Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2432350imj; Mon, 18 Feb 2019 06:01:23 -0800 (PST) X-Google-Smtp-Source: AHgI3IYNe9u5GxqSsC/AFO/H+bqqSy+/XQkeSk07o54IYZO+/mKPtGaszeModBUnL2TuOCNPB900 X-Received: by 2002:a63:1ce:: with SMTP id 197mr18875930pgb.47.1550498482952; Mon, 18 Feb 2019 06:01:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550498482; cv=none; d=google.com; s=arc-20160816; b=nsGWh7YOHBnIV6LsMyknT4wRaykqf5c3j4Py9hfRkDGiVkQoFxssU0Ro5A5wSiGgCC ioqYBcXfr6ichXjqCRMB9ITW/oUQGx7nxvKjT9XYrR/vKNNDOMdaEaFRFyOxrpnAPXQb s6sAEYApLQMLphh8rp2CLZHAh3gTA3+KIMUhqLwd7PnXk0vSeSFdn8EiBjbi/1zdCnKU /ExQc8343qsUrw/wQveRZKi9lNCRgbBA4lWZ1adWwm9sXlR2EQ8a4CZ5WVGfuidGzB7W Bm4yjP417iWqmZO8bX1YIr5Efggoi5nUBKuvjLTTOxH5UMIn6sqNx+mzUYN1l+gRH6gJ 7wFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=v/IHS4RN3qsoYpWxiJ8rJFMs8rig5yFz9EDov+5txS4=; b=tCXB7NrAfZFpZQ5zLlx12Cr0nQwRnO9YfLsTbvp4Rl5JauwNFaHhoIOialyiu6VEVP bYVzGNJNZrVh+xcE9VS0G98fFVe9R/1aTv1uRtw6Wed6qX9fTFoJvJuDMtumbYC93JOG nBRNEXbgWDtODrtBRzpCpLDiLTxgn4zkyn3mpmBPi+1Uh/o6PNnsCF2FyC7GoKl1CeRW HrWQMbrWLxH9xvn/z2dk5n7+SpDg3F962pjCgpBFD9TXqtNVJXTUXbNZ1Z0tHMHh9ve1 D9H/u8h1KBoHblc3KuaIHSdZ6r7PpUcCvjvYkQmlqYCF/4Z9WtCFYCr0ZcJpDbTyI2Ky 1i2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mINeBOUY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v11si2378218pfa.238.2019.02.18.06.01.06; Mon, 18 Feb 2019 06:01:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mINeBOUY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388802AbfBROAR (ORCPT + 99 others); Mon, 18 Feb 2019 09:00:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:41410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388795AbfBROAO (ORCPT ); Mon, 18 Feb 2019 09:00:14 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A679A2173C; Mon, 18 Feb 2019 14:00:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498413; bh=0ODa5FK05jcBRZpJG3+axNAfHUTtZRKSbfY+GHfNKyo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mINeBOUYnEv2yqgZMIDtd09dZl6rHoPZ5mmgsjRuEGQ2IfKLMopZNMErhgbDS8q0o E8ZNXrDes4/VeGMnu9QxQsy0KZsMv/IVnadfNPMl1sdGYc3zGDb2Q2btyTyesuER9i dJkLMU55dEia2WNUNlBoJ8Ago9+oeekY9gFOKfK8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ingo Molnar , Masami Hiramatsu , Andreas Ziegler , "Steven Rostedt (VMware)" Subject: [PATCH 4.9 46/58] tracing/uprobes: Fix output for multiple string arguments Date: Mon, 18 Feb 2019 14:44:07 +0100 Message-Id: <20190218133512.108076465@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133508.567416115@linuxfoundation.org> References: <20190218133508.567416115@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andreas Ziegler commit 0722069a5374b904ec1a67f91249f90e1cfae259 upstream. When printing multiple uprobe arguments as strings the output for the earlier arguments would also include all later string arguments. This is best explained in an example: Consider adding a uprobe to a function receiving two strings as parameters which is at offset 0xa0 in strlib.so and we want to print both parameters when the uprobe is hit (on x86_64): $ echo 'p:func /lib/strlib.so:0xa0 +0(%di):string +0(%si):string' > \ /sys/kernel/debug/tracing/uprobe_events When the function is called as func("foo", "bar") and we hit the probe, the trace file shows a line like the following: [...] func: (0x7f7e683706a0) arg1="foobar" arg2="bar" Note the extra "bar" printed as part of arg1. This behaviour stacks up for additional string arguments. The strings are stored in a dynamically growing part of the uprobe buffer by fetch_store_string() after copying them from userspace via strncpy_from_user(). The return value of strncpy_from_user() is then directly used as the required size for the string. However, this does not take the terminating null byte into account as the documentation for strncpy_from_user() cleary states that it "[...] returns the length of the string (not including the trailing NUL)" even though the null byte will be copied to the destination. Therefore, subsequent calls to fetch_store_string() will overwrite the terminating null byte of the most recently fetched string with the first character of the current string, leading to the "accumulation" of strings in earlier arguments in the output. Fix this by incrementing the return value of strncpy_from_user() by one if we did not hit the maximum buffer size. Link: http://lkml.kernel.org/r/20190116141629.5752-1-andreas.ziegler@fau.de Cc: Ingo Molnar Cc: stable@vger.kernel.org Fixes: 5baaa59ef09e ("tracing/probes: Implement 'memory' fetch method for uprobes") Acked-by: Masami Hiramatsu Signed-off-by: Andreas Ziegler Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Masami Hiramatsu Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace_uprobe.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -150,7 +150,14 @@ static void FETCH_FUNC_NAME(memory, stri ret = strncpy_from_user(dst, src, maxlen); if (ret == maxlen) - dst[--ret] = '\0'; + dst[ret - 1] = '\0'; + else if (ret >= 0) + /* + * Include the terminating null byte. In this case it + * was copied by strncpy_from_user but not accounted + * for in ret. + */ + ret++; if (ret < 0) { /* Failed to fetch string */ ((u8 *)get_rloc_data(dest))[0] = '\0';