Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp4544258ybv; Mon, 17 Feb 2020 01:04:33 -0800 (PST) X-Google-Smtp-Source: APXvYqwktvrRFEMrg9LqYYXqYJHHISPaBwikQqZfRcQq1O1CmEp7efGFOtByMzkkFq2+1y/jqAT6 X-Received: by 2002:a05:6808:10b:: with SMTP id b11mr9501221oie.110.1581930273159; Mon, 17 Feb 2020 01:04:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581930273; cv=none; d=google.com; s=arc-20160816; b=osiTouLNVVKFRpKTofu2goR3dkBJk3Y1GWf5j7q6ryzw7sUvBqTWnX65AkYqo7T2hJ AujYsiKNnWPftXpNk9LXhZnEat19cE44oAFecLA5FhRdQ55Z/1na1tcRPsf3l0Wk+SWg bFr6YSYIKVe6uzzJqUJwX/4amzpRKBVCLqfBuPfdRR3TPpZoIQYImmLIXHZoeYecPgAc OQJ6u6sBR9FC9zY8ysDjN567buPqRNLVTUgY4/ffoTLm/GgklXbdjSOND7xdHqfzCfY4 tyvVjb+NUR5eEKiA7eBd1uwZ9LsHPauRTW4c2e7fZ65n3xbjasabJLokhmJu4cAkK4vt 8Dqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=KojM6T89T5lJkXgtiN49huPDHZvGUWiBtyDFVCX7aps=; b=xIviJDksP5BoUl1TSzLakLlO5o4PjrzyoIS+ArukJa8NuazZ7eo68KVfILHUBerbZd JZ680PYSpOpP6TJ28y/upxBs+FN70fnr8UEEAQTU3E7z3AGOnOwftnTvADNdMizWy756 4g17Ejqgy6mCwXiP64Qk2O4mncXM9s0jxzhlWUoOdc5UPKuNgywJqKT7YApHkiAcRUcR 3w7JyDgH06xeipkn9EtruSrTiGw52O+oJ7wYuRVjmlA/T4prPylzSXzRU2WglfWEfcOn bQE4InAeV2gokbfnvixOpl8D5m9VRENerP1B6nEQML2mzMCnVetpBDfmFWNhoDUAcH5t +Kjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=WQfZxMMR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1si6410272otk.154.2020.02.17.01.04.21; Mon, 17 Feb 2020 01:04:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=WQfZxMMR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728678AbgBQJDZ (ORCPT + 99 others); Mon, 17 Feb 2020 04:03:25 -0500 Received: from pegase1.c-s.fr ([93.17.236.30]:19320 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728640AbgBQJDZ (ORCPT ); Mon, 17 Feb 2020 04:03:25 -0500 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 48LdLZ49gmz9v1WW; Mon, 17 Feb 2020 10:03:18 +0100 (CET) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=WQfZxMMR; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id TNmFgMAQgiDf; Mon, 17 Feb 2020 10:03:18 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 48LdLZ2cPzz9v1WS; Mon, 17 Feb 2020 10:03:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1581930198; bh=KojM6T89T5lJkXgtiN49huPDHZvGUWiBtyDFVCX7aps=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=WQfZxMMRFnD2XeNPwW0+oQfyZsVQ6sbwSLbc+cS7LvoRLNf/6QXg8SaXm3jB5A5Wd POqn73bE6R8/F4vjlM1awcMRWfyOmPm0ybgRDSH5P7MHop3AwzgfJYuH2uE7Oeb4s1 vK6pGuTLBMdBN1Y3uEcCGe2HgK3BpCoGq/x7+2WA= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id CB7B18B755; Mon, 17 Feb 2020 10:03:22 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id YNxAztCy48Gr; Mon, 17 Feb 2020 10:03:22 +0100 (CET) Received: from [172.25.230.102] (po15451.idsi0.si.c-s.fr [172.25.230.102]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 882EC8B7A6; Mon, 17 Feb 2020 10:03:22 +0100 (CET) Subject: Re: [PATCH] powerpc/kprobes: Fix trap address when trap happened in real mode To: Masami Hiramatsu Cc: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Larry Finger , "Naveen N. Rao" , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, stable@kernel.vger.org, Anil S Keshavamurthy , "David S. Miller" References: <20200214225434.464ec467ad9094961abb8ddc@kernel.org> <20200216213411.824295a321d8fa979dedbbbe@kernel.org> From: Christophe Leroy Message-ID: Date: Mon, 17 Feb 2020 10:03:22 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200216213411.824295a321d8fa979dedbbbe@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 16/02/2020 à 13:34, Masami Hiramatsu a écrit : > On Sat, 15 Feb 2020 11:28:49 +0100 > Christophe Leroy wrote: > >> Hi, >> >> Le 14/02/2020 à 14:54, Masami Hiramatsu a écrit : >>> Hi, >>> >>> On Fri, 14 Feb 2020 12:47:49 +0000 (UTC) >>> Christophe Leroy wrote: >>> >>>> When a program check exception happens while MMU translation is >>>> disabled, following Oops happens in kprobe_handler() in the following >>>> test: >>>> >>>> } else if (*addr != BREAKPOINT_INSTRUCTION) { >>> >>> Thanks for the report and patch. I'm not so sure about powerpc implementation >>> but at where the MMU translation is disabled, can the handler work correctly? >>> (And where did you put the probe on?) >>> >>> Your fix may fix this Oops, but if the handler needs special care, it is an >>> option to blacklist such place (if possible). >> >> I guess that's another story. Here we are not talking about a place >> where kprobe has been illegitimately activated, but a place where there >> is a valid trap, which generated a valid 'program check exception'. And >> kprobe was off at that time. > > Ah, I got it. It is not a kprobe breakpoint, but to check that correctly, > it has to know the address where the breakpoint happens. OK. > >> >> As any 'program check exception' due to a trap (ie a BUG_ON, a WARN_ON, >> a debugger breakpoint, a perf breakpoint, etc...) calls >> kprobe_handler(), kprobe_handler() must be prepared to handle the case >> where the MMU translation is disabled, even if probes are not supposed >> to be set for functions running with MMU translation disabled. > > Can't we check the MMU is disabled there (as same as checking the exception > happened in user space or not)? > What do you mean by 'there' ? At the entry of kprobe_handler() ? That's what my patch does, it checks whether MMU is disabled or not. If it is, it converts the address to a virtual address. Do you mean kprobe_handler() should bail out early as it does when the trap happens in user mode ? Of course we can do that, I don't know enough about kprobe to know if kprobe_handler() should manage events that happened in real-mode or just ignore them. But I tested adding an event on a function that runs in real-mode, and it (now) works. So, what should we do really ? Christophe