Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp1231423pxa; Fri, 28 Aug 2020 07:20:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxorwxPG5inmzXbapT8PrmdlLH/OokiKHHvjp550jUim/WgxpjCnvu57bKzo2K1TvUNx9xC X-Received: by 2002:aa7:c5c4:: with SMTP id h4mr2144077eds.131.1598624433465; Fri, 28 Aug 2020 07:20:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598624433; cv=none; d=google.com; s=arc-20160816; b=x+AyaupF84pVR6jI60o1WJ+yUQFcnbjsZ/6RdVz8vhdiuf9UdlFMJmXbyx8W9PSg2I wyWsHmNOHlgcvjT0j0OA5L2Pyg0boihWqIOufNYpUxtTOOTKbC7jXuaVEtldbI3Na38i +KU2QO7FUK14pTfI2CjlFmKOz3BLRzzWRnjaQM5r/Y40fyhnow3oXz99f6Hw5WeoJxuc sWY7lylQSTlmL5vIRVGG88vP8onwcupTixJshTM80YSxCQ2qCV9m1ZIwL8jRvncT/VeN tLmJZISY6jl+ITtBedpxO6vlej6Ivlv6N7yoxubjx4AzMrY4gZvUEqWEtC4OYauzSfzq sshg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=BQq3bWSSBqEgCXAc5aCyrnpvGNIMpvy4VIBd/gIK0js=; b=vUSMxVi0Anlf+WZGEbia3NlPfSIqmp6IKx9p/TUGWPgXB2tFc1js+7f7JqD6HdjY3W yZJDOx4l51k7r7LPNBMp9V8CMVBpLJerjkpAxj/HNyLQ4z9q9JpUzWclrLDidxp49BEX jQ1Dsxl/1km35s7DmqleNN/h+394ua6zY2rAkq9K2//0ZfP+6SGYCJ4TmlKwsn6wvw5F x/LsSZvFe19njLr7dzMHfspSL8uRujsXP3y6QThVRadqbhHi4PsV5j/+k7nizZLpgbKu uz9U3ff+yBi25Qv8/FsdWRMWfnC6i9+iErRCYKApuGRFyvrDVFkfMJ0qRJuClDe3gqo/ vgFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qtDWadle; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a12si738239ejd.417.2020.08.28.07.20.08; Fri, 28 Aug 2020 07:20:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qtDWadle; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727046AbgH1OT0 (ORCPT + 99 others); Fri, 28 Aug 2020 10:19:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:39898 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725857AbgH1OTY (ORCPT ); Fri, 28 Aug 2020 10:19:24 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2F8C7208C9; Fri, 28 Aug 2020 14:19:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598624364; bh=TdetsC/IwhbsAgTlgvX2TtgjuiEy6W6tBp2ZWqLO+JM=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=qtDWadleCxTR0PpV04LVMcmFE6CLPUIAXMPQ01N15drNu1lbMIvXC65zqFQ4kp6WG Gih9hip23BkPOqD3sY/i9NgFZUnQ4gf7g6v8tnpXSS6aADVP/GRRdhKXlEEGBEWqzg NL6VQLuwsWmPZ96IL+h1DpTYX02OGeYN7drBGqkk= Date: Fri, 28 Aug 2020 23:19:20 +0900 From: Masami Hiramatsu To: peterz@infradead.org Cc: "Eddy_Wu@trendmicro.com" , "linux-kernel@vger.kernel.org" , "x86@kernel.org" , "davem@davemloft.net" , "rostedt@goodmis.org" , "naveen.n.rao@linux.ibm.com" , "anil.s.keshavamurthy@intel.com" , "linux-arch@vger.kernel.org" , "cameron@moodycamel.com" , "oleg@redhat.com" , "will@kernel.org" , "paulmck@kernel.org" Subject: Re: [RFC][PATCH 3/7] kprobes: Remove kretprobe hash Message-Id: <20200828231920.4cb817dd9c624703ecfedc5d@kernel.org> In-Reply-To: <20200828135824.GD1362448@hirez.programming.kicks-ass.net> References: <20200827161237.889877377@infradead.org> <20200827161754.359432340@infradead.org> <7df0a1af432040d9908517661c32dc34@trendmicro.com> <20200828225113.9541a5f67a3bcb17c4ce930c@kernel.org> <20200828135824.GD1362448@hirez.programming.kicks-ass.net> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 28 Aug 2020 15:58:24 +0200 peterz@infradead.org wrote: > On Fri, Aug 28, 2020 at 10:51:13PM +0900, Masami Hiramatsu wrote: > > > OK, schedule function will be the key. I guess the senario is.. > > > > 1) kretporbe replace the return address with kretprobe_trampoline on task1's kernel stack > > 2) the task1 forks task2 before returning to the kretprobe_trampoline > > 3) while copying the process with the kernel stack, task2->kretprobe_instances.first = NULL > > 4) task2 returns to the kretprobe_trampoline > > 5) Bomb! > > > > Hmm, we need to fixup the kernel stack when copying process. > > How would that scenario have been avoided in the old code? Because there > task2 would have a different has and not have found a kretprobe_instance > either. Good question, I think this bug has not been solved in old code too. Let me check. Thanks, -- Masami Hiramatsu