Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1693145ybz; Thu, 23 Apr 2020 04:03:15 -0700 (PDT) X-Google-Smtp-Source: APiQypJz0Y0sGsobluEXSpfKWWFFfmpHaYYI9NtyUeKPENHECwYI9NrX35NpLcCrEO9xR5zH4BqQ X-Received: by 2002:a50:a883:: with SMTP id k3mr2168251edc.198.1587639795793; Thu, 23 Apr 2020 04:03:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587639795; cv=none; d=google.com; s=arc-20160816; b=D1b+e7+8wXl6vd7GfmsPQCKyblvqrYM+IyeRsiebseI7hXya8VT6WWPIESrXOklAeQ NiKVBWIQrD5pbWiEfueq8iq900km6fmLQ6N1IHRGD8KvFSCVfjruPNu6ZRz0etPFmlW2 BX5QZWnAMaE+qwmKPw/BQPkoKYPL7wrwVyAQWlycolTqx3xBqnWDfZT+eEVV0zmlJwrj bshTtiD7LigwCDkZi4amE2pEmDbw04jx+A/E9qQ1sDEnELDMAmfZGv1OOonFzD0buXkF WrmFuSDna6pnGG5a8bHwe9JIkxyVg4JguEYFG+88yO319VXckP0qNIslsYQUU4Kuvcho RaDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VXEXEzdsleaooj85nNgipjj6Vm7XvD6xG230tqEgpMw=; b=NF3/hL2uQjYJoZFAUeJW4ooAUXgnvKDHSCJhspuopGHFosiEimtlvSmyDq62Li2pJX R2mR/HqNKF71Vo7UpM1J3OAE41gJbtbCqbvMNdsQTswHDoH1/NejQENdPMcbdmkfeXbA 4b9L7xt7KM79kOFAIjk4BpID5uExmmakDyecam22EgfG92VcQUzs/Nl/1isqaLs+rbfk f+5E+zXcpABQ3vQWgxKnLgcwJiuT6L/1xZ8cRLz6N5Glglu3sDvzcbc5b+nybzB7OCyN N09yIf6Gp0YTt+Y+ASDnB6VUhFX+qVTDftEQIWRj/F9EYNdyXkxEIJii8H803ncJbhQN JxnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tkhSnUwI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a22si1080621eju.166.2020.04.23.04.02.43; Thu, 23 Apr 2020 04:03:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tkhSnUwI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727930AbgDWLBJ (ORCPT + 99 others); Thu, 23 Apr 2020 07:01:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:50338 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727791AbgDWLBI (ORCPT ); Thu, 23 Apr 2020 07:01:08 -0400 Received: from localhost.localdomain (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 598EF20704; Thu, 23 Apr 2020 11:01:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587639668; bh=HgsNj2H2CWk1JhxVQWo3f0C7WZ/gAljvF34fqPbNRsM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tkhSnUwIAj2E7S1YEXB5tTMiRGYyIOj5LAGrDlJ8/IsdLDlodS28KowfaoXQUc6pH 2T/4E+r9KFbSn5zJzWJl6RfaIVimaHxuXcP8pvnSeDGNXTGsTCnYNWKv5JRAvHmUW2 Gor8SrQIJPGPvfdxogJIMhDYtgIyYRQB1twIMPxQ= From: Masami Hiramatsu To: Arnaldo Carvalho de Melo Cc: Masami Hiramatsu , Jiri Olsa , Namhyung Kim , Linux Kernel Mailing List , stable@vger.kernel.org Subject: [PATCH 1/3] perf-probe: Fix to check blacklist address correctly Date: Thu, 23 Apr 2020 20:01:04 +0900 Message-Id: <158763966411.30755.5882376357738273695.stgit@devnote2> X-Mailer: git-send-email 2.20.1 In-Reply-To: <158763965400.30755.14484569071233923742.stgit@devnote2> References: <158763965400.30755.14484569071233923742.stgit@devnote2> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix to check kprobe blacklist address correctly with relocated address by adjusting debuginfo address. Since the address in the debuginfo is same as objdump, it is different from relocated kernel address with KASLR. Thus, the perf-probe always misses to catch the blacklisted addresses. Without this patch, perf probe can not detect the blacklist addresses on KASLR enabled kernel. ========= # perf probe kprobe_dispatcher Failed to write event: Invalid argument Error: Failed to add events. ========= With this patch, it correctly shows the error message. ========= # perf probe kprobe_dispatcher kprobe_dispatcher is blacklisted function, skip it. Probe point 'kprobe_dispatcher' not found. Error: Failed to add events. ========= Fixes: 9aaf5a5f479b ("perf probe: Check kprobes blacklist when adding new events") Signed-off-by: Masami Hiramatsu Cc: stable@vger.kernel.org --- tools/perf/util/probe-event.c | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/tools/perf/util/probe-event.c b/tools/perf/util/probe-event.c index eea132f512b0..f75df63309be 100644 --- a/tools/perf/util/probe-event.c +++ b/tools/perf/util/probe-event.c @@ -102,7 +102,7 @@ void exit_probe_symbol_maps(void) symbol__exit(); } -static struct ref_reloc_sym *kernel_get_ref_reloc_sym(void) +static struct ref_reloc_sym *kernel_get_ref_reloc_sym(struct map **pmap) { /* kmap->ref_reloc_sym should be set if host_machine is initialized */ struct kmap *kmap; @@ -114,6 +114,10 @@ static struct ref_reloc_sym *kernel_get_ref_reloc_sym(void) kmap = map__kmap(map); if (!kmap) return NULL; + + if (pmap) + *pmap = map; + return kmap->ref_reloc_sym; } @@ -125,7 +129,7 @@ static int kernel_get_symbol_address_by_name(const char *name, u64 *addr, struct map *map; /* ref_reloc_sym is just a label. Need a special fix*/ - reloc_sym = kernel_get_ref_reloc_sym(); + reloc_sym = kernel_get_ref_reloc_sym(NULL); if (reloc_sym && strcmp(name, reloc_sym->name) == 0) *addr = (reloc) ? reloc_sym->addr : reloc_sym->unrelocated_addr; else { @@ -745,6 +749,7 @@ post_process_kernel_probe_trace_events(struct probe_trace_event *tevs, int ntevs) { struct ref_reloc_sym *reloc_sym; + struct map *map; char *tmp; int i, skipped = 0; @@ -753,7 +758,7 @@ post_process_kernel_probe_trace_events(struct probe_trace_event *tevs, return post_process_offline_probe_trace_events(tevs, ntevs, symbol_conf.vmlinux_name); - reloc_sym = kernel_get_ref_reloc_sym(); + reloc_sym = kernel_get_ref_reloc_sym(&map); if (!reloc_sym) { pr_warning("Relocated base symbol is not found!\n"); return -EINVAL; @@ -764,9 +769,13 @@ post_process_kernel_probe_trace_events(struct probe_trace_event *tevs, continue; if (tevs[i].point.retprobe && !kretprobe_offset_is_supported()) continue; - /* If we found a wrong one, mark it by NULL symbol */ + /* + * If we found a wrong one, mark it by NULL symbol. + * Since addresses in debuginfo is same as objdump, we need + * to convert it to addresses on memory. + */ if (kprobe_warn_out_range(tevs[i].point.symbol, - tevs[i].point.address)) { + map__objdump_2mem(map, tevs[i].point.address))) { tmp = NULL; skipped++; } else { @@ -2936,7 +2945,7 @@ static int find_probe_trace_events_from_map(struct perf_probe_event *pev, /* Note that the symbols in the kmodule are not relocated */ if (!pev->uprobes && !pev->target && (!pp->retprobe || kretprobe_offset_is_supported())) { - reloc_sym = kernel_get_ref_reloc_sym(); + reloc_sym = kernel_get_ref_reloc_sym(NULL); if (!reloc_sym) { pr_warning("Relocated base symbol is not found!\n"); ret = -EINVAL;