From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755599AbZBWOsS (ORCPT ); Mon, 23 Feb 2009 09:48:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754058AbZBWOsH (ORCPT ); Mon, 23 Feb 2009 09:48:07 -0500 Received: from hrndva-omtalb.mail.rr.com ([71.74.56.123]:57527 "EHLO hrndva-omtalb.mail.rr.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754107AbZBWOsG (ORCPT ); Mon, 23 Feb 2009 09:48:06 -0500 Date: Mon, 23 Feb 2009 09:48:01 -0500 (EST) From: Steven Rostedt X-X-Sender: rostedt@gandalf.stny.rr.com To: Mathieu Desnoyers cc: Andi Kleen , linux-kernel@vger.kernel.org, Ingo Molnar , Andrew Morton , Thomas Gleixner , Peter Zijlstra , Frederic Weisbecker , Linus Torvalds , Arjan van de Ven , Rusty Russell , "H. Peter Anvin" , Steven Rostedt Subject: Re: [PATCH 4/6] ftrace, x86: make kernel text writable only for conversions In-Reply-To: <20090223045357.GA9158@Krystal> Message-ID: References: <20090220011316.379904625@goodmis.org> <20090220011521.003556651@goodmis.org> <87y6vyuzsn.fsf@basil.nowhere.org> <20090223023332.GA5430@Krystal> <20090223045357.GA9158@Krystal> User-Agent: Alpine 2.00 (DEB 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 22 Feb 2009, Mathieu Desnoyers wrote: > * Steven Rostedt (rostedt@goodmis.org) wrote: > > > > On Sun, 22 Feb 2009, Mathieu Desnoyers wrote: > > > > > > > > We are changing over 19000 locations in the kernel. This touches almost > > > > all kernel text pages anyway. You want to map a page in and out for over > > > > 19000 locations? > > > > > > > > -- Steve > > > > > > > > > > Hi Steve, > > > > > > Can you provide numbers to indicate why it's required to be so intrusive > > > in the kernel mappings while doing these modifications ? I think opening > > > such time window where standard code mapping is writeable globally in > > > config RO_DATA kernels could open the door to unexpected side-effects, > > > so ideally going through the "backdoor" page mapped by text_poke seems > > > safer. Given similar performance, I would tend to use a text_poke-like > > > approach. > > > > > > > Not sure which numbers you are asking for. The dynamic function tracer > > modifies all mcount calls, which are done by practically every function in > > the kernel. With a normal Fedora kernel (and all its loaded modules), > > that's between 15 to 20 thousand functions, depending on what modules are > > loaded. > > > > I mean comparing the cost of changing the kernel mappings and doing the > edits (as you do) vs doing it through a text-poke-like mapping. Well, I could try to do the benchmarks, but that would require a bit of development (see below). > > > At boot up we convert them all to nops, but when we enable the function > > tracer, we convert them back to calls to the function tracer. This is done > > by a priviledge user, since the function tracer can add quite a bit of > > overhead when activated. > > > > I do not really see how changing this for the short period of time is any > > different than making another mapping point to the kernel code. If you > > could find a way to break this security, you should be able to break it > > with another mapping as well. > > It's not only about breaking the security. It's mostly to insure > internal kernel consistency. While you are changing these mappings, you > could possibly have a window where other kernel code is running (irq, > other cpus threads). That code could itself be buggy and use the > writeable window to overwrite some kernel code or RO data. This > side-effect would go undetected while users think the RO data *is* is, > but it wouldn't. You also bring a good point about security : if someone > ever rely on CONFIG_DEBUG_RODATA for some security reasons, then we give > a big window where kernel text and ro data is writeable at *known* > addresses, while we can randomize the address used for text_poke. As Ingo already mentioned, if an attacker can write to kernel memory then the game is pretty much over. As for RO_DATA and bugs, it is a very small window for this to happen, and the sys-admin is the one making the change. This is not some periodical update. The sys-admin must be the one to initiate the tracer to modify text, ie, enabling or disabling the function tracer. Which, by the way, is something a sys-admin should only do when the system is off line. The overhead of all functions being traced, would not be something to be doing on a production system, unless they need to analyze something going wrong. > > > > > Also note that this dynamic tracing code works for not only x86, it also > > works for PPC, ARM, superH and ia64. To use text_poke, that would require > > all of these to have text_poke ported. > > > > Do these architecture have DEBUG_RODATA config ? If not, then a simple > memcpy is ok. No, the stop_machine has nothing to do with RODATA config. It has to do with a safe way of modifying text that might run on another CPU. > > > How does text_poke solve the issue of executing code on another CPU that > > is changing? > > > > text_poke itself does not provide that. This must be insured by the Exactly! Then I can not replace stop_machine with "text_poke". > user on a case-by-case basis. For instance, kprobes is changing code > atomically _and_ just inserting/removing breakpoints. Doing this is fine > with cross-cpu code modification (XMC). alternative code is only > changing code when the CPU is UP, so it's also ok. However, changing > multi-bytes instructions without changing those for a trap-generating > instruction when the CPUs are up (SMP) falls into the erratas, and the > code that uses text_poke must carefully perform this modification, e.g. > by doing like I do in my immediate values patchset in the lttng git > tree (using a temporary breakpoint while doing the modification). This > would apply directly to the function tracer, and you could get rid of > this ugly latency-inducing stop_machine() call. Then I would need to implement this break point code on every arch. Actually, I find the stop_machine quite an elegant solution, and not that ugly. Modifying code on an SMP box is very dangerous. The "stop_machine" turns the SMP box into a UP box while it is running (with the exception of NMIs, but we deal with that separately). The current method (with DEBUG_RODATA on x86), is to make the kernel text writable. Call stop_machine that will modify all the locations (no interruptions), then switch the kernel text back to read only. What you want me to do is, memory map a location, set a break point on it for anyone that happens to hit it (and do what? call the previous command?) modify the code, remove the break point, remove the memory mapping and do that for another 19000 times. And this must also be implemented on all archs that support dynamic ftrace. That seems to be much more complex and quite frankly, much more error prone. Tracing's number one priority is stability. The more complex it becomes the less stable it will be. -- Steve