Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp4879085ybv; Mon, 17 Feb 2020 07:40:02 -0800 (PST) X-Google-Smtp-Source: APXvYqyK+Q+mSwXTI+RN551TUGqf2lacAPhdyfWfqQ/PiWtCt5nDrqelgo7fiDpOI2X/kRWzlT7a X-Received: by 2002:a05:6830:1257:: with SMTP id s23mr12637808otp.241.1581954002080; Mon, 17 Feb 2020 07:40:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581954002; cv=none; d=google.com; s=arc-20160816; b=bgn/nV0oIoq8KmxnwP8Atp657D440F3RFJpGFiJUpiVuuRlhb+9GwdmmeqncvqK+LE fJmcGSi6aA5HVuxmbnt2mWpav31FdlmJh0d9r14RQbGmBgGhLaEND5CxhF6GyyNNZclG lrAuI0Yfh0UJasZKJ/jSuCCVwI77NdCSJBzp4/cKf25f9wypyyVQ7AW/vorhjVBPNads JgVB7+1nDEMXJa8wtfxuG3SV79S6fvFF0KG0yIZJIOoWw7mYjTNZgybKeV88kIefrRu6 mhPmLmao8KGmVUBGd3r44GlG8x4JGi8vnsEczg7/0HtPdx+9VNDj0F9l2/XRBMvi+aFv mUWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=fXPx9ihsgHYOvdrH2+HzdVzYQ7es1nv+E3dhpN0NoUM=; b=QkIY11gpgEdeS7ql//jtLWJy26hy6bFlx0v0Du3WuNJZsqVQDPhmM7l7qUq4LdL1V7 78yPlutv839HjGLPITXG6+IBiWL6lBZu812tJzg+v3V76765VmmmZpXu9RY0OHnsD27l iOQ+Fe4ZPQRYCrZCkkfVUdbuwPU6PpGsHINRO1/VJLSZbYTKqisohQZXe3fz/pSQI2H8 HoyW4DDlkdKhwRp7Qdftwl6FR5pcbHmk58OzEXlYYERRUSrwX07jZhdcxXW8r38gwIr4 hAy/BKL1wNw+06kIpH3UigGr58FV9HNVKRSBkQovm16z1/HlNt1HxLZM1uNCedMfoAWL LK/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=IEK1LKWB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l26si352900oti.152.2020.02.17.07.39.50; Mon, 17 Feb 2020 07:40:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=IEK1LKWB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728889AbgBQPiy (ORCPT + 99 others); Mon, 17 Feb 2020 10:38:54 -0500 Received: from pegase1.c-s.fr ([93.17.236.30]:9430 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728696AbgBQPix (ORCPT ); Mon, 17 Feb 2020 10:38:53 -0500 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 48Lp6t4sDYz9ty3C; Mon, 17 Feb 2020 16:38:46 +0100 (CET) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=IEK1LKWB; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id zgOtZq0YlKoY; Mon, 17 Feb 2020 16:38:46 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 48Lp6t2ttbz9ty33; Mon, 17 Feb 2020 16:38:46 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1581953926; bh=fXPx9ihsgHYOvdrH2+HzdVzYQ7es1nv+E3dhpN0NoUM=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=IEK1LKWBWKmD9HJcmrzjQHvDev7aKGXkHeGs1V1/Zx+cNaLAQOVPL24E5keLiQODp m4DVyNaNxv0L53bitnVmIcz4qoRbxjT1n2oWwngbTmPi5hrPJB15C0vkOYaZUB5yU6 20FyLjOl+elHaklo96p9rUKKk9f6+C7bDlKEn6ag= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 50B5D8B7E4; Mon, 17 Feb 2020 16:38:51 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id IJi7jv_flxWj; Mon, 17 Feb 2020 16:38:51 +0100 (CET) Received: from [172.25.230.102] (po15451.idsi0.si.c-s.fr [172.25.230.102]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 1A4B68B7C7; Mon, 17 Feb 2020 16:38:51 +0100 (CET) Subject: Re: [PATCH] powerpc/kprobes: Fix trap address when trap happened in real mode To: Masami Hiramatsu Cc: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Larry Finger , "Naveen N. Rao" , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, stable@kernel.vger.org, Anil S Keshavamurthy , "David S. Miller" References: <20200214225434.464ec467ad9094961abb8ddc@kernel.org> <20200216213411.824295a321d8fa979dedbbbe@kernel.org> <20200217192735.5070f0925c4159ccffa4e465@kernel.org> From: Christophe Leroy Message-ID: Date: Mon, 17 Feb 2020 16:38:50 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200217192735.5070f0925c4159ccffa4e465@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 17/02/2020 à 11:27, Masami Hiramatsu a écrit : > On Mon, 17 Feb 2020 10:03:22 +0100 > Christophe Leroy wrote: > >> >> >> Le 16/02/2020 à 13:34, Masami Hiramatsu a écrit : >>> On Sat, 15 Feb 2020 11:28:49 +0100 >>> Christophe Leroy wrote: >>> >>>> Hi, >>>> >>>> Le 14/02/2020 à 14:54, Masami Hiramatsu a écrit : >>>>> Hi, >>>>> >>>>> On Fri, 14 Feb 2020 12:47:49 +0000 (UTC) >>>>> Christophe Leroy wrote: >>>>> >>>>>> When a program check exception happens while MMU translation is >>>>>> disabled, following Oops happens in kprobe_handler() in the following >>>>>> test: >>>>>> >>>>>> } else if (*addr != BREAKPOINT_INSTRUCTION) { >>>>> >>>>> Thanks for the report and patch. I'm not so sure about powerpc implementation >>>>> but at where the MMU translation is disabled, can the handler work correctly? >>>>> (And where did you put the probe on?) >>>>> >>>>> Your fix may fix this Oops, but if the handler needs special care, it is an >>>>> option to blacklist such place (if possible). >>>> >>>> I guess that's another story. Here we are not talking about a place >>>> where kprobe has been illegitimately activated, but a place where there >>>> is a valid trap, which generated a valid 'program check exception'. And >>>> kprobe was off at that time. >>> >>> Ah, I got it. It is not a kprobe breakpoint, but to check that correctly, >>> it has to know the address where the breakpoint happens. OK. >>> >>>> >>>> As any 'program check exception' due to a trap (ie a BUG_ON, a WARN_ON, >>>> a debugger breakpoint, a perf breakpoint, etc...) calls >>>> kprobe_handler(), kprobe_handler() must be prepared to handle the case >>>> where the MMU translation is disabled, even if probes are not supposed >>>> to be set for functions running with MMU translation disabled. >>> >>> Can't we check the MMU is disabled there (as same as checking the exception >>> happened in user space or not)? >>> >> >> What do you mean by 'there' ? At the entry of kprobe_handler() ? >> >> That's what my patch does, it checks whether MMU is disabled or not. If >> it is, it converts the address to a virtual address. >> >> Do you mean kprobe_handler() should bail out early as it does when the >> trap happens in user mode ? > > Yes, that is what I meant. > >> Of course we can do that, I don't know >> enough about kprobe to know if kprobe_handler() should manage events >> that happened in real-mode or just ignore them. But I tested adding an >> event on a function that runs in real-mode, and it (now) works. >> >> So, what should we do really ? > > I'm not sure how the powerpc kernel runs in real mode. > But clearly, at least kprobe event can not handle that case because > it tries to access memory by probe_kernel_read(). Unless that function > correctly handles the address translation, I want to prohibit kprobes > on such address. > > So what I would like to see is, something like below. > > diff --git a/arch/powerpc/kernel/kprobes.c b/arch/powerpc/kernel/kprobes.c > index 2d27ec4feee4..4771be152416 100644 > --- a/arch/powerpc/kernel/kprobes.c > +++ b/arch/powerpc/kernel/kprobes.c > @@ -261,7 +261,7 @@ int kprobe_handler(struct pt_regs *regs) > unsigned int *addr = (unsigned int *)regs->nip; > struct kprobe_ctlblk *kcb; > > - if (user_mode(regs)) > + if (user_mode(regs) || !(regs->msr & MSR_IR)) > return 0; > > /* > > With this instead change of my patch, I get an Oops everytime a kprobe event occurs in real-mode. This is because kprobe_handler() is now saying 'this trap doesn't belong to me' for a trap that has been installed by it. So the 'program check' exception handler doesn't find the owner of the trap hence generate an Oops. Even if we don't want kprobe() to proceed with the event entirely (allthough it works at least for simple events), I'd expect it to fail gracefully. Christophe