linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Masami Hiramatsu <mhiramat@redhat.com>
To: Abhishek Sagar <sagar.abhishek@gmail.com>
Cc: Harvey Harrison <harvey.harrison@gmail.com>,
	Ingo Molnar <mingo@elte.hu>, "H. Peter Anvin" <hpa@zytor.com>,
	LKML <linux-kernel@vger.kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	qbarnes@gmail.com, ananth@in.ibm.com, jkenisto@us.ibm.com
Subject: Re: [PATCH] x86: kprobes change kprobe_handler flow
Date: Tue, 01 Jan 2008 12:49:19 -0500	[thread overview]
Message-ID: <477A7D1F.8020703@redhat.com> (raw)
In-Reply-To: <4778E8B0.6010400@gmail.com>

Hello Abhishek,

Abhishek Sagar wrote:
> Harvey Harrison wrote:
>> Make the control flow of kprobe_handler more obvious.
>>
>> Collapse the separate if blocks/gotos with if/else blocks
>> this unifies the duplication of the check for a breakpoint
>> instruction race with another cpu.
> 
> This is a patch derived from kprobe_handler of the ARM kprobes
> port. This further simplifies the current x86 kprobe_handler.
> The resulting definition is smaller, more readable, has no
> goto's and contains only a single call to get_kprobe.

Thank you.
As far as I can see, this patch did more than cleanup.
Could you separate changing logic from cleanup and explain
why the logic should be changed?
That will be very useful for reviewers.

> Signed-off-by: Abhishek Sagar <sagar.abhishek@gmail.com>
> Signed-off-by: Quentin Barnes <qbarnes@gmail.com>
> ---
> 
> diff --git a/arch/x86/kernel/kprobes_32.c b/arch/x86/kernel/kprobes_32.c
> index 3a020f7..5a626fd 100644
> --- a/arch/x86/kernel/kprobes_32.c
> +++ b/arch/x86/kernel/kprobes_32.c
> @@ -240,108 +240,110 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
>  	*sara = (unsigned long) &kretprobe_trampoline;
>  }
>  
> +static __always_inline void setup_singlestep(struct kprobe *p,
> +					     struct pt_regs *regs,
> +					     struct kprobe_ctlblk *kcb)
> +{
> +#if !defined(CONFIG_PREEMPT) || defined(CONFIG_PM)
> +	if (p->ainsn.boostable == 1 && !p->post_handler) {
> +		/* Boost up -- we can execute copied instructions directly */
> +		reset_current_kprobe();
> +		regs->eip = (unsigned long)p->ainsn.insn;
> +		preempt_enable_no_resched();
> +	} else {
> +		prepare_singlestep(p, regs);
> +		kcb->kprobe_status = KPROBE_HIT_SS;
> +	}
> +#else
> +	prepare_singlestep(p, regs);
> +	kcb->kprobe_status = KPROBE_HIT_SS;

please avoid code duplication.

> +#endif
> +}
> +
>  /*
>   * Interrupts are disabled on entry as trap3 is an interrupt gate and they
>   * remain disabled thorough out this function.
>   */
>  static int __kprobes kprobe_handler(struct pt_regs *regs)
>  {
> -	struct kprobe *p;
>  	int ret = 0;
>  	kprobe_opcode_t *addr;
> +	struct kprobe *p, *cur;
>  	struct kprobe_ctlblk *kcb;
>  
>  	addr = (kprobe_opcode_t *)(regs->eip - sizeof(kprobe_opcode_t));
> +	if (*addr != BREAKPOINT_INSTRUCTION) {
> +		/*
> +		 * The breakpoint instruction was removed right
> +		 * after we hit it.  Another cpu has removed
> +		 * either a probepoint or a debugger breakpoint
> +		 * at this address.  In either case, no further
> +		 * handling of this interrupt is appropriate.
> +		 * Back up over the (now missing) int3 and run
> +		 * the original instruction.
> +		 */
> +		regs->eip -= sizeof(kprobe_opcode_t);
> +		return 1;
> +	}
>  
> -	/*
> -	 * We don't want to be preempted for the entire
> -	 * duration of kprobe processing
> -	 */
>  	preempt_disable();
>  	kcb = get_kprobe_ctlblk();
> +	cur = kprobe_running();
> +	p = get_kprobe(addr);
>  
> -	/* Check we're not actually recursing */
> -	if (kprobe_running()) {
> -		p = get_kprobe(addr);
> -		if (p) {
> -			if (kcb->kprobe_status == KPROBE_HIT_SS &&
> -				*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
> -				regs->eflags &= ~TF_MASK;
> -				regs->eflags |= kcb->kprobe_saved_eflags;
> -				goto no_kprobe;
> -			}
> -			/* We have reentered the kprobe_handler(), since
> -			 * another probe was hit while within the handler.
> -			 * We here save the original kprobes variables and
> -			 * just single step on the instruction of the new probe
> -			 * without calling any user handlers.
> -			 */
> -			save_previous_kprobe(kcb);
> -			set_current_kprobe(p, regs, kcb);
> -			kprobes_inc_nmissed_count(p);
> -			prepare_singlestep(p, regs);
> -			kcb->kprobe_status = KPROBE_REENTER;
> -			return 1;
> -		} else {
> -			if (*addr != BREAKPOINT_INSTRUCTION) {
> -			/* The breakpoint instruction was removed by
> -			 * another cpu right after we hit, no further
> -			 * handling of this interrupt is appropriate
> -			 */
> -				regs->eip -= sizeof(kprobe_opcode_t);
> +	if (p) {
> +		if (cur) {
> +			switch (kcb->kprobe_status) {
> +			case KPROBE_HIT_ACTIVE:
> +			case KPROBE_HIT_SSDONE:
> +				/* a probe has been hit inside a
> +				 * user handler */
> +				save_previous_kprobe(kcb);
> +				set_current_kprobe(p, regs, kcb);
> +				kprobes_inc_nmissed_count(p);
> +				prepare_singlestep(p, regs);
> +				kcb->kprobe_status = KPROBE_REENTER;
>  				ret = 1;
> -				goto no_kprobe;
> -			}
> -			p = __get_cpu_var(current_kprobe);
> -			if (p->break_handler && p->break_handler(p, regs)) {
> -				goto ss_probe;
> +				break;
> +			case KPROBE_HIT_SS:
> +				if (*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
> +					regs->eflags &= ~TF_MASK;
> +					regs->eflags |=
> +						kcb->kprobe_saved_eflags;
> +				} else {
> +					/* BUG? */
> +				}
> +				break;
> +			default:
> +				/* impossible cases */
> +				BUG();
>  			}
> -		}
> -		goto no_kprobe;
> -	}
> +		} else {
> +			set_current_kprobe(p, regs, kcb);
> +			kcb->kprobe_status = KPROBE_HIT_ACTIVE;
>  
> -	p = get_kprobe(addr);
> -	if (!p) {
> -		if (*addr != BREAKPOINT_INSTRUCTION) {
>  			/*
> -			 * The breakpoint instruction was removed right
> -			 * after we hit it.  Another cpu has removed
> -			 * either a probepoint or a debugger breakpoint
> -			 * at this address.  In either case, no further
> -			 * handling of this interrupt is appropriate.
> -			 * Back up over the (now missing) int3 and run
> -			 * the original instruction.
> +			 * If we have no pre-handler or it returned 0, we
> +			 * continue with normal processing.  If we have a
> +			 * pre-handler and it returned non-zero, it prepped
> +			 * for calling the break_handler below on re-entry
> +			 * for jprobe processing, so get out doing nothing
> +			 * more here.
>  			 */
> -			regs->eip -= sizeof(kprobe_opcode_t);
> +			if (!p->pre_handler || !p->pre_handler(p, regs))
> +				setup_singlestep(p, regs, kcb);
>  			ret = 1;
>  		}
> -		/* Not one of ours: let kernel handle it */
> -		goto no_kprobe;
> -	}
> -
> -	set_current_kprobe(p, regs, kcb);
> -	kcb->kprobe_status = KPROBE_HIT_ACTIVE;
> -
> -	if (p->pre_handler && p->pre_handler(p, regs))
> -		/* handler has already set things up, so skip ss setup */
> -		return 1;
> +	} else if (cur) {
> +		p = __get_cpu_var(current_kprobe);
> +		if (p->break_handler && p->break_handler(p, regs)) {
> +			setup_singlestep(p, regs, kcb);
> +			ret = 1;
> +		}
> +	} /* else: not a kprobe fault; let the kernel handle it */
>  
> -ss_probe:
> -#if !defined(CONFIG_PREEMPT) || defined(CONFIG_PM)
> -	if (p->ainsn.boostable == 1 && !p->post_handler){
> -		/* Boost up -- we can execute copied instructions directly */
> -		reset_current_kprobe();
> -		regs->eip = (unsigned long)p->ainsn.insn;
> +	if (!ret)
>  		preempt_enable_no_resched();
> -		return 1;
> -	}
> -#endif
> -	prepare_singlestep(p, regs);
> -	kcb->kprobe_status = KPROBE_HIT_SS;
> -	return 1;
> -
> -no_kprobe:
> -	preempt_enable_no_resched();
>  	return ret;
>  }
>  
> diff --git a/arch/x86/kernel/kprobes_64.c b/arch/x86/kernel/kprobes_64.c
> index 5df19a9..788114c 100644
> --- a/arch/x86/kernel/kprobes_64.c
> +++ b/arch/x86/kernel/kprobes_64.c
> @@ -278,30 +278,47 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
>  	*sara = (unsigned long) &kretprobe_trampoline;
>  }
>  
> -int __kprobes kprobe_handler(struct pt_regs *regs)
> +static int __kprobes kprobe_handler(struct pt_regs *regs)
>  {
> -	struct kprobe *p;
>  	int ret = 0;
> -	kprobe_opcode_t *addr = (kprobe_opcode_t *)(regs->rip - sizeof(kprobe_opcode_t));
> +	kprobe_opcode_t *addr;
> +	struct kprobe *p, *cur;
>  	struct kprobe_ctlblk *kcb;
>  
> -	/*
> -	 * We don't want to be preempted for the entire
> -	 * duration of kprobe processing
> -	 */
> +	addr = (kprobe_opcode_t *)(regs->rip - sizeof(kprobe_opcode_t));
> +	if (*addr != BREAKPOINT_INSTRUCTION) {
> +		/*
> +		 * The breakpoint instruction was removed right
> +		 * after we hit it.  Another cpu has removed
> +		 * either a probepoint or a debugger breakpoint
> +		 * at this address.  In either case, no further
> +		 * handling of this interrupt is appropriate.
> +		 * Back up over the (now missing) int3 and run
> +		 * the original instruction.
> +		 */
> +		regs->rip = (unsigned long)addr;
> +		return 1;
> +	}
> +
>  	preempt_disable();
>  	kcb = get_kprobe_ctlblk();
> +	cur = kprobe_running();
> +	p = get_kprobe(addr);
>  
> -	/* Check we're not actually recursing */
> -	if (kprobe_running()) {
> -		p = get_kprobe(addr);
> -		if (p) {
> -			if (kcb->kprobe_status == KPROBE_HIT_SS &&
> -				*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
> -				regs->eflags &= ~TF_MASK;
> -				regs->eflags |= kcb->kprobe_saved_rflags;
> -				goto no_kprobe;
> -			} else if (kcb->kprobe_status == KPROBE_HIT_SSDONE) {
> +	if (p) {
> +		if (cur) {
> +			switch (kcb->kprobe_status) {
> +			case KPROBE_HIT_ACTIVE:
> +				/* a probe has been hit inside a
> +				 * user handler */
> +				save_previous_kprobe(kcb);
> +				set_current_kprobe(p, regs, kcb);
> +				kprobes_inc_nmissed_count(p);
> +				prepare_singlestep(p, regs);
> +				kcb->kprobe_status = KPROBE_REENTER;
> +				ret = 1;
> +				break;
> +			case KPROBE_HIT_SSDONE:
>  				/* TODO: Provide re-entrancy from
>  				 * post_kprobes_handler() and avoid exception
>  				 * stack corruption while single-stepping on
> @@ -311,72 +328,49 @@ int __kprobes kprobe_handler(struct pt_regs *regs)
>  				regs->rip = (unsigned long)p->addr;
>  				reset_current_kprobe();
>  				ret = 1;
> -			} else {
> -				/* We have reentered the kprobe_handler(), since
> -				 * another probe was hit while within the
> -				 * handler. We here save the original kprobe
> -				 * variables and just single step on instruction
> -				 * of the new probe without calling any user
> -				 * handlers.
> -				 */
> -				save_previous_kprobe(kcb);
> -				set_current_kprobe(p, regs, kcb);
> -				kprobes_inc_nmissed_count(p);
> -				prepare_singlestep(p, regs);
> -				kcb->kprobe_status = KPROBE_REENTER;
> -				return 1;
> +				break;
> +			case KPROBE_HIT_SS:
> +				if (*p->ainsn.insn == BREAKPOINT_INSTRUCTION) {
> +					regs->eflags &= ~TF_MASK;
> +					regs->eflags |=
> +						kcb->kprobe_saved_eflags;
> +				} else {
> +					/* BUG? */
> +				}
> +				break;
> +			default:
> +				/* impossible cases */
> +				BUG();
>  			}
>  		} else {
> -			if (*addr != BREAKPOINT_INSTRUCTION) {
> -			/* The breakpoint instruction was removed by
> -			 * another cpu right after we hit, no further
> -			 * handling of this interrupt is appropriate
> -			 */
> -				regs->rip = (unsigned long)addr;
> -				ret = 1;
> -				goto no_kprobe;
> -			}
> -			p = __get_cpu_var(current_kprobe);
> -			if (p->break_handler && p->break_handler(p, regs)) {
> -				goto ss_probe;
> -			}
> -		}
> -		goto no_kprobe;
> -	}
> +			set_current_kprobe(p, regs, kcb);
> +			kcb->kprobe_status = KPROBE_HIT_ACTIVE;
>  
> -	p = get_kprobe(addr);
> -	if (!p) {
> -		if (*addr != BREAKPOINT_INSTRUCTION) {
>  			/*
> -			 * The breakpoint instruction was removed right
> -			 * after we hit it.  Another cpu has removed
> -			 * either a probepoint or a debugger breakpoint
> -			 * at this address.  In either case, no further
> -			 * handling of this interrupt is appropriate.
> -			 * Back up over the (now missing) int3 and run
> -			 * the original instruction.
> +			 * If we have no pre-handler or it returned 0, we
> +			 * continue with normal processing.  If we have a
> +			 * pre-handler and it returned non-zero, it prepped
> +			 * for calling the break_handler below on re-entry
> +			 * for jprobe processing, so get out doing nothing
> +			 * more here.
>  			 */
> -			regs->rip = (unsigned long)addr;
> +			if (!p->pre_handler || !p->pre_handler(p, regs)) {
> +				prepare_singlestep(p, regs);
> +				kcb->kprobe_status = KPROBE_HIT_SS;
> +			}
>  			ret = 1;
>  		}
> -		/* Not one of ours: let kernel handle it */
> -		goto no_kprobe;
> -	}
> -
> -	set_current_kprobe(p, regs, kcb);
> -	kcb->kprobe_status = KPROBE_HIT_ACTIVE;
> -
> -	if (p->pre_handler && p->pre_handler(p, regs))
> -		/* handler has already set things up, so skip ss setup */
> -		return 1;
> -
> -ss_probe:
> -	prepare_singlestep(p, regs);
> -	kcb->kprobe_status = KPROBE_HIT_SS;
> -	return 1;
> +	} else if (cur) {
> +		p = __get_cpu_var(current_kprobe);
> +		if (p->break_handler && p->break_handler(p, regs)) {
> +			prepare_singlestep(p, regs);
> +			kcb->kprobe_status = KPROBE_HIT_SS;
> +			ret = 1;
> +		}
> +	} /* else: not a kprobe fault; let the kernel handle it */
>  
> -no_kprobe:
> -	preempt_enable_no_resched();
> +	if (!ret)
> +		preempt_enable_no_resched();
>  	return ret;
>  }
>  
> 

-- 
Masami Hiramatsu

Software Engineer
Hitachi Computer Products (America) Inc.
Software Solutions Division

e-mail: mhiramat@redhat.com, masami.hiramatsu.pt@hitachi.com



  parent reply	other threads:[~2008-01-01 17:50 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-12-28  1:44 [PATCH] x86: kprobes change kprobe_handler flow Harvey Harrison
2007-12-31 13:03 ` Abhishek Sagar
2008-01-01 15:35   ` Ingo Molnar
2008-01-01 19:40     ` Abhishek Sagar
2008-01-01 20:19       ` Harvey Harrison
2008-01-01 20:54         ` Abhishek Sagar
2008-01-02 18:09       ` Masami Hiramatsu
2008-01-02 19:31         ` Abhishek Sagar
2008-01-02 20:23           ` Ingo Molnar
2008-01-02 21:56           ` Masami Hiramatsu
2008-01-03 17:15             ` Masami Hiramatsu
2008-01-03 21:31               ` Masami Hiramatsu
2008-01-04  6:34                 ` Abhishek Sagar
2008-01-03 18:12             ` Abhishek Sagar
2008-01-03 20:11               ` Masami Hiramatsu
2008-01-04  6:43                 ` Abhishek Sagar
2008-01-01 17:49   ` Masami Hiramatsu [this message]
2008-01-01 20:24     ` Abhishek Sagar
2008-01-02 16:00       ` Masami Hiramatsu
  -- strict thread matches above, loose matches on Subject: below --
2007-12-28  2:08 Harvey Harrison
2007-12-30  8:07 ` Masami Hiramatsu
2007-12-30 13:47   ` Ingo Molnar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=477A7D1F.8020703@redhat.com \
    --to=mhiramat@redhat.com \
    --cc=ananth@in.ibm.com \
    --cc=harvey.harrison@gmail.com \
    --cc=hpa@zytor.com \
    --cc=jkenisto@us.ibm.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mingo@elte.hu \
    --cc=qbarnes@gmail.com \
    --cc=sagar.abhishek@gmail.com \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).