Received: by 10.192.165.156 with SMTP id m28csp1227547imm; Wed, 18 Apr 2018 06:23:13 -0700 (PDT) X-Google-Smtp-Source: AIpwx49DrnulwqFHasXy8g9b8aoEFfrkxMO86ylO4rZwiCDh31oTkaIttybLP7cGjK0SJB9ZarQc X-Received: by 2002:a17:902:5609:: with SMTP id h9-v6mr2115824pli.121.1524057793694; Wed, 18 Apr 2018 06:23:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524057793; cv=none; d=google.com; s=arc-20160816; b=jZgNBXMl1E1qvhhFXwNYP9PL+Uxq6cEtlHHUECtf0SUeLAvkbITT8ZqkxMTxT6Ixh4 PdXZwUlhMLgO3NN8xYwCPA2hvdR2gOmnqvq4gxgcu1dHYdAxxfO9viYVKi1ut6cbxwWE XekelaN+4G/8NIIrSIzRDAsiAbcRZCzS8zoOVr9y3XGxB0aTBaDNArUFlNUEHwKGljlW X3TpKSTPQqEhu9S/fdSkXgB9u3NDyt4wycikYXObPGEU2dXTC0APUwVMpMEEnSi2EY4y N37/eGnbg+RlLYhkHhpl4+ocQJBSKGQFpAg75Cq77poOOzWJa9FjSEIH3SwfRX23wg/s 7nsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=iLe4NoH7L+FCytR3iphxVvnUR9PYhK379/0xN1mjKbE=; b=L46cESGqDoXfeJv9QzwmasE/1mJcZeN+bTbKCdfKBVe8/bRXqDuSnzRrH9nz7laub/ iEr+Fn15JhyyTVxvDP65xPfJTZtUFrxKFM01UEFZpFQnri4regHUEprIbrSBNNDzJwyR 2IDZjSBvfxry1x3Kg0dIHgS5LIP4+UJFq9Aw8CFHklJ24glTaB3V4yuLq9nl8DPtFRxZ l/c+1U3gKnlAm0vtMXI9z4Yxbh+mnXvdHwW/Q1EGcxHuzTJFtLxnoFV/3XSa1nGj5gRm Kh+UPFTXLv/nuuoegadH/XmGIjUsKHmT6lYTHYvAhXy+wzPVoMJxMl7PE4uanFhljG5P a2Cg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n3-v6si1212700plb.147.2018.04.18.06.22.59; Wed, 18 Apr 2018 06:23:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753729AbeDRNVq (ORCPT + 99 others); Wed, 18 Apr 2018 09:21:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:59166 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752617AbeDRNVo (ORCPT ); Wed, 18 Apr 2018 09:21:44 -0400 Received: from redbean (ip5f5adbf3.dynamic.kabel-deutschland.de [95.90.219.243]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D28C2077A; Wed, 18 Apr 2018 13:21:41 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0D28C2077A Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=jeyu@kernel.org Date: Wed, 18 Apr 2018 15:21:38 +0200 From: Jessica Yu To: Thomas Richter Cc: torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, borntraeger@de.ibm.com, schwidefsky@de.ibm.com, brueckner@linux.vnet.ibm.com, heiko.carstens@de.ibm.com, peterz@infradead.org, acme@kernel.org, me@tobin.cc, keescook@chromium.org, stable@vger.kernel.org Subject: Re: [PATCH v3] module: Fix display of wrong module .text address Message-ID: <20180418132138.4xzgnwi6k3uojghv@redbean> References: <20180418071436.21392-1-tmricht@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20180418071436.21392-1-tmricht@linux.ibm.com> X-OS: Linux redbean 4.15.3-200.fc26.x86_64 x86_64 User-Agent: NeoMutt/20180323 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org +++ Thomas Richter [18/04/18 09:14 +0200]: >Reading file /proc/modules shows the correct address: >[root@s35lp76 ~]# cat /proc/modules | egrep '^qeth_l2' >qeth_l2 94208 1 - Live 0x000003ff80401000 > >and reading file /sys/module/qeth_l2/sections/.text >[root@s35lp76 ~]# cat /sys/module/qeth_l2/sections/.text >0x0000000018ea8363 >displays a random address. > >This breaks the perf tool which uses this address on s390 >to calculate start of .text section in memory. > >Fix this by printing the correct (unhashed) address. > >Thanks to Jessica Yu for helping on this. > >Fixes: ef0010a30935 ("vsprintf: don't use 'restricted_pointer()' when not restricting") >Cc: # v4.15+ >Suggested-by: Linus Torvalds >Signed-off-by: Thomas Richter >Cc: Jessica Yu Thanks for turning this into a real patch. Looks good to me, if Linus wants to take it directly: Acked-by: Jessica Yu Otherwise I can take this up my tree. As Linus mentioned, we should technically be checking the opening task's credentials/capabilities, but converting everything to pass the actual struct seq_file/file to the sysfs show handlers would be fairly painful :/ At least those /sys/module/*/sections/ files are all set to 0400. I think this fix is sufficient for now. >--- > kernel/module.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > >diff --git a/kernel/module.c b/kernel/module.c >index a6e43a5806a1..40b42000bd80 100644 >--- a/kernel/module.c >+++ b/kernel/module.c >@@ -1472,7 +1472,8 @@ static ssize_t module_sect_show(struct module_attribute *mattr, > { > struct module_sect_attr *sattr = > container_of(mattr, struct module_sect_attr, mattr); >- return sprintf(buf, "0x%pK\n", (void *)sattr->address); >+ return sprintf(buf, "0x%px\n", kptr_restrict < 2 ? >+ (void *)sattr->address : NULL); > } > > static void free_sect_attrs(struct module_sect_attrs *sect_attrs) >-- >2.14.3 >