Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp7317915rwi; Mon, 24 Oct 2022 12:53:12 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4WdEhc87ooFNqzGJIrFnt4AbP/wmrpm1bMqxIt07IKyNNSFdZftM/c+XHBxBqAp2T5MYj9 X-Received: by 2002:a17:906:dac3:b0:780:a242:2f14 with SMTP id xi3-20020a170906dac300b00780a2422f14mr27977730ejb.668.1666641192404; Mon, 24 Oct 2022 12:53:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666641192; cv=none; d=google.com; s=arc-20160816; b=mPmzbieEJfIoA3XkZy41jRQLd1HTLfFkuaFHbUamANky2Y1anl9mOE7nfkfSLC7dc8 BK+D0hXyBbnNt018v75c8jkmmfibED+IxwLkxO+/bkK9AlYvmFgt7Lw3JxYKjozJP65g 3Z1w9Ex28ljn9m5i8+ihaptwWVFFJCyAmqGh6niVwygFufazGOrI79c2Vx9lbW21C0pL TGWsHs2tGxQCCyLNW1UZ5/uXofQXWS90r9FYCKqvSRYScFGCzxi4iDXLT68HriVl7pYa 1uUy+3Ohf2ORAdAAkGhf7jQnVv1JjxBie4YPDwkCkK2P8AUnKHrdw2Kgfza6cvlo3gPU CX+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ih/K2NUmVLF3iW/uqIxyeNeXFamF3KjqXdHGTKCImpE=; b=Q3bf6uHK8lVNqpZrrB2O5Io9e3w8mK6fq/e2Hr35LtLlbgqExQgCaV9QoKmC+3Y03L O4HmBhzLALaHLoPKex+rPC+8Yl1fRKzU5BszPQpZhy2zjafBgD9leeKT5KlTn9R5gXeD MNlg7C4gylcGVd/Nj6zioNt+hOmNljPp2ECUteckIbO8LLVMYQX/rEgyxEIRASFMBdKa ovdy50iehvgW8AzuzGZbh6x6c4i3wmdrumi4zf7f3qlb6UtsYlBpss1OvDSXE+NHKHnK G7w9JDy0mYrhwRwlYYl4IQW/84514vk/In4iMu7V1c2bkChjXnBAIy3AttpqI/BTj15p So1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Lkk6hxfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qk6-20020a1709077f8600b0078db71898f2si531876ejc.851.2022.10.24.12.52.43; Mon, 24 Oct 2022 12:53:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Lkk6hxfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232745AbiJXTp5 (ORCPT + 99 others); Mon, 24 Oct 2022 15:45:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48528 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231286AbiJXTnT (ORCPT ); Mon, 24 Oct 2022 15:43:19 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E1E6D8F70; Mon, 24 Oct 2022 11:11:52 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 26AC8B818D4; Mon, 24 Oct 2022 12:38:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7A2D1C43142; Mon, 24 Oct 2022 12:38:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1666615085; bh=a6b1NSqvH/b6gAlJZYFh0Q5qf/RCTEE7cuX29pmcyhM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Lkk6hxfPEwMTmn9CODMHCKxhGUNzocfNQEsinpTlkkWqqrm16+MULxi039R6WVlQJ eKmRIzEFdx73xmZyU38V52NtUVCL+DQJBuGoznCC1wdvJ7pOA9ukFo9ZaopEOevsEV +hzTSqwv+y+E4GBb0/ivvkJAKqCCRw50ryTc6Zes= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrew Morton , Tom Zanussi , "Masami Hiramatsu (Google)" , "Steven Rostedt (Google)" Subject: [PATCH 5.15 116/530] tracing: Add "(fault)" name injection to kernel probes Date: Mon, 24 Oct 2022 13:27:40 +0200 Message-Id: <20221024113050.287827419@linuxfoundation.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20221024113044.976326639@linuxfoundation.org> References: <20221024113044.976326639@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (Google) commit 2e9906f84fc7c99388bb7123ade167250d50f1c0 upstream. Have the specific functions for kernel probes that read strings to inject the "(fault)" name directly. trace_probes.c does this too (for uprobes) but as the code to read strings are going to be used by synthetic events (and perhaps other utilities), it simplifies the code by making sure those other uses do not need to implement the "(fault)" name injection as well. Link: https://lkml.kernel.org/r/20221012104534.644803645@goodmis.org Cc: stable@vger.kernel.org Cc: Andrew Morton Cc: Tom Zanussi Acked-by: Masami Hiramatsu (Google) Reviewed-by: Tom Zanussi Fixes: bd82631d7ccdc ("tracing: Add support for dynamic strings to synthetic events") Signed-off-by: Steven Rostedt (Google) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace_probe_kernel.h | 31 +++++++++++++++++++++++++------ 1 file changed, 25 insertions(+), 6 deletions(-) --- a/kernel/trace/trace_probe_kernel.h +++ b/kernel/trace/trace_probe_kernel.h @@ -2,6 +2,8 @@ #ifndef __TRACE_PROBE_KERNEL_H_ #define __TRACE_PROBE_KERNEL_H_ +#define FAULT_STRING "(fault)" + /* * This depends on trace_probe.h, but can not include it due to * the way trace_probe_tmpl.h is used by trace_kprobe.c and trace_eprobe.c. @@ -13,8 +15,16 @@ static nokprobe_inline int kern_fetch_store_strlen_user(unsigned long addr) { const void __user *uaddr = (__force const void __user *)addr; + int ret; - return strnlen_user_nofault(uaddr, MAX_STRING_SIZE); + ret = strnlen_user_nofault(uaddr, MAX_STRING_SIZE); + /* + * strnlen_user_nofault returns zero on fault, insert the + * FAULT_STRING when that occurs. + */ + if (ret <= 0) + return strlen(FAULT_STRING) + 1; + return ret; } /* Return the length of string -- including null terminal byte */ @@ -34,7 +44,18 @@ kern_fetch_store_strlen(unsigned long ad len++; } while (c && ret == 0 && len < MAX_STRING_SIZE); - return (ret < 0) ? ret : len; + /* For faults, return enough to hold the FAULT_STRING */ + return (ret < 0) ? strlen(FAULT_STRING) + 1 : len; +} + +static nokprobe_inline void set_data_loc(int ret, void *dest, void *__dest, void *base, int len) +{ + if (ret >= 0) { + *(u32 *)dest = make_data_loc(ret, __dest - base); + } else { + strscpy(__dest, FAULT_STRING, len); + ret = strlen(__dest) + 1; + } } /* @@ -55,8 +76,7 @@ kern_fetch_store_string_user(unsigned lo __dest = get_loc_data(dest, base); ret = strncpy_from_user_nofault(__dest, uaddr, maxlen); - if (ret >= 0) - *(u32 *)dest = make_data_loc(ret, __dest - base); + set_data_loc(ret, dest, __dest, base, maxlen); return ret; } @@ -87,8 +107,7 @@ kern_fetch_store_string(unsigned long ad * probing. */ ret = strncpy_from_kernel_nofault(__dest, (void *)addr, maxlen); - if (ret >= 0) - *(u32 *)dest = make_data_loc(ret, __dest - base); + set_data_loc(ret, dest, __dest, base, maxlen); return ret; }