Re: [PATCH] riscv: keep interrupts disabled for BREAKPOINT exception

From: Jisheng Zhang
Date: Fri Apr 02 2021 - 09:37:36 EST


On Thu, 1 Apr 2021 16:49:47 +0800
"liaochang (A)" <liaochang1@xxxxxxxxxx> wrote:

> Hi Jisheng,

Hi,

>
> 在 2021/3/31 22:22, Jisheng Zhang 写道:
> > On Tue, 30 Mar 2021 18:33:16 +0900
> > Masami Hiramatsu <mhiramat@xxxxxxxxxx> wrote:
> >
> >> Hi Jisheng,
> >
> > Hi Masami,
> >
> >>
> >> On Tue, 30 Mar 2021 02:16:24 +0800
> >> Jisheng Zhang <jszhang3@xxxxxxxxxxxxxxxx> wrote:
> >>
> >>> From: Jisheng Zhang <jszhang@xxxxxxxxxx>
> >>>
> >>> Current riscv's kprobe handlers are run with both preemption and
> >>> interrupt enabled, this violates kprobe requirements. Fix this issue
> >>> by keeping interrupts disabled for BREAKPOINT exception.
> >>
> >> Not only while the breakpoint exception but also until the end of
> >> the single step (maybe you are using __BUG_INSN_32 ??) need to be
> >> disable interrupts. Can this do that?
> >>
> >
> > interrupt is disabled during "single step" by kprobes_save_local_irqflag()
> > and kprobes_restore_local_irqflag(). The code flow looks like:
> >
> > do_trap_break() // for bp
> > kprobe_breakpoint_handler()
> > setup_singlestep()
> > kprobes_restore_local_irqflag()
> >
> > do_trap_break() // for ss
> > kprobe_single_step_handler()
> > kprobes_restore_local_irqflag()
>
> Recently, kernel hit BUG_ON() on QEMU after I install a probe at "sys_read" via kprobe,

TIPS: Each line should not exceed 80 chars

> accoriding to my debugging and analysis it looks like caused by the "irq disable" operation for single-stepping.
>
> I present a detailed description about this problem in the mail with title "[PATCH] riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe".
> Looking forward to some feedback,Thanks.
>

I will comment that patch.

thanks