lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4A3F9684.5040007@linux.vnet.ibm.com>
Date:	Mon, 22 Jun 2009 20:04:44 +0530
From:	Maran <maranp@...ux.vnet.ibm.com>
To:	Heiko Carstens <heiko.carstens@...ibm.com>
CC:	Ananth N Mavinakayanahalli <ananth@...ibm.com>,
	rusty@...tcorp.com.au, lkml <linux-kernel@...r.kernel.org>,
	Martin Schwidefsky <schwidefsky@...ibm.com>,
	srikar@...ux.vnet.ibm.com
Subject: Re: [PATCH] stop_cpu() needs to use raw_smp_processor_id()

Heiko Carstens wrote:
> On Wed, Jun 17, 2009 at 12:31:56PM +0530, Maran wrote:
>   
>> Heiko Carstens wrote:
>>     
>>> On Tue, Jun 16, 2009 at 04:49:41PM +0530, Ananth N Mavinakayanahalli wrote:
>>>   
>>>       
>>>> With DEBUG_PREEMPT on, on an s390 box, we are seeing:
>>>>
>>>> BUG: using smp_processor_id() in preemptible [00000000] code: 
>>>> insmod/3006  caller is arch_arm_kprobe+0x2c/0x90                      
>>>>                   CPU: 0 Not tainted 
>>>> 2.6.30-rc8-tipjun10-02053-g39ae214 #7             Process insmod 
>>>> (pid: 3006, task: 000000007df31410, ksp: 000000007e087a28)   
>>>> 	0000000000000000 000000007e087c38 0000000000000002 0000000000000000
>>>> 	000000007e087cd8 000000007e087c50 000000007e087c50 0000000000048156  
>>>> 	00000000003e4de8 000000000002b830 0000000000000000 0000000000000000  
>>>> 	0000000000000000 000000007e087c38 ffffffff0000000d 000000007e087ca8  
>>>> 	000000000040a780 000000000001635c 000000007e087c38 000000007e087c80  
>>>> Call Trace:                                                           
>>>>      ([<00000000000162e6>] show_trace+0x13a/0x148)                    
>>>>            [<00000000001f123a>] debug_smp_processor_id+0x136/0x13c    
>>>>                 [<00000000003ddbd8>] arch_arm_kprobe+0x2c/0x90        
>>>>                      [<00000000003df8cc>] register_kprobe+0x630/0x684 
>>>>                           [<000003e000241056>] kprobe_init+0x56/0xa8 
>>>> [kprobe_example]                [<00000000000120c2>] 
>>>> do_one_initcall+0x3e/0x16c                            
>>>> [<000000000007cb4c>] SyS_init_module+0xc4/0x1fc                       
>>>>      [<0000000000027f42>] sysc_noemu+0x10/0x16                        
>>>>           [<0000004a4493324e>] 0x4a4493324e           
>>>>
>>>>         
>> With the current linus tree (git 10), kprobe breaks. Even smoke tests  
>> are failed in s390x box.
>> With 2.6.30, the same warning is raised even with CONFIG_SMP enabled. I  
>> have pasted the config file used.
>>     
>
> How about the patch below? Works for me. modprobe kprobe_example and the
> kprobes selftest work for me.
>
> Subject: [PATCH] kprobes: defer setting of ctlblk state
>
> From: Heiko Carstens <heiko.carstens@...ibm.com>
>
> get_krobe_ctlblk returns a per cpu kprobe control block which holds
> the state of the current cpu wrt to kprobe.
> When inserting/removing a kprobe the state of the cpu which replaces
> the code is changed to KPROBE_SWAP_INST. This however is done when
> preemption is still enabled. So the state of the current cpu doesn't
> necessarily reflect the real state.
> To fix this move the code that changes the state to non-preemptible
> context.
>
> Reported-by: Ananth N Mavinakayanahalli <ananth@...ibm.com>
> Signed-off-by: Heiko Carstens <heiko.carstens@...ibm.com>
> ---
>  arch/s390/kernel/kprobes.c |   18 +++++++-----------
>  1 file changed, 7 insertions(+), 11 deletions(-)
>
> Index: linux-2.6/arch/s390/kernel/kprobes.c
> ===================================================================
> --- linux-2.6.orig/arch/s390/kernel/kprobes.c
> +++ linux-2.6/arch/s390/kernel/kprobes.c
> @@ -154,39 +154,35 @@ void __kprobes get_instruction_type(stru
>
>  static int __kprobes swap_instruction(void *aref)
>  {
> +	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
> +	unsigned long status = kcb->kprobe_status;
>  	struct ins_replace_args *args = aref;
> +	int rc;
>
> -	return probe_kernel_write(args->ptr, &args->new, sizeof(args->new));
> +	kcb->kprobe_status = KPROBE_SWAP_INST;
> +	rc = probe_kernel_write(args->ptr, &args->new, sizeof(args->new));
> +	kcb->kprobe_status = status;
> +	return rc;
>  }
>
>  void __kprobes arch_arm_kprobe(struct kprobe *p)
>  {
> -	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
> -	unsigned long status = kcb->kprobe_status;
>  	struct ins_replace_args args;
>
>  	args.ptr = p->addr;
>  	args.old = p->opcode;
>  	args.new = BREAKPOINT_INSTRUCTION;
> -
> -	kcb->kprobe_status = KPROBE_SWAP_INST;
>  	stop_machine(swap_instruction, &args, NULL);
> -	kcb->kprobe_status = status;
>  }
>
>  void __kprobes arch_disarm_kprobe(struct kprobe *p)
>  {
> -	struct kprobe_ctlblk *kcb = get_kprobe_ctlblk();
> -	unsigned long status = kcb->kprobe_status;
>  	struct ins_replace_args args;
>
>  	args.ptr = p->addr;
>  	args.old = BREAKPOINT_INSTRUCTION;
>  	args.new = p->opcode;
> -
> -	kcb->kprobe_status = KPROBE_SWAP_INST;
>  	stop_machine(swap_instruction, &args, NULL);
> -	kcb->kprobe_status = status;
>  }
>
>  void __kprobes arch_remove_kprobe(struct kprobe *p)
>   
Hi Heiko,
modprobe kprobe_example and kprobe sanity test passed on applying the 
patch. Thanks!

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ