Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp2594550imc; Sat, 23 Feb 2019 06:50:01 -0800 (PST) X-Google-Smtp-Source: AHgI3IacYvgx07zsXAu+FeHZc/vDwXakyUb0aEwde8+BD7wydZYmSGuY+sf9xGSMJBUhfEVpDpb3 X-Received: by 2002:aa7:8c8c:: with SMTP id p12mr10088554pfd.0.1550933401834; Sat, 23 Feb 2019 06:50:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550933401; cv=none; d=google.com; s=arc-20160816; b=WTOVH3KF1RZouDZeLCe+cq5x0h8nJansZo6p8Kyk6xNdYPoldXh+YlG0+pJM+IAYUi rzlUVnDRNseYw80bivUeuvNmTSGZXzavEiTCYdCjUaH7YUz6dbHtrDH69FSURrXelX5S eonOQ5lRFGOtGNaUl9zANzFXVpVQGsCYswZgHv0YFnxb6B5NgxRznECivULy/ltLncfq WgfIIFj5lcBycHq3A5FweOjTiRMgkZ+MjAMOrKMLj0oB4E3MuCxo6isUpcAJ9/Y/XLeN 6tnrlu5iPXGSuc4hqBwFPRcknYKFW6RMj3dX0pgB6eWX7I5xeHPZgNj3knwFxTXS06C5 D7AA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=nq/pZc9nIl0uMJRy2Ahg2whJHSv377xPHiVYW39U6Gg=; b=cvHjb3E9knxTsOkIfqlQl1Mjpx5JkVFn2mpjJ+d/W9fz7ALQTqTj8WZpyFNwNvtl+C 8rrx5U/KZ5mf0kc6T3rampEeSBfJE4ydRZTIRL2GDaF0oeaHrumoyezpshkSnOr0vkUR GjofbOikyyraJeGmvpeh7VNyOWgsGoxky5r/uJ0/0RA9DEPc3jnSgYa01UCtCtzTeq32 pHJz/mPN+UbdGiQU2SHP69Iqy2Qy2cEk4Q8yuAoQuWDNYis1kbp3YvX6aHmcUuuJsa6x OSWSVai4z5hR1dKtxHqY0G1/+y/RKnXXHIER2wq153J+MV/lpRts3zWy64amtKxHegpQ 4ABA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PypviNti; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h18si3896303pgj.479.2019.02.23.06.49.31; Sat, 23 Feb 2019 06:50:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PypviNti; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727704AbfBWOs5 (ORCPT + 99 others); Sat, 23 Feb 2019 09:48:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:56518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725859AbfBWOs4 (ORCPT ); Sat, 23 Feb 2019 09:48:56 -0500 Received: from devnote (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A298620665; Sat, 23 Feb 2019 14:48:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550933335; bh=iglcbKS5NTULXRq/WapoeaKRwlnoPTqOgMISBK4srjM=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=PypviNtiC89kNNGocLqhFShzyUELgismwtA74WTUWqKn/xXSPpEf0ebUmGhGQLhCX 2AqtpbHEeRLK4bqFRSsKrRBJ1namzEd5RAgTXDqr7NCxmfZWsUIpkdndgYKs2KLUfc 7NlPV6UND4oDXGgWrR4Z0g9zNFRp6TF+ucO0IlXo= Date: Sat, 23 Feb 2019 23:48:52 +0900 From: Masami Hiramatsu To: Masami Hiramatsu Cc: Steven Rostedt , linux-kernel@vger.kernel.org, Linus Torvalds , Ingo Molnar , Andrew Morton , stable@vger.kernel.org, Changbin Du Subject: Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault Message-Id: <20190223234852.1a1df1b93ca6045b94c69b26@kernel.org> In-Reply-To: <20190221165252.4a9033b3348f30f9d973dbc4@kernel.org> References: <20190215174712.372898450@goodmis.org> <20190215174945.557218316@goodmis.org> <20190221165252.4a9033b3348f30f9d973dbc4@kernel.org> X-Mailer: Sylpheed 3.5.0 (GTK+ 2.24.30; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Thu, 21 Feb 2019 16:52:52 +0900 Masami Hiramatsu wrote: > > --- > > kernel/trace/trace_kprobe.c | 10 +--------- > > 1 file changed, 1 insertion(+), 9 deletions(-) > > > > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > > index d5fb09ebba8b..9eaf07f99212 100644 > > --- a/kernel/trace/trace_kprobe.c > > +++ b/kernel/trace/trace_kprobe.c > > @@ -861,22 +861,14 @@ static const struct file_operations kprobe_profile_ops = { > > static nokprobe_inline int > > fetch_store_strlen(unsigned long addr) > > { > > - mm_segment_t old_fs; > > int ret, len = 0; > > u8 c; > > > > - old_fs = get_fs(); > > - set_fs(KERNEL_DS); > > - pagefault_disable(); > > - BTW, compared with probe_kernel_read() implementation, this function lacks current->kernel_uaccess_faults_ok modification here. I would like to know whether we can avoid this issue if we tweak this flag. Thank you, > > do { > > - ret = __copy_from_user_inatomic(&c, (u8 *)addr + len, 1); > > + ret = probe_mem_read(&c, (u8 *)addr + len, 1); > > len++; > > } while (c && ret == 0 && len < MAX_STRING_SIZE); > > > > - pagefault_enable(); > > - set_fs(old_fs); > > - > > return (ret < 0) ? ret : len; > > } > > > > -- > > 2.20.1 > > > > > > > -- > Masami Hiramatsu -- Masami Hiramatsu