Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp784838ybe; Wed, 4 Sep 2019 07:44:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqwch440NLzpqHk2QxeC8YG/G1LkQEg70fZDhcdt1pj8s5BfLQ1j7Zk5WKLCP0U/4ttWsIDP X-Received: by 2002:a62:1747:: with SMTP id 68mr22008477pfx.63.1567608245954; Wed, 04 Sep 2019 07:44:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567608245; cv=none; d=google.com; s=arc-20160816; b=xXe0dFaZ1qWYB/SiaXux6Ps3Nh+4HjSG1EEB68+vscZUCK546OD+89wopV+RIlX5Uk MK1NGfusBkRFQwDDl7baaRg0FgIo+rNTALl+4k1Txl2L5ZSKQV/6Htr+GEzDFdB5WQxm Crl5x4uE3gYc5KEA/iUmBZ8P/GZc6KMAf1tjXR69SJQ3xJXyUAjr96slSKZFAQBc6NVf N4fmR41R0sQl5HBZcbfZ+tSQJ5fJXQHVFiOlH+43Tbo0jJZEQIP6b5p1M5nbcgSGpdRF 9Cu1SkiXWpCuI59Na/c5U9KkmMtuZPZkDnCFE+Rr9AMdYBaldJU0pXxR481/+ytlxL7L 2Ndw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :user-agent:mime-version:in-reply-to:references:cc:to:subject:from :date; bh=7IiLd9qCSw6NWskTfgjIrFo1wtcnfowNKZUFAdV87PI=; b=mdezTcgRoB+w2ljby1fgbEVoFwd3TesPbOYhp9YGjq8YWEZZvyoy+eSvkqGY2SZdzX OIVIrE4nMdUx5xH6ogMhqGz0n4UzvsyxcBYY7dVkYg0AkdvuDJGzrrwEpIPCMMdgSQwN 451ZiXxJGnbGYEQW44TC4E5FoemG4xzSQu81hzJwDpf3XtMAyNsAQ00ndtVRhS+12YKD 07YoR5e06ZwJRNqt6iUTQqtEJ/LPhb+OdqFY4fsN+DIsmqB8FKK0C8pSpZJK5RXjvaEo KXf6fKUngmNtW/h00Ww2Lq7t3Eo7rki6xsR3GZx/Obrc0Ary/XDM8ILkRxWWMT8lZrCS +RWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x16si10419796pff.124.2019.09.04.07.43.50; Wed, 04 Sep 2019 07:44:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730544AbfIDOmo convert rfc822-to-8bit (ORCPT + 99 others); Wed, 4 Sep 2019 10:42:44 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:31988 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729398AbfIDOmn (ORCPT ); Wed, 4 Sep 2019 10:42:43 -0400 Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x84ETspl088262 for ; Wed, 4 Sep 2019 10:42:42 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0b-001b2d01.pphosted.com with ESMTP id 2utdes4xu5-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 04 Sep 2019 10:42:41 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 4 Sep 2019 15:42:40 +0100 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 4 Sep 2019 15:42:37 +0100 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x84Ega2d43647078 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 4 Sep 2019 14:42:36 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A214EAE055; Wed, 4 Sep 2019 14:42:36 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 349A4AE045; Wed, 4 Sep 2019 14:42:36 +0000 (GMT) Received: from localhost (unknown [9.199.56.52]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 4 Sep 2019 14:42:36 +0000 (GMT) Date: Wed, 04 Sep 2019 20:12:34 +0530 From: "Naveen N. Rao" Subject: Re: [PATCH v3 2/3] Powerpc64/Watchpoint: Don't ignore extraneous exceptions To: mikey@neuling.org, mpe@ellerman.id.au, Ravi Bangoria Cc: benh@kernel.crashing.org, christophe.leroy@c-s.fr, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, npiggin@gmail.com, paulus@samba.org References: <20190710045445.31037-1-ravi.bangoria@linux.ibm.com> <20190710045445.31037-3-ravi.bangoria@linux.ibm.com> In-Reply-To: <20190710045445.31037-3-ravi.bangoria@linux.ibm.com> MIME-Version: 1.0 User-Agent: astroid/0.15.0 (https://github.com/astroidmail/astroid) Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8BIT X-TM-AS-GCONF: 00 x-cbid: 19090414-0028-0000-0000-00000397A571 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19090414-0029-0000-0000-00002459F765 Message-Id: <1567608022.j44gajn34z.naveen@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-09-04_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=921 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1909040143 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Ravi Bangoria wrote: > On Powerpc64, watchpoint match range is double-word granular. On > a watchpoint hit, DAR is set to the first byte of overlap between > actual access and watched range. And thus it's quite possible that > DAR does not point inside user specified range. Ex, say user creates > a watchpoint with address range 0x1004 to 0x1007. So hw would be > configured to watch from 0x1000 to 0x1007. If there is a 4 byte > access from 0x1002 to 0x1005, DAR will point to 0x1002 and thus > interrupt handler considers it as extraneous, but it's actually not, > because part of the access belongs to what user has asked. So, let > kernel pass it on to user and let user decide what to do with it > instead of silently ignoring it. The drawback is, it can generate > false positive events. I think you should do the additional validation here, instead of generating false positives. You should be able to read the instruction, run it through analyse_instr(), and then use OP_IS_LOAD_STORE() and GETSIZE() to understand the access range. This can be used to then perform a better match against what the user asked for. - Naveen