From patchwork Tue Mar 18 20:48:40 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeremy Linton X-Patchwork-Id: 14021533 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 75EC52144B7; Tue, 18 Mar 2025 20:48:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742330940; cv=none; b=idBoadjsuXpgDv2qH7LAzSFfFLRrv9BqwBV6oyo15CTvyL5H6jHRiyM1Kn0hcj40Wc4b1xGMyDqclk3HSo9H19BxXiVysWlzPhLie6k8AhdPtvzEM+EIQPCIRCNs7k2BxHcsKrdjNZKhOsQTo1H9/wn5DI+iSfK+accMUvPzRV4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742330940; c=relaxed/simple; bh=gK9egMUzih1a/rK9sRNXsbKWUsRrvAGvkOh19enB7rI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=bh/BZDM2MwwZ6BJzNLImspnQpFekLVTyVDenWyhXPjgCaRnQI3GNlfw2M35/TX52DDSEGh6x/PC3dP1zgkizXvJAVU0kMsZxWPiLaI0XIAGVoMMeDTOdBHu3o09AAdDAbP8nO28lr5SdUoAoh7k1oPGNp8uHgCMOa2TXWoBNPf4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 921121C00; Tue, 18 Mar 2025 13:49:06 -0700 (PDT) Received: from u200865.usa.arm.com (usa-sjc-mx-foss1.foss.arm.com [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A18823F694; Tue, 18 Mar 2025 13:48:57 -0700 (PDT) From: Jeremy Linton To: linux-trace-kernel@vger.kernel.org Cc: linux-perf-users@vger.kernel.org, mhiramat@kernel.org, oleg@redhat.com, peterz@infradead.org, acme@kernel.org, namhyung@kernel.org, mark.rutland@arm.com, alexander.shishkin@linux.intel.com, jolsa@kernel.org, irogers@google.com, adrian.hunter@intel.com, kan.liang@linux.intel.com, thiago.bauermann@linaro.org, broonie@kernel.org, yury.khrustalev@arm.com, kristina.martsenko@arm.com, liaochang1@huawei.com, catalin.marinas@arm.com, will@kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Jeremy Linton Subject: [PATCH 6/7] uprobes: Allow the use of uprobe_warn() in arch code Date: Tue, 18 Mar 2025 15:48:40 -0500 Message-ID: <20250318204841.373116-7-jeremy.linton@arm.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250318204841.373116-1-jeremy.linton@arm.com> References: <20250318204841.373116-1-jeremy.linton@arm.com> Precedence: bulk X-Mailing-List: linux-trace-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 The uprobe_warn function is limited to the uprobe core, but the functionality is useful to report arch specific errors. Drop the static so it can be used in those code paths. Signed-off-by: Jeremy Linton --- arch/arm64/kernel/probes/simulate-insn.c | 8 ++++++-- arch/arm64/kernel/probes/uprobes.c | 4 ++++ include/linux/uprobes.h | 1 + kernel/events/uprobes.c | 2 +- 4 files changed, 12 insertions(+), 3 deletions(-) diff --git a/arch/arm64/kernel/probes/simulate-insn.c b/arch/arm64/kernel/probes/simulate-insn.c index 1fc9bb69b1eb..fe637fec8f36 100644 --- a/arch/arm64/kernel/probes/simulate-insn.c +++ b/arch/arm64/kernel/probes/simulate-insn.c @@ -56,8 +56,10 @@ static inline void update_lr(struct pt_regs *regs, long addr) if (user_mode(regs) && task_gcs_el0_enabled(current)) { push_user_gcs(addr + 4, &err); - if (err) + if (err) { + uprobe_warn(current, "GCS stack push failure"); force_sig(SIGSEGV); + } } procedure_link_pointer_set(regs, addr + 4); } @@ -160,8 +162,10 @@ simulate_ret(u32 opcode, long addr, struct pt_regs *regs) if (user_mode(regs) && task_gcs_el0_enabled(current)) { ret_addr = pop_user_gcs(&err); - if (err || ret_addr != procedure_link_pointer(regs)) + if (err || ret_addr != procedure_link_pointer(regs)) { + uprobe_warn(current, "GCS RET address mismatch"); force_sig(SIGSEGV); + } } } diff --git a/arch/arm64/kernel/probes/uprobes.c b/arch/arm64/kernel/probes/uprobes.c index 5e72409a255a..9349d521316c 100644 --- a/arch/arm64/kernel/probes/uprobes.c +++ b/arch/arm64/kernel/probes/uprobes.c @@ -54,6 +54,7 @@ int arch_uprobe_analyze_insn(struct arch_uprobe *auprobe, struct mm_struct *mm, switch (arm_probe_decode_insn(insn, &auprobe->api)) { case INSN_REJECTED: + uprobe_warn(current, "Unsupported instruction at probe location"); return -EINVAL; case INSN_GOOD_NO_SLOT: @@ -169,6 +170,7 @@ arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr, gcspr = read_sysreg_s(SYS_GCSPR_EL0); gcs_ret_vaddr = load_user_gcs((unsigned long __user *)gcspr, &err); if (err) { + uprobe_warn(current, "GCS stack not available for retprobe"); force_sig(SIGSEGV); goto out; } @@ -180,11 +182,13 @@ arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr, * a GCS exception. */ if (gcs_ret_vaddr != orig_ret_vaddr) { + uprobe_warn(current, "LR/GCS mismatch, likely due to incorrectly placed retprobe"); orig_ret_vaddr = -1; goto out; } put_user_gcs(trampoline_vaddr, (unsigned long __user *) gcspr, &err); if (err) { + uprobe_warn(current, "GCS stack update failure during retprobe"); force_sig(SIGSEGV); goto out; } diff --git a/include/linux/uprobes.h b/include/linux/uprobes.h index b1df7d792fa1..9578ef1ea5a3 100644 --- a/include/linux/uprobes.h +++ b/include/linux/uprobes.h @@ -185,6 +185,7 @@ struct uprobes_state { }; extern void __init uprobes_init(void); +extern void uprobe_warn(struct task_struct *t, const char *msg); extern int set_swbp(struct arch_uprobe *aup, struct mm_struct *mm, unsigned long vaddr); extern int set_orig_insn(struct arch_uprobe *aup, struct mm_struct *mm, unsigned long vaddr); extern bool is_swbp_insn(uprobe_opcode_t *insn); diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c index b4ca8898fe17..613c1c76f227 100644 --- a/kernel/events/uprobes.c +++ b/kernel/events/uprobes.c @@ -118,7 +118,7 @@ struct xol_area { unsigned long vaddr; /* Page(s) of instruction slots */ }; -static void uprobe_warn(struct task_struct *t, const char *msg) +void uprobe_warn(struct task_struct *t, const char *msg) { pr_warn("uprobe: %s:%d failed to %s\n", current->comm, current->pid, msg); }