Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6489278rwb; Mon, 5 Dec 2022 13:08:12 -0800 (PST) X-Google-Smtp-Source: AA0mqf6ns1crQO2RuBz8BAzbStb8VIoLLODsdel7F0PqAS9P4aeSeJHJ1sG8RSsBBjk1lm+sxSuR X-Received: by 2002:a17:90b:2d8b:b0:212:fe4a:c378 with SMTP id sj11-20020a17090b2d8b00b00212fe4ac378mr33104755pjb.82.1670274492494; Mon, 05 Dec 2022 13:08:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670274492; cv=none; d=google.com; s=arc-20160816; b=MWe9ZM7VSsodDGSQFgRqaaA7mhE3/Fx6h7/r+fY1VhfuR6cxtyLJeYMq8bj91szd9a 1XjNXRbsNjs8aUGZo1HHdOcFcInvM46CJrTFM7GAFw6pPkFZvwV4nNEeh4whU9V319BO IC819Wlv3lPYsd4yY4Fv7wX0x16fXQSaD1pzMIUnCvE4AbiU5LnNWQjY8X36KJL40jlb vZ0BRXogqtbuh6D/ooUeCzsolqEdF+V1ytju27zeZWCGjpsgeB2Tp78ybE4UitPj2gUo 6CUqghBVnrsQzOM7+tvB+u2Vgewam2GJuXbjhj5c0uC3HHiVDAFWvHP/r69YW0n0Hf6H z2mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=ucj0phlrsCOCEABbc8SVcAnCMpVQNUXl97uuBXh5AeA=; b=0ufvdgSMc/Jp/0+gxyGXIJx+WGeTil2IKfPoY519BZvboXVPolzdSSA/NCNK5DLGnW R/hyuJVvuhe/az5Fa06vvQbEUL+g2zRl2oWu0qhk0ty3iL7rzXrqmc5XNuTyYgFwBtPS yf06RpZM3bHJmnzul27Iq5N3WaODQ97gaQDEzy6WAV7ZJOvrgxRIQVMfEoXX3n1nX9B6 dSPe8KY7W79+skwr+okEReWnHVO+mJFJmsLWjmb+nu7ScPNqXmqDppP77MDTby9VlbcO FI68wNxdZNYjRVR7ljau/SuyIJzWXbpYMSQm3L+XOgsxxzB9cmqJGkRvP7qGRQi9+vpP Hqgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZpW5UiMS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b3-20020a17090a8c8300b00219a83dc2e7si6866002pjo.170.2022.12.05.13.08.01; Mon, 05 Dec 2022 13:08:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ZpW5UiMS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233820AbiLEVBT (ORCPT + 81 others); Mon, 5 Dec 2022 16:01:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233565AbiLEVA1 (ORCPT ); Mon, 5 Dec 2022 16:00:27 -0500 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0FE78286D5; Mon, 5 Dec 2022 13:00:26 -0800 (PST) Received: from W11-BEAU-MD.localdomain (unknown [76.135.50.127]) by linux.microsoft.com (Postfix) with ESMTPSA id 9192920B83FD; Mon, 5 Dec 2022 13:00:26 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 9192920B83FD DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1670274026; bh=ucj0phlrsCOCEABbc8SVcAnCMpVQNUXl97uuBXh5AeA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZpW5UiMShhFrc1MZzv+BVEtEbMbF09uVJiIJD+xgp6o799MPeXyg/21r7xHGYAqkA fVFvqkEPeO0bgRyAyJ3ObF0WjYJ/jT7fOWK3tJ0+JMkqOv79612p86F9LTguegWQ7t FN9OEDrfsv6ZPGoow58tSuQzaCwAObTLFgjVLa10= From: Beau Belgrave To: rostedt@goodmis.org, mhiramat@kernel.org, mathieu.desnoyers@efficios.com, dcook@linux.microsoft.com, alanau@linux.microsoft.com, brauner@kernel.org, akpm@linux-foundation.org Cc: linux-trace-devel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v5 11/11] tracing/user_events: Limit global user_event count Date: Mon, 5 Dec 2022 13:00:17 -0800 Message-Id: <20221205210017.23440-12-beaub@linux.microsoft.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221205210017.23440-1-beaub@linux.microsoft.com> References: <20221205210017.23440-1-beaub@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Operators want to be able to ensure enough tracepoints exist on the system for kernel components as well as for user components. Since there are only up to 64K events, by default allow up to half to be used by user events. Add a boot parameter (user_events_max=%d) and a kernel sysctl parameter (kernel.user_events_max) to set a global limit that is honored among all groups on the system. This ensures hard limits can be setup to prevent user processes from consuming all event IDs on the system. Signed-off-by: Beau Belgrave --- kernel/trace/trace_events_user.c | 57 ++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) diff --git a/kernel/trace/trace_events_user.c b/kernel/trace/trace_events_user.c index 36def244a755..754942ba92a1 100644 --- a/kernel/trace/trace_events_user.c +++ b/kernel/trace/trace_events_user.c @@ -20,6 +20,7 @@ #include #include #include +#include #include #include "trace.h" #include "trace_dynevent.h" @@ -61,6 +62,12 @@ struct user_event_group { /* Group for init_user_ns mapping, top-most group */ static struct user_event_group *init_group; +/* Max allowed events for the whole system */ +static unsigned int max_user_events = 32768; + +/* Current number of events on the whole system */ +static unsigned int current_user_events; + /* * Stores per-event properties, as users register events * within a file a user_event might be created if it does not @@ -1247,6 +1254,11 @@ static int destroy_user_event(struct user_event *user) kfree(EVENT_NAME(user)); kfree(user); + if (current_user_events > 0) + current_user_events--; + else + pr_alert("BUG: Bad current_user_events\n"); + return ret; } @@ -1732,6 +1744,11 @@ static int user_event_parse(struct user_event_group *group, char *name, mutex_lock(&event_mutex); + if (current_user_events >= max_user_events) { + ret = -EMFILE; + goto put_user_lock; + } + ret = user_event_trace_register(user); if (ret) @@ -1743,6 +1760,7 @@ static int user_event_parse(struct user_event_group *group, char *name, dyn_event_init(&user->devent, &user_event_dops); dyn_event_add(&user->devent, &user->call); hash_add(group->register_table, &user->node, key); + current_user_events++; mutex_unlock(&event_mutex); @@ -2369,6 +2387,43 @@ static int create_user_tracefs(void) return -ENODEV; } +static int __init set_max_user_events(char *str) +{ + if (!str) + return 0; + + if (kstrtouint(str, 0, &max_user_events)) + return 0; + + return 1; +} +__setup("user_events_max=", set_max_user_events); + +static int set_max_user_events_sysctl(struct ctl_table *table, int write, + void *buffer, size_t *lenp, loff_t *ppos) +{ + int ret; + + mutex_lock(&event_mutex); + + ret = proc_douintvec(table, write, buffer, lenp, ppos); + + mutex_unlock(&event_mutex); + + return ret; +} + +static struct ctl_table user_event_sysctls[] = { + { + .procname = "user_events_max", + .data = &max_user_events, + .maxlen = sizeof(unsigned int), + .mode = 0644, + .proc_handler = set_max_user_events_sysctl, + }, + {} +}; + static int __init trace_events_user_init(void) { int ret; @@ -2398,6 +2453,8 @@ static int __init trace_events_user_init(void) if (dyn_event_register(&user_event_dops)) pr_warn("user_events could not register with dyn_events\n"); + register_sysctl_init("kernel", user_event_sysctls); + return 0; } -- 2.25.1