From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755992AbdKCOxp (ORCPT ); Fri, 3 Nov 2017 10:53:45 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47186 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751415AbdKCOxm (ORCPT ); Fri, 3 Nov 2017 10:53:42 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com DF805820E2 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=jpoimboe@redhat.com Date: Fri, 3 Nov 2017 09:53:37 -0500 From: Josh Poimboeuf To: Steven Rostedt Cc: Jessica Yu , Masami Hiramatsu , Ananth N Mavinakayanahalli , Anil S Keshavamurthy , "David S . Miller" , Ingo Molnar , Petr Mladek , Joe Lawrence , Jiri Kosina , Miroslav Benes , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/2] kprobes: propagate error from arm_kprobe_ftrace() Message-ID: <20171103145337.wk5mib253q74pfuz@treble> References: <20171102163334.3947-1-jeyu@kernel.org> <20171102163334.3947-2-jeyu@kernel.org> <20171103100317.01db273b@vmware.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20171103100317.01db273b@vmware.local.home> User-Agent: Mutt/1.6.0.1 (2016-04-01) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Fri, 03 Nov 2017 14:53:42 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 03, 2017 at 10:03:17AM -0400, Steven Rostedt wrote: > On Thu, 2 Nov 2017 17:33:33 +0100 > Jessica Yu wrote: > > > Improve error handling when arming ftrace-based kprobes. Specifically, if > > we fail to arm a ftrace-based kprobe, register_kprobe()/enable_kprobe() > > should report an error instead of success. Previously, this has lead to > > confusing situations where register_kprobe() would return 0 indicating > > success, but the kprobe would not be functional if ftrace registration > > during the kprobe arming process had failed. We should therefore take any > > errors returned by ftrace into account and propagate this error so that we > > do not register/enable kprobes that cannot be armed. This can happen if, > > for example, register_ftrace_function() finds an IPMODIFY conflict (since > > kprobe_ftrace_ops has this flag set) and returns an error. Such a conflict > > is possible since livepatches also set the IPMODIFY flag for their ftrace_ops. > > > > arm_all_kprobes() keeps its current behavior and attempts to arm all > > kprobes. It returns the last encountered error and gives a warning if > > not all kprobes could be armed. > > > > This patch is based on Petr Mladek's original patchset (patches 2 and 3) > > back in 2015, which improved kprobes error handling, found here: > > > > https://lkml.org/lkml/2015/2/26/452 > > > > However, further work on this had been paused since then and the patches > > were not upstreamed. > > > > Based-on-patches-by: Petr Mladek > > Signed-off-by: Jessica Yu > > --- > > kernel/kprobes.c | 88 ++++++++++++++++++++++++++++++++++++++++---------------- > > 1 file changed, 63 insertions(+), 25 deletions(-) > > > > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > > index da2ccf142358..f4a094007cb5 100644 > > --- a/kernel/kprobes.c > > +++ b/kernel/kprobes.c > > @@ -978,18 +978,27 @@ static int prepare_kprobe(struct kprobe *p) > > } > > > > /* Caller must lock kprobe_mutex */ > > -static void arm_kprobe_ftrace(struct kprobe *p) > > +static int arm_kprobe_ftrace(struct kprobe *p) > > { > > - int ret; > > + int ret = 0; > > > > ret = ftrace_set_filter_ip(&kprobe_ftrace_ops, > > (unsigned long)p->addr, 0, 0); > > - WARN(ret < 0, "Failed to arm kprobe-ftrace at %p (%d)\n", p->addr, ret); > > - kprobe_ftrace_enabled++; > > - if (kprobe_ftrace_enabled == 1) { > > + if (WARN(ret < 0, "Failed to arm kprobe-ftrace at %p (%d)\n", p->addr, ret)) > > + return ret; > > + > > + if (kprobe_ftrace_enabled == 0) { > > ret = register_ftrace_function(&kprobe_ftrace_ops); > > - WARN(ret < 0, "Failed to init kprobe-ftrace (%d)\n", ret); > > + if (WARN(ret < 0, "Failed to init kprobe-ftrace (%d)\n", ret)) > > + goto err_ftrace; > > } > > + > > + kprobe_ftrace_enabled++; > > + return ret; > > + > > +err_ftrace: > > + ftrace_set_filter_ip(&kprobe_ftrace_ops, (unsigned long)p->addr, 1, 0); > > Hmm, this could have a very nasty side effect. If you remove a function > from the ops, and it was the last function, an empty ops means to trace > *all* functions. But this error path only runs when register_ftrace_function() fails, in which case the ops aren't live anyway, right? -- Josh