lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220420114454.69ab108c@gandalf.local.home>
Date:   Wed, 20 Apr 2022 11:44:54 -0400
From:   Steven Rostedt <rostedt@...dmis.org>
To:     patrick wang <patrick.wang.shcn@...il.com>
Cc:     paulmck@...nel.org, frederic@...nel.org, quic_neeraju@...cinc.com,
        josh@...htriplett.org, mathieu.desnoyers@...icios.com,
        jiangshanlai@...il.com, joel@...lfernandes.org,
        rcu@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] rcu: ftrace: avoid tracing a few functions executed in
 multi_cpu_stop()

On Wed, 20 Apr 2022 18:34:34 +0800
patrick wang <patrick.wang.shcn@...il.com> wrote:

[ I had a power outage yesterday, just catching up now ]

> Sorry for the format. Need get used to gmail.
> 
> These functions are running within stop machine and ftrace modify
> code by using stop machine to ensure the safety on some
> architectures(e.g. RISC-V). These functions' instructions will be
> modified during ftrace modifying code. When instructions are being
> modified, they shouldn't be executed typically. Or the executor
> may behave unpredictably.

Interesting. On x86 when we used stop machine[*] it was not an issue to
modify the code that is being executed in stop machine. I'm curious to
exactly what the issue is if something does get traced in the stop machine
processing. Why does it crash?

-- Steve


[*] You really should come up with a better way than stop machine, because
the stop machine method is really disruptive, can you not use the break
point method for updates?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ