From patchwork Wed Jul 18 22:58:48 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Omar Sandoval X-Patchwork-Id: 10533417 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id ACC98600F4 for ; Wed, 18 Jul 2018 22:59:29 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A1DDE298AF for ; Wed, 18 Jul 2018 22:59:29 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 96580298BA; Wed, 18 Jul 2018 22:59:29 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3619B298AF for ; Wed, 18 Jul 2018 22:59:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730659AbeGRXj2 (ORCPT ); Wed, 18 Jul 2018 19:39:28 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:45022 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730470AbeGRXj2 (ORCPT ); Wed, 18 Jul 2018 19:39:28 -0400 Received: by mail-pf0-f193.google.com with SMTP id k21-v6so2883468pff.11 for ; Wed, 18 Jul 2018 15:59:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=osandov-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=m1/hDZna1k9kEadKgQvnzi8gv4717mSyGgIlzsk+u7g=; b=u919IaPMgov9aSaeendZxG49ChQnWO8WYKxWfz/D6k1ZSKsT1lxJALQF7r8C6Pj/wS FWkjJowJ8INwb7BmXjcfftqAV7IDklZFTKXTVUPCdoaaBvx6F56kIS2HoE9sDNodx9ET o6acHtl3rJZHad174AW7f4DY5x+Db3K+mEWSUVki+t28TyHgtV5VKWOt5BL/9fcAb/8A MROB8Dcx92EaFcV7FU58roSSYkkBJ+JqVcMCGweTFFTS/7Bs+rKGoNZgdqAKcw1hSFF/ rEsNXjbe08IUiwixTESBZLQkrJvKfg7xwnAk1GZF83/ZitHPJsBWxHycQmKQWoer89Ph HdXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=m1/hDZna1k9kEadKgQvnzi8gv4717mSyGgIlzsk+u7g=; b=I7/2OSWt3TzVIE2Wd1TCeOKB6bcY+fn9Nog77FG9RutdnGK4Y7XkCtgUoaWPSD5hFD Hc/PkUJb0CvCmYA3fR6Rkm09uNWE1zuNa91GKZBJhgsssBPPNREmV/zoTV5FPJZd0frF VGxuokgMzW6L4uxKpjCu95PBJ5IgrC3zjmAucPuj0USVsXI3UtrrScAzzkOe9pBda5Mf v5CXP3i3WRiLhy4WR1xxkk74brM5d/usdoeyJxW3qFmohuHZ2j78xpxSZRXGuQeEFbcF MmqaHdJSTuBt1THx/WIlN0x5luHtNtr+ygjXbLmEQ/tdRJ3GcsZ58FMGvGJbxM8haHOM Y56g== X-Gm-Message-State: AOUpUlEHoX7KYvBoEMXCpBKFMGajnL5T2xf881sLlS8SmS+Rvp++We9N WQ25gwJDrUwSmFODb7RbxL2C7zrT/Fo= X-Google-Smtp-Source: AAOMgpccKFMvRyZ8s06QRau9vUfPWuihv9MIiFo/t3wA4ZJx95VmHM5ziTQ8Q3yIhU2sQnG1QrjjRQ== X-Received: by 2002:a63:5964:: with SMTP id j36-v6mr7637540pgm.222.1531954761700; Wed, 18 Jul 2018 15:59:21 -0700 (PDT) Received: from vader.hsd1.wa.comcast.net ([2601:602:8800:a9a9:e6a7:a0ff:fe0b:c9a8]) by smtp.gmail.com with ESMTPSA id s16-v6sm6377946pfm.114.2018.07.18.15.59.20 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 Jul 2018 15:59:21 -0700 (PDT) From: Omar Sandoval To: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrew Morton Cc: Alexey Dobriyan , Eric Biederman , James Morse , Bhupesh Sharma , kernel-team@fb.com Subject: [PATCH v3 8/8] proc/kcore: add vmcoreinfo note to /proc/kcore Date: Wed, 18 Jul 2018 15:58:48 -0700 Message-Id: X-Mailer: git-send-email 2.18.0 In-Reply-To: References: Sender: linux-fsdevel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Omar Sandoval The vmcoreinfo information is useful for runtime debugging tools, not just for crash dumps. A lot of this information can be determined by other means, but this is much more convenient, and it only adds a page at most to the file. Signed-off-by: Omar Sandoval --- fs/proc/Kconfig | 1 + fs/proc/kcore.c | 18 ++++++++++++++++-- include/linux/crash_core.h | 2 ++ kernel/crash_core.c | 4 ++-- 4 files changed, 21 insertions(+), 4 deletions(-) diff --git a/fs/proc/Kconfig b/fs/proc/Kconfig index 0eaeb41453f5..817c02b13b1d 100644 --- a/fs/proc/Kconfig +++ b/fs/proc/Kconfig @@ -31,6 +31,7 @@ config PROC_FS config PROC_KCORE bool "/proc/kcore support" if !ARM depends on PROC_FS && MMU + select CRASH_CORE help Provides a virtual ELF core file of the live kernel. This can be read with gdb and other ELF tools. No modifications can be diff --git a/fs/proc/kcore.c b/fs/proc/kcore.c index 25fefdd05ee5..ab7c1a1dad50 100644 --- a/fs/proc/kcore.c +++ b/fs/proc/kcore.c @@ -10,6 +10,7 @@ * Safe accesses to vmalloc/direct-mapped discontiguous areas, Kanoj Sarcar */ +#include #include #include #include @@ -81,10 +82,13 @@ static size_t get_kcore_size(int *nphdr, size_t *phdrs_len, size_t *notes_len, } *phdrs_len = *nphdr * sizeof(struct elf_phdr); - *notes_len = (3 * (sizeof(struct elf_note) + ALIGN(sizeof(CORE_STR), 4)) + + *notes_len = (4 * sizeof(struct elf_note) + + 3 * ALIGN(sizeof(CORE_STR), 4) + + VMCOREINFO_NOTE_NAME_BYTES + ALIGN(sizeof(struct elf_prstatus), 4) + ALIGN(sizeof(struct elf_prpsinfo), 4) + - ALIGN(arch_task_struct_size, 4)); + ALIGN(arch_task_struct_size, 4) + + ALIGN(vmcoreinfo_size, 4)); *data_offset = PAGE_ALIGN(sizeof(struct elfhdr) + *phdrs_len + *notes_len); return *data_offset + size; @@ -406,6 +410,16 @@ read_kcore(struct file *file, char __user *buffer, size_t buflen, loff_t *fpos) sizeof(prpsinfo)); append_kcore_note(notes, &i, CORE_STR, NT_TASKSTRUCT, current, arch_task_struct_size); + /* + * vmcoreinfo_size is mostly constant after init time, but it + * can be changed by crash_save_vmcoreinfo(). Racing here with a + * panic on another CPU before the machine goes down is insanely + * unlikely, but it's better to not leave potential buffer + * overflows lying around, regardless. + */ + append_kcore_note(notes, &i, VMCOREINFO_NOTE_NAME, 0, + vmcoreinfo_data, + min(vmcoreinfo_size, notes_len - i)); tsz = min_t(size_t, buflen, notes_offset + notes_len - *fpos); if (copy_to_user(buffer, notes + *fpos - notes_offset, tsz)) { diff --git a/include/linux/crash_core.h b/include/linux/crash_core.h index b511f6d24b42..525510a9f965 100644 --- a/include/linux/crash_core.h +++ b/include/linux/crash_core.h @@ -60,6 +60,8 @@ phys_addr_t paddr_vmcoreinfo_note(void); #define VMCOREINFO_CONFIG(name) \ vmcoreinfo_append_str("CONFIG_%s=y\n", #name) +extern unsigned char *vmcoreinfo_data; +extern size_t vmcoreinfo_size; extern u32 *vmcoreinfo_note; Elf_Word *append_elf_note(Elf_Word *buf, char *name, unsigned int type, diff --git a/kernel/crash_core.c b/kernel/crash_core.c index b66aced5e8c2..d02c58b94460 100644 --- a/kernel/crash_core.c +++ b/kernel/crash_core.c @@ -14,8 +14,8 @@ #include /* vmcoreinfo stuff */ -static unsigned char *vmcoreinfo_data; -static size_t vmcoreinfo_size; +unsigned char *vmcoreinfo_data; +size_t vmcoreinfo_size; u32 *vmcoreinfo_note; /* trusted vmcoreinfo, e.g. we can make a copy in the crash memory */