lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <48B6DA4F.6090601@redhat.com>
Date:	Thu, 28 Aug 2008 13:03:11 -0400
From:	Masami Hiramatsu <mhiramat@...hat.com>
To:	Marlow Weston <miwesto@...dia.gov>
CC:	ananth@...ibm.com, davem@...emloft.net, mhiramata@...hat.com,
	linux-kernel@...r.kernel.org, anil.s.keshavamurthy@...el.com
Subject: Re: HELP!  KProbes bug

Hi Marlow,

Marlow Weston wrote:
> Hello persons in the current kernel maintainers file under KProbes:
> 
> I can't find this bug reported anywhere nor somewhere useful for 
> reporting it, so I chose that location to find people to write.  If 
> there is somewhere else I should be sending this to, please tell me and 
> I will redirect it there.
> 
> I think I have found a KProbes bug when I turn on the KProbes via a proc 
> file call instead of via the init code.  The stack trace is attached and 
> seems to indicate a locking issue.  Also attached is module code that 
> will make this happen.  Any advice on where to start hunting this down 
> would be greatly appreciated.
> 
> If the KProbes are going by quickly, ie there is no 
> schedule_timeout_interrupt(), then the problem doesn't show up.  This 
> problem is exacerbated by the probes actually doing things that take 
> time while other probes are attempting to register.  Also, I don't 
> believe it has to do with any particular probe as which probe locks up 
> varies (and my mad attempts at commenting out various probes did not work).

Why would you like to call scheduler from probe handler?

By design, kprobe handler MUST NOT call scheduling functions because it
checks recursive call by using per-cpu variable and scheduler might move
probed process to other cpu. Especially, since kretprobe uses a spinlock
(or hashed spinlocks on recently kernel), if the handler calls scheduler,
it will cause deadlock.

Anyway, if you read Documentation/kprobes.txt carefully, you can find
below paragraph;

---
5. Kprobes Features and Limitations
[...]
Probe handlers are run with preemption disabled.  Depending on the
architecture, handlers may also run with interrupts disabled.  In any
case, your handler should not yield the CPU (e.g., by attempting to
acquire a semaphore).
---
(I think this note should prohibit process scheduling more clearly.)

So, it's not a bug of kprobes. It's a known limitation.

Thank you,


-- 
Masami Hiramatsu

Software Engineer
Hitachi Computer Products (America) Inc.
Software Solutions Division

e-mail: mhiramat@...hat.com

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ