lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sun, 6 Apr 2008 20:32:21 +0300
From:	Pekka Paalanen <pq@....fi>
To:	Avi Kivity <avi@...ranet.com>, Ingo Molnar <mingo@...e.hu>
Cc:	linux-kernel@...r.kernel.org,
	Christoph Hellwig <hch@...radead.org>,
	Arjan van de Ven <arjan@...radead.org>,
	Pavel Roskin <proski@....org>,
	Steven Rostedt <rostedt@...dmis.org>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	penberg@...helsinki.fi, vegard.nossum@...il.com
Subject: Re: mmiotrace bug: recursive probe hit

On Sat, 05 Apr 2008 10:36:50 +0300
Avi Kivity <avi@...ranet.com> wrote:

> However there is a simpler (for you) 
> solution: run the driver-to-be-reverse-engineered in a kvm guest, and 
> modify kvm userspace to log accesses to mmio regions.  This requires the 
> not-yet-merged pci passthrough support.  You can reverse engineer 
> Windows drivers with this as well.

This is a very interesting idea, I didn't know it would be possible.
I think this also is a new project and I'd be happy to let someone else
take it over. We could still use the log format and tools from
mmiotrace, at least for starters.

This puts mmiotrace in a new ligth: there's something better(?)
coming in the future. But mmiotrace is here now, and I'd still like to
see it in mainline. Within ftrace framework, mmiotrace will be very
easy to use even for a Linux newbie. The KVM approach would be targeted
to developers, as I suspect setting it up (even when everything has been
merged into mainline) is more work than running mmiotrace.

Ingo, what do you think? In my opinion let's make mmiotrace force the
system down to UP via CPU hotplugging while MMIO tracing is active.
This should guarantee reliable traces in the easiest way possible. The
current workaround is not reliable on SMP. "Works enough" is what I'm
thinking of.


Thanks.

-- 
Pekka Paalanen
http://www.iki.fi/pq/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ