Received: by 10.192.165.156 with SMTP id m28csp181766imm; Tue, 10 Apr 2018 19:19:50 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+OrlP5GPwSwr+NltnhV2q/sCcl1yEu3Gm3d7h/8heAxjOemUrfrSaCOgtZAO8B5qUjpJhO X-Received: by 2002:a17:902:aa98:: with SMTP id d24-v6mr2978453plr.220.1523413190632; Tue, 10 Apr 2018 19:19:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523413190; cv=none; d=google.com; s=arc-20160816; b=KX2B0dFjgHvBae0zp90hfMIZiyrUEfijYpNb8GQOYFl0RdhScMYvE8aDDe851d3VFh Z4FoM5Wa+hN1xD6xnKjFZVRtu5Z3jYULEOCl2bfMgnbq+oLuONxyN/IimhmJnsYDDsLT dLpcNyNOiRXbTh1c2a5R8RK1LE5i1AZq+HerBfpH6F+7qTZBKIsNMB9HpDO/AfuBdn7v A1Ua/Q0ZSSEf8HYzuaczUGl3bYPRXg9K2J5FC1KWKwqa8Lcp+WLMYhmakNbga4wG3UbG zfeZtN/05aKKxV9j2dXWIL5MA0sYLLOPwocyFZEu95hl/hvFbThB1A5z88qrE/UiCm9z romg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dmarc-filter:arc-authentication-results; bh=emoGLhlGmoLjBek6L48evV+2L7Ha7zGJoj8D4Hg5lRk=; b=MbvIuAlqMGAPznwcs/wF9DarWZWTVCH0RyIgfVk+ZHqg9BQ4BSzUsv+RayH6zyu2dD TxlTG/Fa0S+lBvHmlJaPUoItDMjGeNway/SqIZOog6ABsCo6TwAy5R+Dcbam/BjXhYd6 2+hg25S28R5LjQwwAjqQ61bk7E5nVvu1iJnRdFkXXZJxLzcVZfa//R+JltTxSWQQaana LEs3j0fUpyMlsIFdpaOyW4MZknzFhLbMh5WgqC9nO1NOTo1+c+Ot5pHwkg0DgF0p1OpR 3saru0hUunHQabXUdXBIqkEYjw14JR+Ledbp1wNBuwTfTV9pfc8e0+gMB6NenrnFCg1D 7ftg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w78si44705pfj.339.2018.04.10.19.19.13; Tue, 10 Apr 2018 19:19:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752745AbeDKCN0 (ORCPT + 99 others); Tue, 10 Apr 2018 22:13:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:45422 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752295AbeDKCNZ (ORCPT ); Tue, 10 Apr 2018 22:13:25 -0400 Received: from devbox (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0126921785; Wed, 11 Apr 2018 02:13:23 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0126921785 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=mhiramat@kernel.org Date: Wed, 11 Apr 2018 11:13:22 +0900 From: Masami Hiramatsu To: Steven Rostedt Cc: Howard McLauchlan , , Ingo Molnar , , Masami Hiramatsu , Srikar Dronamraju Subject: Re: [PATCH] uprobe: add support for overlayfs Message-Id: <20180411111322.14b5a21ea61ad968f8375427@kernel.org> In-Reply-To: <20180410200059.731d87fe@gandalf.local.home> References: <20180410231030.2720-1-hmclauchlan@fb.com> <20180410200059.731d87fe@gandalf.local.home> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 10 Apr 2018 20:00:59 -0400 Steven Rostedt wrote: > On Tue, 10 Apr 2018 16:10:30 -0700 > Howard McLauchlan wrote: > > > uprobes cannot successfully attach to binaries located in a directory > > mounted with overlayfs. > > > > To verify, create directories for mounting overlayfs > > (upper,lower,work,merge), move some binary into merge/ and use readelf > > to obtain some known instruction of the binary. I used /bin/true and the > > entry instruction(0x13b0): > > > > $ mount -t overlay overlay -o lowerdir=lower,upperdir=upper,workdir=work merge > > $ cd /sys/kernel/debug/tracing > > $ echo 'p:true_entry PATH_TO_MERGE/merge/true:0x13b0' > uprobe_events > > $ echo 1 > events/uprobes/true_entry/enable > > > > This returns 'bash: echo: write error: Input/output error' and dmesg > > tells us 'event trace: Could not enable event true_entry' > > I tried the above and verified that it is a problem and your patch > solves it. > > Thanks, I'll apply it and start my tests on it. This looks good to me. Reviewed-by: Masami Hiramatsu Thanks! > > -- Steve > > > > > This change makes create_trace_uprobe() look for the real inode of a > > dentry. In the case of normal filesystems, this simplifies to just > > returning the inode. In the case of overlayfs(and similar fs) we will > > obtain the underlying dentry and corresponding inode, upon which uprobes > > can successfully register. > > > > Running the example above with the patch applied, we can see that the > > uprobe is enabled and will output to trace as expected. > > > > Reviewed-by: Josef Bacik > > Signed-off-by: Howard McLauchlan > > --- > > kernel/trace/trace_uprobe.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c > > index 2014f4351ae0..17c65fa4136d 100644 > > --- a/kernel/trace/trace_uprobe.c > > +++ b/kernel/trace/trace_uprobe.c > > @@ -446,7 +446,7 @@ static int create_trace_uprobe(int argc, char **argv) > > if (ret) > > goto fail_address_parse; > > > > - inode = igrab(d_inode(path.dentry)); > > + inode = igrab(d_real_inode(path.dentry)); > > path_put(&path); > > > > if (!inode || !S_ISREG(inode->i_mode)) { > -- Masami Hiramatsu