Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3165272ybb; Mon, 30 Mar 2020 22:53:47 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsqnsmOI4rb28fjCu8v9HRc3Gjs6p8Yo7zQtuupKbyK4E1PM/uDafzcHWBOmDy9u1noVS6i X-Received: by 2002:aca:cd0e:: with SMTP id d14mr943122oig.167.1585634027273; Mon, 30 Mar 2020 22:53:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585634027; cv=none; d=google.com; s=arc-20160816; b=Nkc01bl1Gu8xmDgLuseVnKil97UBjbbQMMIT8CdiUVqyrIzDBTpgBfwZP0r+rvtb7j B9CWsvGJxmPP1iBKV1K7Wf5MDi+1FflTpWPPrrUwKRIL79dhQOidwNKg6v3uyx8X6ELm QDiZPCBfQlDUpoJA1twI9OWwGudXBdJGDKBJ3LMIDTjiVOt/uZdA5AX8bGVs+nBwfnj3 vpAmwz4r3AET5wpk63MSrGIo1R5OeXdvw2qTUHODEc1UhRK3vgOOVnszHzQLVQSE3lBe YDpGl8AHKv5pjeHqwLTgppFw8vnwpXpSK90RiR9a6h3fUMjdLPHlTCg88CE8h4T1m0fg SJTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject:dkim-signature; bh=RsRX+upq0Vb9aewDshmpMZdg8IpeKPQ6FcruDeS840k=; b=w4sdEv3hjLqNQ4yT0tR3AEnj8LqbmdAOjcYjkzJxy9rjGe5BDhnhZYchztMYkig6F6 pLjbujb+CPBhDDCnfbGidD8yD8af1yTw0LLzcrOEr0gb8P7coEMEbmqSPLjLxNwwoBol 3oHzrOCFvRPHLGXOZjTz5Xg3DHBt6feoCifu2vRF/CDvCxnSUarwNeTNAV4fTfNedEZ4 1n6hUn3LUOB34qpLPmsiGHwX7H4vbekP0OnpgpyozXvx4287mGFMms160c3h++3m7yg5 wbIKqPIXD8s5I92Cf9zpNMQN5t1dPrrhpXxbrrQNtMQDKnmLkbgdX4/+gbqupOMSpkWj hOSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=pw6Tei71; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z78si6710311oia.200.2020.03.30.22.53.29; Mon, 30 Mar 2020 22:53:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=pw6Tei71; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726393AbgCaFvn (ORCPT + 99 others); Tue, 31 Mar 2020 01:51:43 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:23237 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726174AbgCaFvm (ORCPT ); Tue, 31 Mar 2020 01:51:42 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 48rz3Z0nKKz9tyc3; Tue, 31 Mar 2020 07:51:38 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=pw6Tei71; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id FEURwzAM9jo2; Tue, 31 Mar 2020 07:51:38 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 48rz3Y6lK0z9tyc2; Tue, 31 Mar 2020 07:51:37 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1585633897; bh=RsRX+upq0Vb9aewDshmpMZdg8IpeKPQ6FcruDeS840k=; h=Subject:From:To:Cc:References:Date:In-Reply-To:From; b=pw6Tei71C52k7Csq5GKjEuJUVEVB9UfIkmnCsCGGMqvTRun37zKA53oFdjFnDbBSD KAA0669a6/2pSmT5QwTU5SdH0QQIgRmIFn1RXDj0+BvOeJ1OPvonlBsyPLO2wBMZzE ZKzuREvPl9iRyEYndqEyhv7ZaCzuhKoS8XvJb4WQ= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id B3BFD8B752; Tue, 31 Mar 2020 07:51:38 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id VvqqrzDCY0N4; Tue, 31 Mar 2020 07:51:38 +0200 (CEST) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id A30C38B784; Tue, 31 Mar 2020 07:51:35 +0200 (CEST) Subject: Re: [PATCH 10/12] powerpc/entry32: Blacklist exception entry points for kprobe. From: Christophe Leroy To: "Naveen N. Rao" , Benjamin Herrenschmidt , Michael Ellerman , Paul Mackerras Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: <1585588031.jvow7mwq4x.naveen@linux.ibm.com> <7f367f35-1bb8-bbb6-f399-8e911f76e043@c-s.fr> Message-ID: <83053ddf-9ba6-d551-6711-890c3f3810b5@c-s.fr> Date: Tue, 31 Mar 2020 07:51:35 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <7f367f35-1bb8-bbb6-f399-8e911f76e043@c-s.fr> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 30/03/2020 à 20:33, Christophe Leroy a écrit : > > > Le 30/03/2020 à 19:08, Naveen N. Rao a écrit : >> Christophe Leroy wrote: >>> kprobe does not handle events happening in real mode. >>> >>> As exception entry points are running with MMU disabled, >>> blacklist them. >>> >>> Signed-off-by: Christophe Leroy >>> --- >>>  arch/powerpc/kernel/entry_32.S | 7 +++++++ >>>  1 file changed, 7 insertions(+) >>> >>> diff --git a/arch/powerpc/kernel/entry_32.S >>> b/arch/powerpc/kernel/entry_32.S >>> index 94f78c03cb79..9a1a45d6038a 100644 >>> --- a/arch/powerpc/kernel/entry_32.S >>> +++ b/arch/powerpc/kernel/entry_32.S >>> @@ -51,6 +51,7 @@ mcheck_transfer_to_handler: >>>      mfspr    r0,SPRN_DSRR1 >>>      stw    r0,_DSRR1(r11) >>>      /* fall through */ >>> +_ASM_NOKPROBE_SYMBOL(mcheck_transfer_to_handler) >>> >>>      .globl    debug_transfer_to_handler >>>  debug_transfer_to_handler: >>> @@ -59,6 +60,7 @@ debug_transfer_to_handler: >>>      mfspr    r0,SPRN_CSRR1 >>>      stw    r0,_CSRR1(r11) >>>      /* fall through */ >>> +_ASM_NOKPROBE_SYMBOL(debug_transfer_to_handler) >>> >>>      .globl    crit_transfer_to_handler >>>  crit_transfer_to_handler: >>> @@ -94,6 +96,7 @@ crit_transfer_to_handler: >>>      rlwinm    r0,r1,0,0,(31 - THREAD_SHIFT) >>>      stw    r0,KSP_LIMIT(r8) >>>      /* fall through */ >>> +_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) >>>  #endif >>> >>>  #ifdef CONFIG_40x >>> @@ -115,6 +118,7 @@ crit_transfer_to_handler: >>>      rlwinm    r0,r1,0,0,(31 - THREAD_SHIFT) >>>      stw    r0,KSP_LIMIT(r8) >>>      /* fall through */ >>> +_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) >>>  #endif >>> >>>  /* >>> @@ -127,6 +131,7 @@ crit_transfer_to_handler: >>>      .globl    transfer_to_handler_full >>>  transfer_to_handler_full: >>>      SAVE_NVGPRS(r11) >>> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler_full) >>>      /* fall through */ >>> >>>      .globl    transfer_to_handler >>> @@ -286,6 +291,8 @@ reenable_mmu: >>>      lwz    r2, GPR2(r11) >>>      b    fast_exception_return >>>  #endif >>> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler) >>> +_ASM_NOKPROBE_SYMBOL(transfer_to_handler_cont) >> >> These are added after 'reenable_mmu', which is itself not blacklisted. >> Is that intentional? > > Yes I put it as the complete end of the entry part, ie just before > stack_ovf which is a function by itself. > > Note that reenable_mmu is inside an #ifdef CONFIG_TRACE_IRQFLAGS. > > I'm not completely sure where to put the _ASM_NOKPROBE_SYMBOL()s, that's > the reason why I put it close to the symbol itself in my first series. > > Could you have a look at the code and tell me what looks the most > appropriate as a location to you ? > > https://elixir.bootlin.com/linux/v5.6/source/arch/powerpc/kernel/entry_32.S#L230 Ok, thinking about it once more, I guess we have a problem as everything after that reenable_mmu will be visible. So I'll respin Christophe