Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2722184ybb; Mon, 30 Mar 2020 11:35:28 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtU+UNnbGvymRXBlgS6PdryNDcbThujz4jmpai/5uBr+nm6APVEC9Aqwapg0dYeteHOZVF/ X-Received: by 2002:a4a:c595:: with SMTP id x21mr381623oop.10.1585593327884; Mon, 30 Mar 2020 11:35:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585593327; cv=none; d=google.com; s=arc-20160816; b=t4WJBlsiUGx+b4rho7Hw+NQQCW3oFuxwC7aMko0Sr+BTakuputb9j1zp53iWh8D7cz 61DNck2dfXF9T8VZkkT9N9+LwlPFTTBxU85Vb/UOGUSKySTUYhU+dD5e6/+dVpvp8IV9 ZKGEMXU89VFNvWVgM3c17PV3nmoBDKVggv6gJwdzFPDUEbY4g0p/NhplJDIfOu7xZwIF g1V6QHVH0gz5vLtnauOnoiKpWgnedGOVQ8VlYK+aO0f7OmyTdI9voK2pXKFed0Agpiu+ eocbF0Bv4jcQV2P5bI7P4fQTGwXRugfHNOTytWsE38AiVWHH3mVIiCG5l0IsTsZGiPkU peWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=p/fsCCqG7iIhErLf5xM3keyQ9j6k/RnOLFOsR/4oxiA=; b=MDA4y6zSiWfgL6lot0RNrdByoYkL19cwGsY0UGYsmihRCfVVKzpneoSxKto6Xu9MI4 mPm7cbh/+z+ZlD1lP3Q/lodErDd/zy1xQvRdxZd1eC3FwWBCTX7hUqXAzGfnKCLng6Cj umJaRk35fcl0CxU9fZECU6VjMi0K2Cfomi4UT8Y3N39KWlTyo6iiuFGfeCslAmJve2/Q bqzlqV5JlAMVtqVLzWZ5vfFB3IWAh9ad1cMsZ/AjyGyrybYIpj8+tyUHbMwUMdWJrw8O Ky8m2uKVseBmdfJbbl+7+W9yqDNgLxHghk8xeWPttA2Hab7s3sG5Gv5BLdnpJh1OAqGM SQsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b="RdG5v0/s"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z6si5779748oia.219.2020.03.30.11.35.14; Mon, 30 Mar 2020 11:35:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b="RdG5v0/s"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726923AbgC3Sd2 (ORCPT + 99 others); Mon, 30 Mar 2020 14:33:28 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:36016 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726017AbgC3Sd2 (ORCPT ); Mon, 30 Mar 2020 14:33:28 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 48rh1230Vbz9txdm; Mon, 30 Mar 2020 20:33:26 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=RdG5v0/s; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id dA0SUK2JebX6; Mon, 30 Mar 2020 20:33:26 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 48rh121rcmz9txdd; Mon, 30 Mar 2020 20:33:26 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1585593206; bh=p/fsCCqG7iIhErLf5xM3keyQ9j6k/RnOLFOsR/4oxiA=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=RdG5v0/szcbRZ7zTK6iqF67otAOH4rWaxZahhvfVhQrbNNQK5JgV14pI/wVw7+9S5 8ZwxqQSC1SAJqX7xViS3s8uG3uyk5tvWV+AmeXmjWBUFsSTPGBPHwhcU5JMoLzx/hG kbyrH/QFzh7F3U5TA7/YOvqQ37eedFebvj80AgyE= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id B54A58B784; Mon, 30 Mar 2020 20:33:24 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id dlPdieNjt6RN; Mon, 30 Mar 2020 20:33:24 +0200 (CEST) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 495AE8B752; Mon, 30 Mar 2020 20:33:22 +0200 (CEST) Subject: Re: [PATCH 10/12] powerpc/entry32: Blacklist exception entry points for kprobe. To: "Naveen N. Rao" , Benjamin Herrenschmidt , Michael Ellerman , Paul Mackerras Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org References: <1585588031.jvow7mwq4x.naveen@linux.ibm.com> From: Christophe Leroy Message-ID: <7f367f35-1bb8-bbb6-f399-8e911f76e043@c-s.fr> Date: Mon, 30 Mar 2020 20:33:23 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <1585588031.jvow7mwq4x.naveen@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 30/03/2020 à 19:08, Naveen N. Rao a écrit : > Christophe Leroy wrote: >> kprobe does not handle events happening in real mode. >> >> As exception entry points are running with MMU disabled, >> blacklist them. >> >> Signed-off-by: Christophe Leroy >> --- >>  arch/powerpc/kernel/entry_32.S | 7 +++++++ >>  1 file changed, 7 insertions(+) >> >> diff --git a/arch/powerpc/kernel/entry_32.S >> b/arch/powerpc/kernel/entry_32.S >> index 94f78c03cb79..9a1a45d6038a 100644 >> --- a/arch/powerpc/kernel/entry_32.S >> +++ b/arch/powerpc/kernel/entry_32.S >> @@ -51,6 +51,7 @@ mcheck_transfer_to_handler: >>      mfspr    r0,SPRN_DSRR1 >>      stw    r0,_DSRR1(r11) >>      /* fall through */ >> +_ASM_NOKPROBE_SYMBOL(mcheck_transfer_to_handler) >> >>      .globl    debug_transfer_to_handler >>  debug_transfer_to_handler: >> @@ -59,6 +60,7 @@ debug_transfer_to_handler: >>      mfspr    r0,SPRN_CSRR1 >>      stw    r0,_CSRR1(r11) >>      /* fall through */ >> +_ASM_NOKPROBE_SYMBOL(debug_transfer_to_handler) >> >>      .globl    crit_transfer_to_handler >>  crit_transfer_to_handler: >> @@ -94,6 +96,7 @@ crit_transfer_to_handler: >>      rlwinm    r0,r1,0,0,(31 - THREAD_SHIFT) >>      stw    r0,KSP_LIMIT(r8) >>      /* fall through */ >> +_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) >>  #endif >> >>  #ifdef CONFIG_40x >> @@ -115,6 +118,7 @@ crit_transfer_to_handler: >>      rlwinm    r0,r1,0,0,(31 - THREAD_SHIFT) >>      stw    r0,KSP_LIMIT(r8) >>      /* fall through */ >> +_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) >>  #endif >> >>  /* >> @@ -127,6 +131,7 @@ crit_transfer_to_handler: >>      .globl    transfer_to_handler_full >>  transfer_to_handler_full: >>      SAVE_NVGPRS(r11) >> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler_full) >>      /* fall through */ >> >>      .globl    transfer_to_handler >> @@ -286,6 +291,8 @@ reenable_mmu: >>      lwz    r2, GPR2(r11) >>      b    fast_exception_return >>  #endif >> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler) >> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler_cont) > > These are added after 'reenable_mmu', which is itself not blacklisted. > Is that intentional? Yes I put it as the complete end of the entry part, ie just before stack_ovf which is a function by itself. Note that reenable_mmu is inside an #ifdef CONFIG_TRACE_IRQFLAGS. I'm not completely sure where to put the _ASM_NOKPROBE_SYMBOL()s, that's the reason why I put it close to the symbol itself in my first series. Could you have a look at the code and tell me what looks the most appropriate as a location to you ? https://elixir.bootlin.com/linux/v5.6/source/arch/powerpc/kernel/entry_32.S#L230 Thanks Christophe