Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp193570imm; Thu, 12 Jul 2018 17:10:47 -0700 (PDT) X-Google-Smtp-Source: AAOMgpe7n0oG+33wf8H93vbbARHicCjV0TZ/S2rAUlh9qIkECmzT5gABXIAURbD8LEhXOHgQmymf X-Received: by 2002:a65:4888:: with SMTP id n8-v6mr3998278pgs.149.1531440647571; Thu, 12 Jul 2018 17:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531440647; cv=none; d=google.com; s=arc-20160816; b=N1FLKlHOFVph9f6EN/PTgEQeiOK6GilepU96DH647In6IaYzL6tT7i3EcJVKBsOSpq yy5Le9usqgSodO4kuGpsSFGP7pFy9sIETSaJimfs0mpvVmQQOwIFEiMy7LLnmQw9Fk+t bmZeAcsjPdO8QylLfTBmKbDtRcJ52+73WYTXZv7BJQyYf3RAi2RDt3W4tTbyNdRJbpzw qeD7ELucdk/AB1loZ93cRbM2hD9WQTADsJhYCZNiV/6eCT9Qo5RGHiO8+M+sVZtTtxnH 3O0mv2ZuJd3PTqf4Zeyw0R0S+u8wWtLCAdnTjvcPN3C3cr1i76atT8FYt/7ACkdZ+2Ay 6Rvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=hqXOv/pQAA2Y4p7P/OejUXRLzoNG+pGHVAE0o7PbajM=; b=x5ihd/8MAuIxSdWIiXxFMeAusPgtYqhRkBErN6WHA/5q6ro55nZjSZn2tnQBbA8kNO ukn4Ybq5wI3S2iii5c/lsdU2eZlyfgdh2THlBN+dT8iQLZGIJ7xUYeq1A0cb7ZUGNvYl YCpCr1To4brDvC2vlsAmIb0+aKwMWmFVi9RTTw6Igthiglg3cymiGdIYAYpmFwX4ux0q Cj8zAHeX2G78vIyBv+E3UuRjTGhu5G/+gPxm12ys0pjDYQMYRXE77O/ro5FDPimWlQ28 r9MzJZrcYPry/oV+LDnrfRaqHGsUary6dcP9VDGhCVTs1TkbgC35pMX6nsMvAhhHW8of UIwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@osandov-com.20150623.gappssmtp.com header.s=20150623 header.b=FsTCA8Kr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 65-v6si4650222pld.451.2018.07.12.17.10.32; Thu, 12 Jul 2018 17:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@osandov-com.20150623.gappssmtp.com header.s=20150623 header.b=FsTCA8Kr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387866AbeGMAVw (ORCPT + 99 others); Thu, 12 Jul 2018 20:21:52 -0400 Received: from mail-pl0-f66.google.com ([209.85.160.66]:33089 "EHLO mail-pl0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387765AbeGMAVv (ORCPT ); Thu, 12 Jul 2018 20:21:51 -0400 Received: by mail-pl0-f66.google.com with SMTP id 6-v6so11355510plb.0 for ; Thu, 12 Jul 2018 17:09:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=osandov-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=hqXOv/pQAA2Y4p7P/OejUXRLzoNG+pGHVAE0o7PbajM=; b=FsTCA8KrAlN3BGjPmGmoCXJR9MuTliR+buoJ4u/ZLctvVfzvXLlkrsaysbzz1FoyZn tCv7CcpYC6IPDTUV7lLoZYvcotCSFnHOrGBlfJhwftSkbhJ3VUth7HAhPPfNFoyrCVBi mVxTSEHvN2F+Ix0uReL7Je9aqPAOr/Vh63QudD1f/EoA23nfSP4lds6evxV7SVrNsE7W ffHscHsF8OyJSihTXxtMOFAdcOYELeiPUuxLDTPyrrO6WdiUcbA3TIXxRY73wWsCJuD+ ++xpea5T4CVRdeORnPzbw+M2bmIYzBADuuHiSbUqVjjShC6hhnVpreNVMHKGvuFYJyDu AWgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=hqXOv/pQAA2Y4p7P/OejUXRLzoNG+pGHVAE0o7PbajM=; b=OwnSUOsPlKn2G7GUhSVrT+k1InXXA0QbryZ3OVohXodtYWzpVdHqCjNdys12nQnqxG YSHEeTWhwIpkH/Ws6jnTVN2sfNoXBzScZ3ZhEC3E8TnaJM7YXdgj9An6Y5MohuatDTIH WllpQf/BqPB7DxpNiODbBPElGxCWrHto1rLoJ+JB6o4KzQ3/IvW8Ou2YW9tmWmCjXIDZ nIQyr1pCQRc/Dg9cVDI8sq5WlRo/tpA7pX5w5YkV+d28vDTQ/vGbVZcf56bicjZPwToy o4vzqhxnHLpd5Myp0joKGMMYgHc3y35RRpDqT1v4Q/j9r8UDRrWjls2Djl7/LBbXi8rz Dqqw== X-Gm-Message-State: AOUpUlHNlBx1elhFkXeTmnS4VIppnZ8cCfIf+vzi55dberpQfNo0GJRa 2nA+vZEspswaVvoOCe3esteW814206w= X-Received: by 2002:a17:902:4a0c:: with SMTP id w12-v6mr4133472pld.289.1531440593539; Thu, 12 Jul 2018 17:09:53 -0700 (PDT) Received: from vader.thefacebook.com ([2620:10d:c090:200::5:74a0]) by smtp.gmail.com with ESMTPSA id b86-v6sm4452067pfj.35.2018.07.12.17.09.52 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 12 Jul 2018 17:09:52 -0700 (PDT) From: Omar Sandoval To: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrew Morton Cc: Alexey Dobriyan , Eric Biederman , James Morse , Bhupesh Sharma , kernel-team@fb.com Subject: [PATCH v2 7/7] proc/kcore: add vmcoreinfo note to /proc/kcore Date: Thu, 12 Jul 2018 17:09:39 -0700 Message-Id: <19c55add0fd15854798dde00d93350d76034896d.1531440458.git.osandov@fb.com> X-Mailer: git-send-email 2.18.0 In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Omar Sandoval The vmcoreinfo information is useful for runtime debugging tools, not just for crash dumps. A lot of this information can be determined by other means, but this is much more convenient. Signed-off-by: Omar Sandoval --- fs/proc/Kconfig | 1 + fs/proc/kcore.c | 18 ++++++++++++++++-- include/linux/crash_core.h | 2 ++ kernel/crash_core.c | 4 ++-- 4 files changed, 21 insertions(+), 4 deletions(-) diff --git a/fs/proc/Kconfig b/fs/proc/Kconfig index 0eaeb41453f5..817c02b13b1d 100644 --- a/fs/proc/Kconfig +++ b/fs/proc/Kconfig @@ -31,6 +31,7 @@ config PROC_FS config PROC_KCORE bool "/proc/kcore support" if !ARM depends on PROC_FS && MMU + select CRASH_CORE help Provides a virtual ELF core file of the live kernel. This can be read with gdb and other ELF tools. No modifications can be diff --git a/fs/proc/kcore.c b/fs/proc/kcore.c index d1b875afc359..bef78923b387 100644 --- a/fs/proc/kcore.c +++ b/fs/proc/kcore.c @@ -10,6 +10,7 @@ * Safe accesses to vmalloc/direct-mapped discontiguous areas, Kanoj Sarcar */ +#include #include #include #include @@ -81,10 +82,13 @@ static size_t get_kcore_size(int *nphdr, size_t *phdrs_len, size_t *notes_len, } *phdrs_len = *nphdr * sizeof(struct elf_phdr); - *notes_len = (3 * (sizeof(struct elf_note) + ALIGN(sizeof(CORE_STR), 4)) + + *notes_len = (4 * sizeof(struct elf_note) + + 3 * ALIGN(sizeof(CORE_STR), 4) + + VMCOREINFO_NOTE_NAME_BYTES + ALIGN(sizeof(struct elf_prstatus), 4) + ALIGN(sizeof(struct elf_prpsinfo), 4) + - ALIGN(arch_task_struct_size, 4)); + ALIGN(arch_task_struct_size, 4) + + ALIGN(vmcoreinfo_size, 4)); *data_offset = PAGE_ALIGN(sizeof(struct elfhdr) + *phdrs_len + *notes_len); return *data_offset + size; @@ -406,6 +410,16 @@ read_kcore(struct file *file, char __user *buffer, size_t buflen, loff_t *fpos) sizeof(prpsinfo)); append_kcore_note(notes, &i, CORE_STR, NT_TASKSTRUCT, current, arch_task_struct_size); + /* + * vmcoreinfo_size is mostly constant after init time, but it + * can be changed by crash_save_vmcoreinfo(). Racing here with a + * panic on another CPU before the machine goes down is insanely + * unlikely, but it's better to not leave potential buffer + * overflows lying around, regardless. + */ + append_kcore_note(notes, &i, VMCOREINFO_NOTE_NAME, 0, + vmcoreinfo_data, + min(vmcoreinfo_size, notes_len - i)); tsz = min_t(size_t, buflen, notes_offset + notes_len - *fpos); if (copy_to_user(buffer, notes + *fpos - notes_offset, tsz)) { diff --git a/include/linux/crash_core.h b/include/linux/crash_core.h index b511f6d24b42..525510a9f965 100644 --- a/include/linux/crash_core.h +++ b/include/linux/crash_core.h @@ -60,6 +60,8 @@ phys_addr_t paddr_vmcoreinfo_note(void); #define VMCOREINFO_CONFIG(name) \ vmcoreinfo_append_str("CONFIG_%s=y\n", #name) +extern unsigned char *vmcoreinfo_data; +extern size_t vmcoreinfo_size; extern u32 *vmcoreinfo_note; Elf_Word *append_elf_note(Elf_Word *buf, char *name, unsigned int type, diff --git a/kernel/crash_core.c b/kernel/crash_core.c index b66aced5e8c2..d02c58b94460 100644 --- a/kernel/crash_core.c +++ b/kernel/crash_core.c @@ -14,8 +14,8 @@ #include /* vmcoreinfo stuff */ -static unsigned char *vmcoreinfo_data; -static size_t vmcoreinfo_size; +unsigned char *vmcoreinfo_data; +size_t vmcoreinfo_size; u32 *vmcoreinfo_note; /* trusted vmcoreinfo, e.g. we can make a copy in the crash memory */ -- 2.18.0