2019-05-27 09:55:01 +03:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
2017-04-25 16:55:54 +03:00
|
|
|
/*
|
|
|
|
* Split from ftrace_64.S
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/magic.h>
|
|
|
|
#include <asm/ppc_asm.h>
|
|
|
|
#include <asm/asm-offsets.h>
|
|
|
|
#include <asm/ftrace.h>
|
|
|
|
#include <asm/ppc-opcode.h>
|
|
|
|
#include <asm/export.h>
|
|
|
|
#include <asm/thread_info.h>
|
|
|
|
#include <asm/bug.h>
|
|
|
|
#include <asm/ptrace.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
*
|
2018-04-19 10:04:09 +03:00
|
|
|
* ftrace_caller()/ftrace_regs_caller() is the function that replaces _mcount()
|
|
|
|
* when ftrace is active.
|
2017-04-25 16:55:54 +03:00
|
|
|
*
|
|
|
|
* We arrive here after a function A calls function B, and we are the trace
|
|
|
|
* function for B. When we enter r1 points to A's stack frame, B has not yet
|
|
|
|
* had a chance to allocate one yet.
|
|
|
|
*
|
|
|
|
* Additionally r2 may point either to the TOC for A, or B, depending on
|
|
|
|
* whether B did a TOC setup sequence before calling us.
|
|
|
|
*
|
|
|
|
* On entry the LR points back to the _mcount() call site, and r0 holds the
|
|
|
|
* saved LR as it was on entry to B, ie. the original return address at the
|
|
|
|
* call site in A.
|
|
|
|
*
|
|
|
|
* Our job is to save the register state into a struct pt_regs (on the stack)
|
|
|
|
* and then arrange for the ftrace function to be called.
|
|
|
|
*/
|
2018-04-19 10:04:09 +03:00
|
|
|
_GLOBAL(ftrace_regs_caller)
|
2017-04-25 16:55:54 +03:00
|
|
|
/* Save the original return address in A's stack frame */
|
|
|
|
std r0,LRSAVE(r1)
|
|
|
|
|
|
|
|
/* Create our stack frame + pt_regs */
|
|
|
|
stdu r1,-SWITCH_FRAME_SIZE(r1)
|
|
|
|
|
|
|
|
/* Save all gprs to pt_regs */
|
2017-06-01 13:48:16 +03:00
|
|
|
SAVE_GPR(0, r1)
|
|
|
|
SAVE_10GPRS(2, r1)
|
2018-04-19 10:04:00 +03:00
|
|
|
|
|
|
|
/* Ok to continue? */
|
|
|
|
lbz r3, PACA_FTRACE_ENABLED(r13)
|
|
|
|
cmpdi r3, 0
|
|
|
|
beq ftrace_no_trace
|
|
|
|
|
2017-06-01 13:48:16 +03:00
|
|
|
SAVE_10GPRS(12, r1)
|
|
|
|
SAVE_10GPRS(22, r1)
|
|
|
|
|
|
|
|
/* Save previous stack pointer (r1) */
|
|
|
|
addi r8, r1, SWITCH_FRAME_SIZE
|
|
|
|
std r8, GPR1(r1)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Load special regs for save below */
|
|
|
|
mfmsr r8
|
|
|
|
mfctr r9
|
|
|
|
mfxer r10
|
|
|
|
mfcr r11
|
|
|
|
|
|
|
|
/* Get the _mcount() call site out of LR */
|
|
|
|
mflr r7
|
|
|
|
/* Save it as pt_regs->nip */
|
|
|
|
std r7, _NIP(r1)
|
|
|
|
/* Save the read LR in pt_regs->link */
|
|
|
|
std r0, _LINK(r1)
|
|
|
|
|
|
|
|
/* Save callee's TOC in the ABI compliant location */
|
|
|
|
std r2, 24(r1)
|
|
|
|
ld r2,PACATOC(r13) /* get kernel TOC in r2 */
|
|
|
|
|
|
|
|
addis r3,r2,function_trace_op@toc@ha
|
|
|
|
addi r3,r3,function_trace_op@toc@l
|
|
|
|
ld r5,0(r3)
|
|
|
|
|
|
|
|
#ifdef CONFIG_LIVEPATCH
|
|
|
|
mr r14,r7 /* remember old NIP */
|
|
|
|
#endif
|
|
|
|
/* Calculate ip from nip-4 into r3 for call below */
|
|
|
|
subi r3, r7, MCOUNT_INSN_SIZE
|
|
|
|
|
|
|
|
/* Put the original return address in r4 as parent_ip */
|
|
|
|
mr r4, r0
|
|
|
|
|
|
|
|
/* Save special regs */
|
|
|
|
std r8, _MSR(r1)
|
|
|
|
std r9, _CTR(r1)
|
|
|
|
std r10, _XER(r1)
|
|
|
|
std r11, _CCR(r1)
|
|
|
|
|
|
|
|
/* Load &pt_regs in r6 for call below */
|
|
|
|
addi r6, r1 ,STACK_FRAME_OVERHEAD
|
|
|
|
|
|
|
|
/* ftrace_call(r3, r4, r5, r6) */
|
2018-04-19 10:04:09 +03:00
|
|
|
.globl ftrace_regs_call
|
|
|
|
ftrace_regs_call:
|
2017-04-25 16:55:54 +03:00
|
|
|
bl ftrace_stub
|
|
|
|
nop
|
|
|
|
|
2018-06-19 19:07:32 +03:00
|
|
|
/* Load ctr with the possibly modified NIP */
|
|
|
|
ld r3, _NIP(r1)
|
|
|
|
mtctr r3
|
2017-04-25 16:55:54 +03:00
|
|
|
#ifdef CONFIG_LIVEPATCH
|
2018-06-19 19:07:32 +03:00
|
|
|
cmpd r14, r3 /* has NIP been altered? */
|
2017-04-25 16:55:54 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Restore gprs */
|
2017-06-01 13:48:16 +03:00
|
|
|
REST_GPR(0,r1)
|
|
|
|
REST_10GPRS(2,r1)
|
|
|
|
REST_10GPRS(12,r1)
|
|
|
|
REST_10GPRS(22,r1)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Restore possibly modified LR */
|
|
|
|
ld r0, _LINK(r1)
|
|
|
|
mtlr r0
|
|
|
|
|
|
|
|
/* Restore callee's TOC */
|
|
|
|
ld r2, 24(r1)
|
|
|
|
|
|
|
|
/* Pop our stack frame */
|
|
|
|
addi r1, r1, SWITCH_FRAME_SIZE
|
|
|
|
|
|
|
|
#ifdef CONFIG_LIVEPATCH
|
2018-06-19 19:07:32 +03:00
|
|
|
/* Based on the cmpd above, if the NIP was altered handle livepatch */
|
2017-04-25 16:55:54 +03:00
|
|
|
bne- livepatch_handler
|
|
|
|
#endif
|
|
|
|
|
2018-04-19 10:04:09 +03:00
|
|
|
ftrace_caller_common:
|
2017-04-25 16:55:54 +03:00
|
|
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
|
|
|
.globl ftrace_graph_call
|
|
|
|
ftrace_graph_call:
|
|
|
|
b ftrace_graph_stub
|
|
|
|
_GLOBAL(ftrace_graph_stub)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
bctr /* jump after _mcount site */
|
|
|
|
|
|
|
|
_GLOBAL(ftrace_stub)
|
|
|
|
blr
|
|
|
|
|
2018-04-19 10:04:00 +03:00
|
|
|
ftrace_no_trace:
|
|
|
|
mflr r3
|
|
|
|
mtctr r3
|
|
|
|
REST_GPR(3, r1)
|
|
|
|
addi r1, r1, SWITCH_FRAME_SIZE
|
|
|
|
mtlr r0
|
|
|
|
bctr
|
|
|
|
|
2018-04-19 10:04:09 +03:00
|
|
|
_GLOBAL(ftrace_caller)
|
|
|
|
/* Save the original return address in A's stack frame */
|
|
|
|
std r0, LRSAVE(r1)
|
|
|
|
|
|
|
|
/* Create our stack frame + pt_regs */
|
|
|
|
stdu r1, -SWITCH_FRAME_SIZE(r1)
|
|
|
|
|
|
|
|
/* Save all gprs to pt_regs */
|
|
|
|
SAVE_8GPRS(3, r1)
|
|
|
|
|
|
|
|
lbz r3, PACA_FTRACE_ENABLED(r13)
|
|
|
|
cmpdi r3, 0
|
|
|
|
beq ftrace_no_trace
|
|
|
|
|
|
|
|
/* Get the _mcount() call site out of LR */
|
|
|
|
mflr r7
|
|
|
|
std r7, _NIP(r1)
|
|
|
|
|
|
|
|
/* Save callee's TOC in the ABI compliant location */
|
|
|
|
std r2, 24(r1)
|
|
|
|
ld r2, PACATOC(r13) /* get kernel TOC in r2 */
|
|
|
|
|
|
|
|
addis r3, r2, function_trace_op@toc@ha
|
|
|
|
addi r3, r3, function_trace_op@toc@l
|
|
|
|
ld r5, 0(r3)
|
|
|
|
|
|
|
|
/* Calculate ip from nip-4 into r3 for call below */
|
|
|
|
subi r3, r7, MCOUNT_INSN_SIZE
|
|
|
|
|
|
|
|
/* Put the original return address in r4 as parent_ip */
|
|
|
|
mr r4, r0
|
|
|
|
|
|
|
|
/* Set pt_regs to NULL */
|
|
|
|
li r6, 0
|
|
|
|
|
|
|
|
/* ftrace_call(r3, r4, r5, r6) */
|
|
|
|
.globl ftrace_call
|
|
|
|
ftrace_call:
|
|
|
|
bl ftrace_stub
|
|
|
|
nop
|
|
|
|
|
|
|
|
ld r3, _NIP(r1)
|
|
|
|
mtctr r3
|
|
|
|
|
|
|
|
/* Restore gprs */
|
|
|
|
REST_8GPRS(3,r1)
|
|
|
|
|
|
|
|
/* Restore callee's TOC */
|
|
|
|
ld r2, 24(r1)
|
|
|
|
|
|
|
|
/* Pop our stack frame */
|
|
|
|
addi r1, r1, SWITCH_FRAME_SIZE
|
|
|
|
|
|
|
|
/* Reload original LR */
|
|
|
|
ld r0, LRSAVE(r1)
|
|
|
|
mtlr r0
|
|
|
|
|
|
|
|
/* Handle function_graph or go back */
|
|
|
|
b ftrace_caller_common
|
|
|
|
|
2017-04-25 16:55:54 +03:00
|
|
|
#ifdef CONFIG_LIVEPATCH
|
|
|
|
/*
|
|
|
|
* This function runs in the mcount context, between two functions. As
|
|
|
|
* such it can only clobber registers which are volatile and used in
|
|
|
|
* function linkage.
|
|
|
|
*
|
|
|
|
* We get here when a function A, calls another function B, but B has
|
|
|
|
* been live patched with a new function C.
|
|
|
|
*
|
|
|
|
* On entry:
|
|
|
|
* - we have no stack frame and can not allocate one
|
|
|
|
* - LR points back to the original caller (in A)
|
|
|
|
* - CTR holds the new NIP in C
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
* - r0, r11 & r12 are free
|
2017-04-25 16:55:54 +03:00
|
|
|
*/
|
|
|
|
livepatch_handler:
|
2019-01-12 12:55:50 +03:00
|
|
|
ld r12, PACA_THREAD_INFO(r13)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Allocate 3 x 8 bytes */
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
ld r11, TI_livepatch_sp(r12)
|
|
|
|
addi r11, r11, 24
|
|
|
|
std r11, TI_livepatch_sp(r12)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Save toc & real LR on livepatch stack */
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
std r2, -24(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
mflr r12
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
std r12, -16(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Store stack end marker */
|
|
|
|
lis r12, STACK_END_MAGIC@h
|
|
|
|
ori r12, r12, STACK_END_MAGIC@l
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
std r12, -8(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Put ctr in r12 for global entry and branch there */
|
|
|
|
mfctr r12
|
|
|
|
bctrl
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now we are returning from the patched function to the original
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
* caller A. We are free to use r11, r12 and we can use r2 until we
|
2017-04-25 16:55:54 +03:00
|
|
|
* restore it.
|
|
|
|
*/
|
|
|
|
|
2019-01-12 12:55:50 +03:00
|
|
|
ld r12, PACA_THREAD_INFO(r13)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
ld r11, TI_livepatch_sp(r12)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Check stack marker hasn't been trashed */
|
|
|
|
lis r2, STACK_END_MAGIC@h
|
|
|
|
ori r2, r2, STACK_END_MAGIC@l
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
ld r12, -8(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
1: tdne r12, r2
|
|
|
|
EMIT_BUG_ENTRY 1b, __FILE__, __LINE__ - 1, 0
|
|
|
|
|
|
|
|
/* Restore LR & toc from livepatch stack */
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
ld r12, -16(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
mtlr r12
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
ld r2, -24(r11)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Pop livepatch stack frame */
|
2019-01-12 12:55:50 +03:00
|
|
|
ld r12, PACA_THREAD_INFO(r13)
|
powerpc/livepatch: Fix livepatch stack access
While running stress test with livepatch module loaded, kernel bug was
triggered.
cpu 0x5: Vector: 400 (Instruction Access) at [c0000000eb9d3b60]
5:mon> t
[c0000000eb9d3de0] c0000000eb9d3e30 (unreliable)
[c0000000eb9d3e30] c000000000008ab4 hardware_interrupt_common+0x114/0x120
--- Exception: 501 (Hardware Interrupt) at c000000000053040 livepatch_handler+0x4c/0x74
[c0000000eb9d4120] 0000000057ac6e9d (unreliable)
[d0000000089d9f78] 2e0965747962382e
SP (965747962342e09) is in userspace
When an interrupt occurs during the livepatch_handler execution, it's
possible for the livepatch_stack and/or thread_info to be corrupted.
eg:
Task A Interrupt Handler
========= =================
livepatch_handler:
mr r0, r1
ld r1, TI_livepatch_sp(r12)
hardware_interrupt_common:
do_IRQ+0x8:
mflr r0 <- saved stack pointer is overwritten
bl _mcount
...
std r27,-40(r1) <- overwrite of thread_info()
lis r2, STACK_END_MAGIC@h
ori r2, r2, STACK_END_MAGIC@l
ld r12, -8(r1)
Fix the corruption by using r11 register for livepatch stack
manipulation, instead of shuffling task stack and livepatch stack into
r1 register. Using r11 register also avoids disabling/enabling irq's
while setting up the livepatch stack.
Signed-off-by: Kamalesh Babulal <kamalesh@linux.vnet.ibm.com>
Reviewed-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Reviewed-by: Balbir Singh <bsingharora@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2017-09-20 13:19:51 +03:00
|
|
|
subi r11, r11, 24
|
|
|
|
std r11, TI_livepatch_sp(r12)
|
2017-04-25 16:55:54 +03:00
|
|
|
|
|
|
|
/* Return to original caller of live patched function */
|
|
|
|
blr
|
|
|
|
#endif /* CONFIG_LIVEPATCH */
|
|
|
|
|
|
|
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
|
|
|
_GLOBAL(ftrace_graph_caller)
|
|
|
|
stdu r1, -112(r1)
|
|
|
|
/* with -mprofile-kernel, parameter regs are still alive at _mcount */
|
|
|
|
std r10, 104(r1)
|
|
|
|
std r9, 96(r1)
|
|
|
|
std r8, 88(r1)
|
|
|
|
std r7, 80(r1)
|
|
|
|
std r6, 72(r1)
|
|
|
|
std r5, 64(r1)
|
|
|
|
std r4, 56(r1)
|
|
|
|
std r3, 48(r1)
|
|
|
|
|
|
|
|
/* Save callee's TOC in the ABI compliant location */
|
|
|
|
std r2, 24(r1)
|
|
|
|
ld r2, PACATOC(r13) /* get kernel TOC in r2 */
|
|
|
|
|
2019-09-05 21:20:29 +03:00
|
|
|
addi r5, r1, 112
|
2017-04-25 16:55:54 +03:00
|
|
|
mfctr r4 /* ftrace_caller has moved local addr here */
|
|
|
|
std r4, 40(r1)
|
|
|
|
mflr r3 /* ftrace_caller has restored LR from stack */
|
|
|
|
subi r4, r4, MCOUNT_INSN_SIZE
|
|
|
|
|
|
|
|
bl prepare_ftrace_return
|
|
|
|
nop
|
|
|
|
|
|
|
|
/*
|
|
|
|
* prepare_ftrace_return gives us the address we divert to.
|
|
|
|
* Change the LR to this.
|
|
|
|
*/
|
|
|
|
mtlr r3
|
|
|
|
|
|
|
|
ld r0, 40(r1)
|
|
|
|
mtctr r0
|
|
|
|
ld r10, 104(r1)
|
|
|
|
ld r9, 96(r1)
|
|
|
|
ld r8, 88(r1)
|
|
|
|
ld r7, 80(r1)
|
|
|
|
ld r6, 72(r1)
|
|
|
|
ld r5, 64(r1)
|
|
|
|
ld r4, 56(r1)
|
|
|
|
ld r3, 48(r1)
|
|
|
|
|
|
|
|
/* Restore callee's TOC */
|
|
|
|
ld r2, 24(r1)
|
|
|
|
|
|
|
|
addi r1, r1, 112
|
|
|
|
mflr r0
|
|
|
|
std r0, LRSAVE(r1)
|
|
|
|
bctr
|
|
|
|
#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
|