lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180412190954.4c76039100b990675ec390bd@arm.com>
Date:   Thu, 12 Apr 2018 19:09:54 -0500
From:   Kim Phillips <kim.phillips@....com>
To:     Namhyung Kim <namhyung@...nel.org>
Cc:     Arnaldo Carvalho de Melo <acme@...nel.org>,
        Jiri Olsa <jolsa@...hat.com>, Jiri Olsa <jolsa@...nel.org>,
        lkml <linux-kernel@...r.kernel.org>,
        Ingo Molnar <mingo@...nel.org>,
        David Ahern <dsahern@...il.com>,
        Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
        Peter Zijlstra <a.p.zijlstra@...llo.nl>, <kernel-team@....com>
Subject: Re: [PATCH] Revert
 "perf machine: Fix paranoid check in machine__set_kernel_mmap()"

On Thu, 12 Apr 2018 10:57:56 +0900
Namhyung Kim <namhyung@...nel.org> wrote:

> On Wed, Apr 11, 2018 at 07:29:40PM -0500, Kim Phillips wrote:
> > On Thu, 12 Apr 2018 08:31:09 +0900
> > Namhyung Kim <namhyung@...nel.org> wrote:
> > > On Wed, Apr 11, 2018 at 06:07:52PM -0500, Kim Phillips wrote:
> > > > ---
> > > > It's not clear to me what the specific intent of the original commit
> > > > was, thus the revert.
> > > 
> > > Hmm.. maybe your kernel map has non-zero start and zero end.  I
> > 
> > On x86, the first line in /proc/kallsyms is:
> > 
> > 0000000000000000 A irq_stack_union
> > 
> > On arm64, it's:
> > 
> > ffff200008080000 t _head
> > 
> > Another arm64 box has:
> > 
> > ffff000008080000 t _head
> > 
> > (neither have RANDOMIZE_BASE set FWIW)
> > 
> > > thought it was just from an old or invalid data.  But now I think that
> > 
> > It would be good to know what that was, yes.
> > 
> > > overflow can create it..  could you please show me the mmap event?
> > > 
> > >   $ perf script --show-mmap-events
> > 
> > Here you go:
> > 
> >          swapper     0 [000]     0.000000: PERF_RECORD_MMAP -1/0: [0xffff200008080000(0xdffff7f7ffff) @ 0xffff200008080000]: x [kernel.kallsyms]_text
> 
>    0xffff200008080000
>  +     0xdffff7f7ffff
>  --------------------
>    0xffffffffffffffff
> 
> So it should have ~0ULL of the 'end' already.  I don't know why it
> caused the problem..  Was it from the `perf.good`?

There's no difference between the output of perf.good and perf.bad (the
difference between them is this reversion patch, .good being the one
that includes it).

> >          swapper     0 [000]     0.000000: PERF_RECORD_MMAP -1/0: [0xffff2000021e0000(0x18000) @ 0]: x /lib/modules/4.16.0+/kernel/drivers/bus/arm-ccn.ko
> 
> Hmm.. also it seems arm64 loads modules under the kernel.  Then the
> fixup logic in machine__create_kernel_maps() won't work.  Also as we

you mean this:

void __map_groups__fixup_end(struct map_groups *mg, enum map_type type)
...
                if (!curr->end)
                        curr->end = next->start;

?  Module symbol resolution is working, however.  Maybe because this
'paranoid' check was setting all the end addresses to ~0ULL?  Does the
design assume what maps__first() returns always has the lowest address,
and they're in sorted order?  If so, what's the fix, to re-sort
map_groups afterwards?

> don't use the map_groups__fixup_end() anymore 

?  I see map_groups__fixup_end() still being called.

> I think it's ok just
> checking the end address.

Where?  In machine__set_kernel_mmap(), like this reversion does?

The original commit says:

    The machine__set_kernel_mmap() is to setup addresses of the kernel map
    using external info.  But it has a check when the address is given from
    an incorrect input which should have the start and end address of 0
    (i.e. machine__process_kernel_mmap_event).
    
    But we also use the end address of 0 for a valid input so change it to
    check both start and end addresses.

yet the comment above the code says:

                 * Be a bit paranoid here, some perf.data file came with
                 * a zero sized synthesized MMAP event for the kernel.

I tracked the first comment insertion down to this commit:

commit 10fe12ef631a7e85022ed26304a37f033a6a95b8
Author: Arnaldo Carvalho de Melo <acme@...hat.com>
Date:   Sat Feb 20 19:53:13 2010 -0200

    perf symbols: Fix up map end too on modular kernels with no modules installed
    
    In 2161db9 we stopped failing when not finding modules when
    asked too, but then the kernel maps (just one, for vmlinux)
    wasn't having its ->end field correctly set up, so symbols were
    not being found for the vmlinux map because its range was 0-0.

which, when reading that last part, one would assume start == end == 0,
therefore size also == 0, the comment only talks about a zero *sized*
event...so did the original commit 1d12cec6ce99 "perf machine: Fix
paranoid check in machine__set_kernel_mmap()" really fix that case?
Because it checks start == 0, not necessarily the size...

If not, can it be reverted until we figure out what's going on with
arm64?  It's causing a regression in the meantime...

Thanks,

Kim

Powered by blists - more mailing lists