Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1363887imm; Wed, 25 Jul 2018 17:01:48 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfgVJXLdXr8oiU5cXz4sg4yQyRemZqdJviYkClzW67wNDx6W+5zIgwWuZBB2ykU1JBBZCC4 X-Received: by 2002:a62:c288:: with SMTP id w8-v6mr24182370pfk.92.1532563308834; Wed, 25 Jul 2018 17:01:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532563308; cv=none; d=google.com; s=arc-20160816; b=y6Uufqu7G9EFbaQ1kmDjCNMmsLdsziPnd+vMTmLkr895wMYEzlactNlzggWIYFuvZv EetZZaNGU4nFAg5NS8As5NpnG5qHBr8BoqjGET4WQXLpAcUu8OX5jVFNOCO49DinZilg xIYH5XahyYyBpRsJLxVX/jQLPgmexp15b+3tSW8E/GQbrlVyopjMvPGRKxSZ1nCeA4AK P7PpyIgXz5LDF2Ygo3d4Lg6dNKG2vFOg+NLqmVz3s60swTO2mOj/tFb7Dje9SJmgru7v Y3sArJjUg8z1rmTzSOqkGf57RJs+uUIBq+hl/tPDAc6JC18ojaFAv0vevPddnEIrkvYk xsHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=DoMV7TytVt090kzod3DGVHCSv6oSSVhrF14RLi5zS0Q=; b=ExmFrDRg+7mgggO1sWQeXSzff/tnEGimL/ZCgHQJn/zAGVjRXPzeD4A1ydwWShTBkH VTuoMFdNk72/RNbgc1cev8jeZiorEeQeV9+hotoFOnMs06RbcbN7uAhVKJqs+kWQdGfv Lv17wnwA23oQmEYA4fMfuS8R+Rlcib8q0LE3Q2X7HnjQxbzjHaUpvV1fq/NIyZUvO75F GupX8CywRU3vCeFNIlZPxVIOmVtn50s/v96eac5MdWC6W5hRUAgCION4EPFyH9yWoBjF e87RJkzbXTVUnYOj51AxrZJ39Xv7HQmjlthMty2zUNx+zlWM44kgvvYGGSZOLQxCzV0Y D+tA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@osandov-com.20150623.gappssmtp.com header.s=20150623 header.b=P1sFx1vY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m4-v6si14777117pll.461.2018.07.25.17.01.34; Wed, 25 Jul 2018 17:01:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@osandov-com.20150623.gappssmtp.com header.s=20150623 header.b=P1sFx1vY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728737AbeGZBNp (ORCPT + 99 others); Wed, 25 Jul 2018 21:13:45 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:33959 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728673AbeGZBNm (ORCPT ); Wed, 25 Jul 2018 21:13:42 -0400 Received: by mail-pf1-f193.google.com with SMTP id k19-v6so2200653pfi.1 for ; Wed, 25 Jul 2018 16:59:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=osandov-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=DoMV7TytVt090kzod3DGVHCSv6oSSVhrF14RLi5zS0Q=; b=P1sFx1vYYkdRIyMcY55Bpnb8HMNJbzetxAaR2/WZKLYWP8zUgBAYpknQJjCy6U3UmG zfBPSnj+b00gUNwZCj8jblaxSQJnVYtzwvnGFGGCUFhZugPD3nBYHrq3FWvMjZU+d2T/ y9lgD5ZwxKxJhiV7Aa+eqpW33hQUlQudAnbl3MrdyZZrygje1nnKdWlU6gV4XbZsbZZp +FeSUribSeZR1xuVVDBsZcjzo5uGYiJrSGnViB/lPoaCPfkZy7YbomYUlomYPIe6yPU6 JPi49nff3u3tLmjbRGdTcVICL+cNu8JhJLKl1mPIaRpFoPARjU/dNj9qChCud2GnQIcB 1cZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=DoMV7TytVt090kzod3DGVHCSv6oSSVhrF14RLi5zS0Q=; b=IDeWhL04vCF+G8S12MwBMLqLYkRfglklxQjqSpyw3OgjYfnklFXgwpipTIEPnE0193 Wf6vhQykW1eMPEqpYcsGr9asyRrd2f24abUcfaI/R81MvYIxCwu+6q5GQAJAhq0nJAcA OqRvhPsORng/hW5APgUnoWj0pLOjE1DRtWsOZQW+SZ4xnUNwOn2ws0Imz/5CCxFAjnIS +oUhK+txNodjAfT1jdmXIPNkyt7ar6dgC01DK4PKX9p5q1QlaJgIQwbKFbSYMcd4KMNl u1Kurm8ZBt60yooXmo5KqK+gfUTyPTCQtejn/5Em9KevmipldAOIZbo49dXuadUnzea+ G8Xw== X-Gm-Message-State: AOUpUlHGAqd+2WED8LFWsNUgFAXar2ZyGHpz61Sr5VGOJhzKyoyYzn1l FZuICO7ITjsQPUxdVMRdSZQfsXBo+kM= X-Received: by 2002:a63:524e:: with SMTP id s14-v6mr22814746pgl.35.1532563177747; Wed, 25 Jul 2018 16:59:37 -0700 (PDT) Received: from vader.thefacebook.com ([2620:10d:c090:180::1:8d38]) by smtp.gmail.com with ESMTPSA id 65-v6sm23188753pfq.81.2018.07.25.16.59.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Jul 2018 16:59:37 -0700 (PDT) From: Omar Sandoval To: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrew Morton Cc: Alexey Dobriyan , Eric Biederman , James Morse , Bhupesh Sharma , kernel-team@fb.com Subject: [PATCH v4 9/9] proc/kcore: add vmcoreinfo note to /proc/kcore Date: Wed, 25 Jul 2018 16:59:20 -0700 Message-Id: X-Mailer: git-send-email 2.18.0 In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Omar Sandoval The vmcoreinfo information is useful for runtime debugging tools, not just for crash dumps. A lot of this information can be determined by other means, but this is much more convenient, and it only adds a page at most to the file. Signed-off-by: Omar Sandoval --- fs/proc/Kconfig | 1 + fs/proc/kcore.c | 18 ++++++++++++++++-- include/linux/crash_core.h | 2 ++ kernel/crash_core.c | 4 ++-- 4 files changed, 21 insertions(+), 4 deletions(-) diff --git a/fs/proc/Kconfig b/fs/proc/Kconfig index 0eaeb41453f5..817c02b13b1d 100644 --- a/fs/proc/Kconfig +++ b/fs/proc/Kconfig @@ -31,6 +31,7 @@ config PROC_FS config PROC_KCORE bool "/proc/kcore support" if !ARM depends on PROC_FS && MMU + select CRASH_CORE help Provides a virtual ELF core file of the live kernel. This can be read with gdb and other ELF tools. No modifications can be diff --git a/fs/proc/kcore.c b/fs/proc/kcore.c index 758c14e46a44..80464432dfe6 100644 --- a/fs/proc/kcore.c +++ b/fs/proc/kcore.c @@ -10,6 +10,7 @@ * Safe accesses to vmalloc/direct-mapped discontiguous areas, Kanoj Sarcar */ +#include #include #include #include @@ -81,10 +82,13 @@ static size_t get_kcore_size(int *nphdr, size_t *phdrs_len, size_t *notes_len, } *phdrs_len = *nphdr * sizeof(struct elf_phdr); - *notes_len = (3 * (sizeof(struct elf_note) + ALIGN(sizeof(CORE_STR), 4)) + + *notes_len = (4 * sizeof(struct elf_note) + + 3 * ALIGN(sizeof(CORE_STR), 4) + + VMCOREINFO_NOTE_NAME_BYTES + ALIGN(sizeof(struct elf_prstatus), 4) + ALIGN(sizeof(struct elf_prpsinfo), 4) + - ALIGN(arch_task_struct_size, 4)); + ALIGN(arch_task_struct_size, 4) + + ALIGN(vmcoreinfo_size, 4)); *data_offset = PAGE_ALIGN(sizeof(struct elfhdr) + *phdrs_len + *notes_len); return *data_offset + size; @@ -406,6 +410,16 @@ read_kcore(struct file *file, char __user *buffer, size_t buflen, loff_t *fpos) sizeof(prpsinfo)); append_kcore_note(notes, &i, CORE_STR, NT_TASKSTRUCT, current, arch_task_struct_size); + /* + * vmcoreinfo_size is mostly constant after init time, but it + * can be changed by crash_save_vmcoreinfo(). Racing here with a + * panic on another CPU before the machine goes down is insanely + * unlikely, but it's better to not leave potential buffer + * overflows lying around, regardless. + */ + append_kcore_note(notes, &i, VMCOREINFO_NOTE_NAME, 0, + vmcoreinfo_data, + min(vmcoreinfo_size, notes_len - i)); tsz = min_t(size_t, buflen, notes_offset + notes_len - *fpos); if (copy_to_user(buffer, notes + *fpos - notes_offset, tsz)) { diff --git a/include/linux/crash_core.h b/include/linux/crash_core.h index b511f6d24b42..525510a9f965 100644 --- a/include/linux/crash_core.h +++ b/include/linux/crash_core.h @@ -60,6 +60,8 @@ phys_addr_t paddr_vmcoreinfo_note(void); #define VMCOREINFO_CONFIG(name) \ vmcoreinfo_append_str("CONFIG_%s=y\n", #name) +extern unsigned char *vmcoreinfo_data; +extern size_t vmcoreinfo_size; extern u32 *vmcoreinfo_note; Elf_Word *append_elf_note(Elf_Word *buf, char *name, unsigned int type, diff --git a/kernel/crash_core.c b/kernel/crash_core.c index e7b4025c7b24..a683bfb0530f 100644 --- a/kernel/crash_core.c +++ b/kernel/crash_core.c @@ -14,8 +14,8 @@ #include /* vmcoreinfo stuff */ -static unsigned char *vmcoreinfo_data; -static size_t vmcoreinfo_size; +unsigned char *vmcoreinfo_data; +size_t vmcoreinfo_size; u32 *vmcoreinfo_note; /* trusted vmcoreinfo, e.g. we can make a copy in the crash memory */ -- 2.18.0