public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Josh Poimboeuf <jpoimboe@redhat.com>
To: Ingo Molnar <mingo@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>,
	x86@kernel.org, linux-kernel@vger.kernel.org,
	live-patching@vger.kernel.org, Michal Marek <mmarek@suse.cz>,
	Peter Zijlstra <peterz@infradead.org>,
	Andy Lutomirski <luto@kernel.org>, Borislav Petkov <bp@alien8.de>,
	Linus Torvalds <torvalds@linux-foundation.org>,
	Andi Kleen <andi@firstfloor.org>, Pedro Alves <palves@redhat.com>,
	Namhyung Kim <namhyung@gmail.com>,
	Bernd Petrovitsch <bernd@petrovitsch.priv.at>,
	Chris J Arges <chris.j.arges@canonical.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	David Vrabel <david.vrabel@citrix.com>,
	Jeremy Fitzhardinge <jeremy@goop.org>,
	Chris Wright <chrisw@sous-sol.org>,
	Alok Kataria <akataria@vmware.com>,
	Rusty Russell <rusty@rustcorp.com.au>,
	Herbert Xu <herbert@gondor.apana.org.au>,
	"David S. Miller" <davem@davemloft.net>,
	Pavel Machek <pavel@ucw.cz>,
	"Rafael J. Wysocki" <rjw@rjwysocki.net>,
	Len Brown <len.brown@intel.com>,
	Matt Fleming <matt.fleming@intel.com>
Subject: Re: [PATCH v11 00/20] Compile-time stack validation
Date: Fri, 28 Aug 2015 08:54:58 -0500	[thread overview]
Message-ID: <20150828135458.GA27761@treble.redhat.com> (raw)
In-Reply-To: <20150828082116.GA17123@gmail.com>

On Fri, Aug 28, 2015 at 10:21:16AM +0200, Ingo Molnar wrote:
> 
> * Josh Poimboeuf <jpoimboe@redhat.com> wrote:
> 
> > On Wed, Aug 26, 2015 at 09:07:23AM +0200, Ingo Molnar wrote:
> > > 
> > > * Josh Poimboeuf <jpoimboe@redhat.com> wrote:
> > > 
> > > > BTW, since I'm planning on adding a CFI generation option to this tool, I wonder 
> > > > if "stackvalidate" is a misnomer.  I can't think of anything better.  Any naming 
> > > > ideas are welcome :-)
> > > 
> > > I'd suggest 'debuginfo' and a Git-alike set of subcommands:
> > > 
> > >    debuginfo help
> > >    debuginfo check
> > >    debuginfo check framepointers
> > >    debuginfo check cfi
> > > 
> > > Such a command scheme keeps open various future commands, such as:
> > > 
> > >    debuginfo show
> > >    debuginfo size
> > >    debuginfo compress
> > >    debuginfo strip
> > > 
> > > etc.
> > > 
> > > I also checked that there does not appear to be such a Linux tool with such a name 
> > > at the moment.
> > 
> > My feeling is that the subcommand model wouldn't fit this tool very well.  Its 
> > core functionality is to analyze code paths -- which it does in a single pass, 
> > regardless of whether it's checking frame pointers, checking CFI, generating 
> > CFI, or some combination.  Splitting it up into subcommands would mean having to 
> > repeat the same code analysis pass multiple times unnecessarily.
> 
> Huh?
> 
> The subcommand approach is a user UI that does not limit the tool in any way: you 
> are free to provide subcommands that combine more atomic functionality - similarly 
> to how Git provides a 'git pull' subcommand that is a combination of 'fetch' and 
> 'merge' steps.

Sure, but it doesn't scale if *all* the subcommands are combinable.  For
n subcommands which can be combined, you'd need (2^n - 1) total
subcommands to cover all possible combinations.  In that case,
subcommands would be much more unwieldy than just having n flags that
can be easily combined.

This is an important point because I think any hypothetical future
options would be likely to be combinable if they take advantage of the
tool's main functionality, which is walking all the code paths.  If they
don't take advantage of that, they should probably be in a separate tool
anyway.

> In this case it would be a simple:
> 
>    debuginfo check all
> 
> to check everything. You can also make the selection of debuginfo components to 
> check a regular option, not a subcommand.

The reason I proposed a name change is that it will soon do *more* than
just checking.  It will also do CFI generation by modifying the object
file.

What subcommand would you suggest for the following?

- do frame pointer validation; and

- if CFI exists, do CFI validation, else do CFI generation.

> The important step is to not limit the tool to 'checking' only, if there's 
> reasonable other tasks it could perform:

>  - For example in the future we might want to sanity check the dwarf debuginfo 
>    whether it's all well suited for kernel probing.

Yes, and this is planned soon.

>  - And if the tool is doing such a good job analyzing stacks, why not extend it 
>    trivially to print max stack backtrace estimations?

Sure, we could do that.

> etc. By limiting the name at inception unreasonably you make all these things less 
> obvious to add.

But note these examples are still related to stacks, so having "stack"
in the name of the tool wouldn't be limiting (for these examples at
least).

> The tool should obviously not be named 'kitchensink' just for future 
> extensability, but at least don't limit it to stacks and checking only ...
> 
> > Also, since it's really focused on stack-related code path analysis, I wouldn't 
> > expect it to be branching out into other debuginfo-related tasks.
> > 
> > As far as naming goes, "debuginfo" usually refers to DWARF metadata. But this 
> > tool isn't DWARF-specific, so that would be confusing IMO.  I also agree with 
> > Jiri that re-using a generic name which already has another meaning would add to 
> > the confusion.
> > 
> > The goal of this tool is to fix stack traces, so how about "stackfix"?
> 
> Sigh, please don't limit the tool's purpose with its name ...
> 
> and choose a better name! :-) The tool does not 'fix' anything, and the normal 
> case would be for it to produce no warnings. I.e. it's not a fixing, it's a 
> checking tool.
> 
> So something like 'stackcheck' or 'stackinfo' - but I really think 'debuginfo' is 
> better, because for more complex kernel image operations like live patching the 
> kernel has to double check the untrusted debuginfo that compilers barf out ...
> 
> Frame pointers are simply a legacy debuginfo variant, one that the kernel happens 
> to use as its primary debuginfo. I don't think it's confusing at all, especially 
> if any dwarf logic is added ...

I proposed the "fix" in "stackfix" because it will do more than just
checking: it will also be able to modify the object file (as I describe
above).  And "stack" because thus far the proposed scope of the tool is
strictly related to stacks.

I think "debuginfo" is limiting in its own way.  The core functionality
of the tool is to analyze all possible code paths, which isn't directly
related to debuginfo.  We might want to do other kinds of code path
analysis which are unrelated to debuginfo.

For example, the tool could have a replacement for "make checkstack",
which generates a list of functions which are stack hogs.  That has
nothing to do with debuginfo.

(And note this is a further example of why subcommands are not a good
fit.  We would want to be able to combine this option with the others
without needing an exponential growth in the number of subcommands.)

-- 
Josh

  reply	other threads:[~2015-08-28 13:55 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-24 14:45 [PATCH v11 00/20] Compile-time stack validation Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 01/20] x86/asm: Frame pointer macro cleanup Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 02/20] x86/asm: Add C versions of frame pointer macros Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 03/20] x86/stackvalidate: Compile-time stack validation Josh Poimboeuf
2015-08-26 14:26   ` Andi Kleen
2015-08-27 14:29     ` Josh Poimboeuf
2015-08-28 17:26       ` Andi Kleen
2015-08-28 19:54         ` Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 04/20] x86/stackvalidate: Add file and directory ignores Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 05/20] x86/stackvalidate: Add ignore macros Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 06/20] x86/xen: Add stack frame dependency to hypercall inline asm calls Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 07/20] x86/paravirt: Add stack frame dependency to PVOP " Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 08/20] x86/paravirt: Create a stack frame in PV_CALLEE_SAVE_REGS_THUNK Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 09/20] x86/amd: Set ELF function type for vide() Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 10/20] x86/reboot: Add ljmp instructions to stackvalidate whitelist Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 11/20] x86/xen: Add xen_cpuid() and xen_setup_gdt() to stackvalidate whitelists Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 12/20] x86/asm/crypto: Create stack frames in aesni-intel_asm.S Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 13/20] x86/asm/crypto: Move .Lbswap_mask data to .rodata section Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 14/20] x86/asm/crypto: Move jump_table " Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 15/20] x86/asm/crypto: Create stack frames in clmul_ghash_mul/update() Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 16/20] x86/asm/entry: Create stack frames in thunk functions Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 17/20] x86/asm/acpi: Create a stack frame in do_suspend_lowlevel() Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 18/20] x86/asm: Create stack frames in rwsem functions Josh Poimboeuf
2015-08-24 14:45 ` [PATCH v11 19/20] x86/asm/efi: Create a stack frame in efi_call() Josh Poimboeuf
2015-08-24 14:46 ` [PATCH v11 20/20] x86/asm/power: Create stack frames in hibernate_asm_64.S Josh Poimboeuf
2015-08-25  8:05 ` [PATCH v11 00/20] Compile-time stack validation Ingo Molnar
2015-08-25 15:25   ` Josh Poimboeuf
2015-08-26  7:07     ` Ingo Molnar
2015-08-26  8:44       ` Jiri Kosina
2015-08-27 13:11       ` Josh Poimboeuf
2015-08-28  8:21         ` Ingo Molnar
2015-08-28 13:54           ` Josh Poimboeuf [this message]
2015-09-14 13:19             ` Ingo Molnar
2015-09-14 14:10               ` Josh Poimboeuf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150828135458.GA27761@treble.redhat.com \
    --to=jpoimboe@redhat.com \
    --cc=akataria@vmware.com \
    --cc=akpm@linux-foundation.org \
    --cc=andi@firstfloor.org \
    --cc=bernd@petrovitsch.priv.at \
    --cc=boris.ostrovsky@oracle.com \
    --cc=bp@alien8.de \
    --cc=chris.j.arges@canonical.com \
    --cc=chrisw@sous-sol.org \
    --cc=davem@davemloft.net \
    --cc=david.vrabel@citrix.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=hpa@zytor.com \
    --cc=jeremy@goop.org \
    --cc=konrad.wilk@oracle.com \
    --cc=len.brown@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=live-patching@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=matt.fleming@intel.com \
    --cc=mingo@kernel.org \
    --cc=mingo@redhat.com \
    --cc=mmarek@suse.cz \
    --cc=namhyung@gmail.com \
    --cc=palves@redhat.com \
    --cc=pavel@ucw.cz \
    --cc=peterz@infradead.org \
    --cc=rjw@rjwysocki.net \
    --cc=rusty@rustcorp.com.au \
    --cc=tglx@linutronix.de \
    --cc=torvalds@linux-foundation.org \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox