + arch/loongarch/mm/fault.c | 3 + samples/kprobes/kprobe_example.c | 8 + 14 files changed, 741 insertions(+), 5 deletions(-) create mode 100644 arch/loongarch/include/asm/kprobes.h create mode 100644 arch/loongarch/kernel/kprobes.c create mode 100644 arch/loongarch/kernel/kprobes_trampoline.S Tested-by: Jeff Xie