Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932084AbbFAVuE (ORCPT ); Mon, 1 Jun 2015 17:50:04 -0400 Received: from mail9.hitachi.co.jp ([133.145.228.44]:57620 "EHLO mail9.hitachi.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751628AbbFAVt5 (ORCPT ); Mon, 1 Jun 2015 17:49:57 -0400 Message-ID: <556CD37E.9000501@hitachi.com> Date: Tue, 02 Jun 2015 06:49:50 +0900 From: Masami Hiramatsu Organization: Hitachi, Ltd., Japan User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: Andy Lutomirski , Eugene Shatokhin CC: Ingo Molnar , Ingo Molnar , LKML Subject: Re: [PATCH 2/2] kprobes/x86: Use 16 bytes for each instruction slot again References: <1433176331-479-1-git-send-email-eugene.shatokhin@rosalab.ru> <1433176331-479-3-git-send-email-eugene.shatokhin@rosalab.ru> In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2004 Lines: 51 On 2015/06/02 2:04, Andy Lutomirski wrote: > On Mon, Jun 1, 2015 at 9:32 AM, Eugene Shatokhin > wrote: >> Commit 91e5ed49fca0 ("x86/asm/decoder: Fix and enforce max instruction >> size in the insn decoder") has changed MAX_INSN_SIZE from 16 to 15 bytes >> on x86. >> >> As a side effect, the slots Kprobes use to store the instructions became >> 1 byte shorter. This is unfortunate because, for example, the Kprobes' >> "boost" feature can not be used now for the instructions of length 11, >> like a quite common kind of MOV: >> * movq $0xffffffffffffffff,-0x3fe8(%rax) (48 c7 80 18 c0 ff ff ff ff ff ff) >> * movq $0x0,0x88(%rdi) (48 c7 87 88 00 00 00 00 00 00 00) >> and so on. >> >> This patch makes the insn slots 16 bytes long, like they were before while >> keeping MAX_INSN_SIZE intact. >> >> Other tools may benefit from this change as well. > > What is a "slot" and why does this patch make sense? Naively, I'd > expect that the check you're patching is entirely unnecessary -- I > don't see what the size of the instruction being probed has to do with > the safety of executing it out of line and then jumping back. > > Is there another magic 16 somewhere that this is enforcing that we > don't overrun? The kprobe-"booster" adds a jump back code (jmp ) right after the instruction in the out-of-code buffer(slot). So we need at least the insn-length + 5 bytes for the slot, it's the trick of the magic :) Thank you, > > --Andy > -- Masami HIRAMATSU Linux Technology Research Center, System Productivity Research Dept. Center for Technology Innovation - Systems Engineering Hitachi, Ltd., Research & Development Group E-mail: masami.hiramatsu.pt@hitachi.com -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/