From: Steven Rostedt <rostedt@goodmis.org>
To: "Tobin C. Harding" <me@tobin.cc>
Cc: Andrew Morton <akpm@linux-foundation.org>,
Linus Torvalds <torvalds@linux-foundation.org>,
Randy Dunlap <rdunlap@infradead.org>,
Kees Cook <keescook@chromium.org>,
Anna-Maria Gleixner <anna-maria@linutronix.de>,
"Theodore Ts'o" <tytso@mit.edu>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
Arnd Bergmann <arnd@arndb.de>,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH v6 4/4] vsprintf: Add command line option debug_boot_weak_hash
Date: Thu, 31 May 2018 17:35:15 -0400 [thread overview]
Message-ID: <20180531173515.0252d579@vmware.local.home> (raw)
In-Reply-To: <1527472002-11571-5-git-send-email-me@tobin.cc>
On Mon, 28 May 2018 11:46:42 +1000
"Tobin C. Harding" <me@tobin.cc> wrote:
> Currently printing [hashed] pointers requires enough entropy to be
> available. Early in the boot sequence this may not be the case
> resulting in a dummy string '(____ptrval____)' being printed. This
> makes debugging the early boot sequence difficult. We can relax the
> requirement to use cryptographically secure hashing during debugging.
> This enables debugging while keeping development/production kernel
> behaviour the same.
>
> If new command line option debug_boot_weak_hash is enabled use
> cryptographically insecure hashing and hash pointer value immediately.
>
I was able to play with this. It did start showing real pointers after
the early parameters are parsed. Hopefully we don't need anything
before that. But that is still much earlier than what we had before.
> Cc: Anna-Maria Gleixner <anna-maria@linutronix.de>
> Cc: Steven Rostedt <rostedt@goodmis.org>
> Cc: Randy Dunlap <rdunlap@infradead.org>
> Signed-off-by: Tobin C. Harding <me@tobin.cc>
> ---
> Documentation/admin-guide/kernel-parameters.txt | 9 +++++++++
> lib/vsprintf.c | 20 ++++++++++++++++++++
> 2 files changed, 29 insertions(+)
>
> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
> index f2040d46f095..8a86d895343e 100644
> --- a/Documentation/admin-guide/kernel-parameters.txt
> +++ b/Documentation/admin-guide/kernel-parameters.txt
> @@ -753,6 +753,15 @@
>
> debug [KNL] Enable kernel debugging (events log level).
>
> + debug_boot_weak_hash
> + [KNL] Enable printing pointers early in the boot
> + sequence. If enabled, we use a weak hash instead of
> + siphash to hash pointers. Use this option if you need
> + to see pointer values during early boot (i.e you are
> + seeing instances of '(___ptrval___)').
> + Cryptographically insecure, please do not use on
> + production kernels.
> +
> debug_locks_verbose=
> [KNL] verbose self-tests
> Format=<0|1>
> diff --git a/lib/vsprintf.c b/lib/vsprintf.c
> index 1545a8aa26a9..369623205e2c 100644
> --- a/lib/vsprintf.c
> +++ b/lib/vsprintf.c
> @@ -1670,6 +1670,20 @@ char *pointer_string(char *buf, char *end, const void *ptr,
> }
>
> static DEFINE_STATIC_KEY_TRUE(not_filled_random_ptr_key);
> +
> +/* Make pointers available for printing early in the boot sequence. */
> +static int debug_boot_weak_hash __ro_after_init;
> +EXPORT_SYMBOL(debug_boot_weak_hash);
> +
> +static int __init debug_boot_weak_hash_enable(char *str)
> +{
> + debug_boot_weak_hash = 1;
> + pr_info("debug_boot_weak_hash enabled\n");
> + return 0;
> +}
> +early_param("debug_boot_weak_hash", debug_boot_weak_hash_enable);
> +
> +static bool have_filled_random_ptr_key __read_mostly;
> static siphash_key_t ptr_key __read_mostly;
>
> static void enable_ptr_key_workfn(struct work_struct *work)
> @@ -1721,6 +1735,12 @@ static char *ptr_to_id(char *buf, char *end, void *ptr, struct printf_spec spec)
> unsigned long hashval;
> const int default_width = 2 * sizeof(ptr);
>
> + /* When debugging early boot use non-cryptographically secure hash */
> + if (unlikely(debug_boot_weak_hash)) {
Perhaps we should make the debug_boot_weak_hash into a static key too.
That way, it's constant jump instead of a compare.
-- Steve
> + hashval = hash_long((unsigned long)ptr, 32);
> + return pointer_string(buf, end, (const void *)hashval, spec);
> + }
> +
> if (static_branch_unlikely(¬_filled_random_ptr_key)) {
> spec.field_width = default_width;
> /* string length must be less than default_width */
next prev parent reply other threads:[~2018-05-31 21:35 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-28 1:46 [PATCH v6 0/4] enable early printing of hashed pointers Tobin C. Harding
2018-05-28 1:46 ` [PATCH v6 1/4] random: Fix whitespace pre random-bytes work Tobin C. Harding
2018-05-28 1:46 ` [PATCH v6 2/4] random: Return nbytes filled from hw RNG Tobin C. Harding
2018-05-28 1:46 ` [PATCH v6 3/4] vsprintf: Use hw RNG for ptr_key Tobin C. Harding
2018-05-31 20:46 ` Steven Rostedt
2018-05-28 1:46 ` [PATCH v6 4/4] vsprintf: Add command line option debug_boot_weak_hash Tobin C. Harding
2018-05-28 17:40 ` Randy Dunlap
2018-05-30 4:27 ` Tobin C. Harding
2018-05-31 21:35 ` Steven Rostedt [this message]
2018-05-31 22:46 ` Tobin C. Harding
2018-05-28 13:59 ` [PATCH v6 0/4] enable early printing of hashed pointers Theodore Y. Ts'o
2018-06-06 23:31 ` Tobin C. Harding
2018-06-07 14:00 ` Theodore Y. Ts'o
2018-06-07 21:36 ` Tobin C. Harding
2018-05-31 18:52 ` Steven Rostedt
2018-06-05 14:21 ` Anna-Maria Gleixner
2018-06-06 13:08 ` Anna-Maria Gleixner
2018-06-06 23:29 ` Tobin C. Harding
2018-06-06 13:02 ` Thomas Gleixner
2018-06-06 23:30 ` Tobin C. Harding
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180531173515.0252d579@vmware.local.home \
--to=rostedt@goodmis.org \
--cc=akpm@linux-foundation.org \
--cc=anna-maria@linutronix.de \
--cc=arnd@arndb.de \
--cc=gregkh@linuxfoundation.org \
--cc=keescook@chromium.org \
--cc=linux-kernel@vger.kernel.org \
--cc=me@tobin.cc \
--cc=rdunlap@infradead.org \
--cc=torvalds@linux-foundation.org \
--cc=tytso@mit.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox