Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5289032ybv; Mon, 17 Feb 2020 16:44:50 -0800 (PST) X-Google-Smtp-Source: APXvYqxr8bsyd9WDPfWihdyo/zhb8z3vmW67sSwcSmE0WCD+lFneFd5zePX8XS1xwAserexRXuCp X-Received: by 2002:aca:c7ca:: with SMTP id x193mr1081953oif.70.1581986690350; Mon, 17 Feb 2020 16:44:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581986690; cv=none; d=google.com; s=arc-20160816; b=JipVB7Jk99ysbl6iwGEDWqNVMlJ30RrAEIJng49/vKHyNn/8YebuA3gxN86QFFpHFw 9ZMA3Az7pZwZCNATnptQ9kpRQf4eHXmIbiwhESQDs4ufmZloaF7Y1b93gEzB0Z6r0HUs Vnzfuxy5X8qh7Dh/sc8X4f29h9O9IkDcOvpcTHf10la9rECMUETDMyuflY8ohg18rylu QfBdrzmK3ipInctqULSCN/S8f1PJNEvgQafmuTABsqyljthXHRWvOmNM8Oca/S2TiFxq HRmZ8ItqEK0kDJkFSIs/VD667vrM67z+gg24A6DSp0CEo44+Qzh17fC+Ke+dUEU4hBeK A+pA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=YKy8LaUqmZBdJ+iFyBmwHXAEACFGTZuAHjLRUVkGIBY=; b=xb4EccHSRKL1YMYG2Av3xKiIhG6EuOE16yM/oqSfY1DonqipNrk0ywgz6a17Sfv3PP 1T/CLKUEFA4b+vFvgIZU1BjrQ3av/+mddz4IFyxxISPn1YwwdcCe76QEqbJ4D0Omb1HQ BDzD3duO+CCw80R3jVpgilZgHuwlT+J3wR5hVMzYDGrN2d2aH/zoPWHNFEb9eLdlYcJY 3EKD+M2Ghe99ZXpm5KuRmiyXmIncv0LMGvy+aJwmoCFoOtqvHlucd9HooXmcP99tQ/M0 sD45ocVlxlGTOGM+1qjIMpLODiqq/bdACUdppKG+o0HlglU7qw28hzSSuFRtPAAaP2zO tUUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1zuBOlja; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c20si6705354oic.113.2020.02.17.16.44.37; Mon, 17 Feb 2020 16:44:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1zuBOlja; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726212AbgBRAo2 (ORCPT + 99 others); Mon, 17 Feb 2020 19:44:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:35312 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726047AbgBRAo2 (ORCPT ); Mon, 17 Feb 2020 19:44:28 -0500 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 50BF520718; Tue, 18 Feb 2020 00:44:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581986666; bh=GlF7tsNGHn7ate9mU1/VWHoZi1IO50fGecOk1KZoByA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=1zuBOljaPmfo1ySuLtV3H4a7rdz65oBuqOnGS/aZED5i0lMSv8XDNvYvI58o7a9Ez jrvE6ApzevgE0DFQ17roXJZ55/Ywf89FVmEJSSThI6pPbPxIC71W7MCRQhhrIMDbw8 1Nfg+Fpx1BRNN39bZskt6JHvYcqn+ws123oWgZVI= Date: Tue, 18 Feb 2020 09:44:21 +0900 From: Masami Hiramatsu To: Christophe Leroy Cc: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Larry Finger , "Naveen N. Rao" , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, stable@kernel.vger.org, Anil S Keshavamurthy , "David S. Miller" Subject: Re: [PATCH] powerpc/kprobes: Fix trap address when trap happened in real mode Message-Id: <20200218094421.6d402de389ce23a55a3ec084@kernel.org> In-Reply-To: References: <20200214225434.464ec467ad9094961abb8ddc@kernel.org> <20200216213411.824295a321d8fa979dedbbbe@kernel.org> <20200217192735.5070f0925c4159ccffa4e465@kernel.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 17 Feb 2020 16:38:50 +0100 Christophe Leroy wrote: > > > Le 17/02/2020 à 11:27, Masami Hiramatsu a écrit : > > On Mon, 17 Feb 2020 10:03:22 +0100 > > Christophe Leroy wrote: > > > >> > >> > >> Le 16/02/2020 à 13:34, Masami Hiramatsu a écrit : > >>> On Sat, 15 Feb 2020 11:28:49 +0100 > >>> Christophe Leroy wrote: > >>> > >>>> Hi, > >>>> > >>>> Le 14/02/2020 à 14:54, Masami Hiramatsu a écrit : > >>>>> Hi, > >>>>> > >>>>> On Fri, 14 Feb 2020 12:47:49 +0000 (UTC) > >>>>> Christophe Leroy wrote: > >>>>> > >>>>>> When a program check exception happens while MMU translation is > >>>>>> disabled, following Oops happens in kprobe_handler() in the following > >>>>>> test: > >>>>>> > >>>>>> } else if (*addr != BREAKPOINT_INSTRUCTION) { > >>>>> > >>>>> Thanks for the report and patch. I'm not so sure about powerpc implementation > >>>>> but at where the MMU translation is disabled, can the handler work correctly? > >>>>> (And where did you put the probe on?) > >>>>> > >>>>> Your fix may fix this Oops, but if the handler needs special care, it is an > >>>>> option to blacklist such place (if possible). > >>>> > >>>> I guess that's another story. Here we are not talking about a place > >>>> where kprobe has been illegitimately activated, but a place where there > >>>> is a valid trap, which generated a valid 'program check exception'. And > >>>> kprobe was off at that time. > >>> > >>> Ah, I got it. It is not a kprobe breakpoint, but to check that correctly, > >>> it has to know the address where the breakpoint happens. OK. > >>> > >>>> > >>>> As any 'program check exception' due to a trap (ie a BUG_ON, a WARN_ON, > >>>> a debugger breakpoint, a perf breakpoint, etc...) calls > >>>> kprobe_handler(), kprobe_handler() must be prepared to handle the case > >>>> where the MMU translation is disabled, even if probes are not supposed > >>>> to be set for functions running with MMU translation disabled. > >>> > >>> Can't we check the MMU is disabled there (as same as checking the exception > >>> happened in user space or not)? > >>> > >> > >> What do you mean by 'there' ? At the entry of kprobe_handler() ? > >> > >> That's what my patch does, it checks whether MMU is disabled or not. If > >> it is, it converts the address to a virtual address. > >> > >> Do you mean kprobe_handler() should bail out early as it does when the > >> trap happens in user mode ? > > > > Yes, that is what I meant. > > > >> Of course we can do that, I don't know > >> enough about kprobe to know if kprobe_handler() should manage events > >> that happened in real-mode or just ignore them. But I tested adding an > >> event on a function that runs in real-mode, and it (now) works. > >> > >> So, what should we do really ? > > > > I'm not sure how the powerpc kernel runs in real mode. > > But clearly, at least kprobe event can not handle that case because > > it tries to access memory by probe_kernel_read(). Unless that function > > correctly handles the address translation, I want to prohibit kprobes > > on such address. > > > > So what I would like to see is, something like below. > > > > diff --git a/arch/powerpc/kernel/kprobes.c b/arch/powerpc/kernel/kprobes.c > > index 2d27ec4feee4..4771be152416 100644 > > --- a/arch/powerpc/kernel/kprobes.c > > +++ b/arch/powerpc/kernel/kprobes.c > > @@ -261,7 +261,7 @@ int kprobe_handler(struct pt_regs *regs) > > unsigned int *addr = (unsigned int *)regs->nip; > > struct kprobe_ctlblk *kcb; > > > > - if (user_mode(regs)) > > + if (user_mode(regs) || !(regs->msr & MSR_IR)) > > return 0; > > > > /* > > > > > > With this instead change of my patch, I get an Oops everytime a kprobe > event occurs in real-mode. > > This is because kprobe_handler() is now saying 'this trap doesn't belong > to me' for a trap that has been installed by it. Hmm, on powerpc, kprobes is allowed to probe on the code which runs in the real mode? I think we should also prohibit it by blacklisting. (It is easy to add blacklist by NOKPROBE_SYMBOL(func)) Or, some parts are possble to run under both real mode and kernel mode? > > So the 'program check' exception handler doesn't find the owner of the > trap hence generate an Oops. > > Even if we don't want kprobe() to proceed with the event entirely > (allthough it works at least for simple events), I'd expect it to fail > gracefully. Agreed. I thought it was easy to identify real mode code. But if it is hard, we should apply your first patch and also skip user handlers if we are in the real mode (and increment missed count). BTW, can the emulater handle the real mode code correctly? Thank you, -- Masami Hiramatsu