[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210311223720.dcdf5bdd65831028b8775dd7@kernel.org>
Date: Thu, 11 Mar 2021 22:37:20 +0900
From: Masami Hiramatsu <mhiramat@...nel.org>
To: Masami Hiramatsu <mhiramat@...nel.org>
Cc: Miroslav Benes <mbenes@...e.cz>,
Steven Rostedt <rostedt@...dmis.org>,
Ingo Molnar <mingo@...nel.org>, X86 ML <x86@...nel.org>,
Daniel Xu <dxu@...uu.xyz>, linux-kernel@...r.kernel.org,
bpf@...r.kernel.org, kuba@...nel.org, mingo@...hat.com,
ast@...nel.org, tglx@...utronix.de, kernel-team@...com, yhs@...com
Subject: Re: [PATCH -tip 3/5] kprobes: treewide: Remove trampoline_address
from kretprobe_trampoline_handler()
Hi Miroslav,
On Thu, 11 Mar 2021 00:42:25 +0900
Masami Hiramatsu <mhiramat@...nel.org> wrote:
> > > + */
> > > +static nokprobe_inline void *kretprobe_trampoline_addr(void)
> > > +{
> > > + return dereference_function_descriptor(kretprobe_trampoline);
> > > +}
> > > +
> >
> > Would it make sense to use this in s390 and powerpc reliable unwinders?
> >
> > Both
> >
> > arch/s390/kernel/stacktrace.c:arch_stack_walk_reliable()
> > arch/powerpc/kernel/stacktrace.c:__save_stack_trace_tsk_reliable()
> >
> > have
> >
> > if (state.ip == (unsigned long)kretprobe_trampoline)
> > return -EINVAL;
> >
> > which you wanted to hide previously if I am not mistaken.
>
> I think, if "ip" means "instruction pointer", it should point
> the real instruction address, which is dereferenced from function
> descriptor. So using kretprobe_trampoline_addr() is good.
Ah, sorry I misunderstood the question.
Yes, the per-arch stacktrace implementation must be fixed afterwards.
It is reliable or not depends on the actual unwinder implementation,
for example, on x86, frame-pointer based unwinder can unwind kretprobe,
but ORC based one doesn't (and discussing with Josh how to solve it)
Anyway since it strongly depends on the architecture, I would like to
leave those for each architecture stacktrace maitainer in this series.
Thank you,
--
Masami Hiramatsu <mhiramat@...nel.org>
Powered by blists - more mailing lists