From patchwork Tue Mar 28 23:52:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Beau Belgrave X-Patchwork-Id: 13191675 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96928C77B6E for ; Tue, 28 Mar 2023 23:52:39 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7110D900004; Tue, 28 Mar 2023 19:52:31 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 64E40900003; Tue, 28 Mar 2023 19:52:31 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 188F8900004; Tue, 28 Mar 2023 19:52:31 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id E629A6B0081 for ; Tue, 28 Mar 2023 19:52:30 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id BEC9AA04AA for ; Tue, 28 Mar 2023 23:52:30 +0000 (UTC) X-FDA: 80619958860.07.81CECAF Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by imf21.hostedemail.com (Postfix) with ESMTP id 0115E1C001B for ; Tue, 28 Mar 2023 23:52:28 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=linux.microsoft.com header.s=default header.b=JP+RRL0d; spf=pass (imf21.hostedemail.com: domain of beaub@linux.microsoft.com designates 13.77.154.182 as permitted sender) smtp.mailfrom=beaub@linux.microsoft.com; dmarc=pass (policy=none) header.from=linux.microsoft.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1680047549; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=15vuXUvlHpOtcTes1qNxWgKfuObVluuULdx0ecG9/h0=; b=nlkCSkRcOHz3/Nwj9N70vMQkT7q5tN0Au+q8vWv5HPe+6+RUbijLwnafktrnoNLMeb07a4 dj2Yuia+E8d9O+LntYR39+NHEna2RCDcYHOSJFL4mMBaUGZi/Bfa8pmCQq89k9BJj64RcK 1DW0P5UIaRUcZJNecTxKqIWvB4Md224= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=linux.microsoft.com header.s=default header.b=JP+RRL0d; spf=pass (imf21.hostedemail.com: domain of beaub@linux.microsoft.com designates 13.77.154.182 as permitted sender) smtp.mailfrom=beaub@linux.microsoft.com; dmarc=pass (policy=none) header.from=linux.microsoft.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1680047549; a=rsa-sha256; cv=none; b=tyAqn+dtYVzzF8iJc8nuUIuEAAcpGLngXsYyIa7xYOTFJv7ngREE6QCNYsOcoj+GrF7Az2 4kWKdrCGLU7nKXbY8K1EFZs+4orSRmaWS19JBIdqSPr7z/gUaNUnxavxIJBkbtom2WIRk+ GUXuiUeShWYrDvq9ftj1fCo0jUnmcW8= Received: from W11-BEAU-MD.localdomain (unknown [76.135.27.212]) by linux.microsoft.com (Postfix) with ESMTPSA id 5341820FDAB8; Tue, 28 Mar 2023 16:52:26 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 5341820FDAB8 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1680047546; bh=15vuXUvlHpOtcTes1qNxWgKfuObVluuULdx0ecG9/h0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JP+RRL0dQnhia5qJ8vX1f86o8bT0Zt28VWd7/uHRdB2xhO5pXMwdVH+1vmdk8KsQ0 A2mnUm2Sdopm+H1hkCvmN8n05f8YJVQS9Fb2PLRhmHrnkkzoKbqSXHyqX13tcfhVSI bFaplcazwYIXcu5e9X36GGYlPqKhhqjIgD0q/F3Q= From: Beau Belgrave To: rostedt@goodmis.org, mhiramat@kernel.org, mathieu.desnoyers@efficios.com, dcook@linux.microsoft.com, alanau@linux.microsoft.com, brauner@kernel.org, akpm@linux-foundation.org, ebiederm@xmission.com, keescook@chromium.org, tglx@linutronix.de Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v10 05/12] tracing/user_events: Add ioctl for disabling addresses Date: Tue, 28 Mar 2023 16:52:12 -0700 Message-Id: <20230328235219.203-6-beaub@linux.microsoft.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230328235219.203-1-beaub@linux.microsoft.com> References: <20230328235219.203-1-beaub@linux.microsoft.com> MIME-Version: 1.0 X-Rspamd-Queue-Id: 0115E1C001B X-Stat-Signature: wns3u38upzfbi5ywminapadsd51e3n6u X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1680047548-335050 X-HE-Meta: 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 1R0rI5LR FXamXRw079ZZoEHKSLSTfJ6tG+6jt0sUVXz5GxjTnV/mX0pOWOUMmNVjSkMOWuq/XPrKWNlYK4MSTbBpR/v6sv5ea2kOmC8f0nXMEs9TeOXA86qujk7UsILpUUGHLB/SeoxHckng5vt7cyW5BTCYjeiXDvVMB+bfWScJ2FWXGsHfgxtEUhgOdrGBK9Dp5iyj7U+qpFTfHjbGnF6YEyNu9IOk1A8ByHEWAL/QNj6iFFFj7r7KPDFMNiK7ur9Bk9BR9ZcYywVKciW93kvx4YiKcvQDrfW2stxZ/sCn733anTOSnvJM= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Enablements are now tracked by the lifetime of the task/mm. User processes need to be able to disable their addresses if tracing is requested to be turned off. Before unmapping the page would suffice. However, we now need a stronger contract. Add an ioctl to enable this. A new flag bit is added, freeing, to user_event_enabler to ensure that if the event is attempted to be removed while a fault is being handled that the remove is delayed until after the fault is reattempted. Signed-off-by: Beau Belgrave --- include/uapi/linux/user_events.h | 24 ++++++++ kernel/trace/trace_events_user.c | 97 +++++++++++++++++++++++++++++++- 2 files changed, 119 insertions(+), 2 deletions(-) diff --git a/include/uapi/linux/user_events.h b/include/uapi/linux/user_events.h index 22521bc622db..3e7275e3234a 100644 --- a/include/uapi/linux/user_events.h +++ b/include/uapi/linux/user_events.h @@ -46,6 +46,27 @@ struct user_reg { __u32 write_index; } __attribute__((__packed__)); +/* + * Describes an event unregister, callers must set the size, address and bit. + * This structure is passed to the DIAG_IOCSUNREG ioctl to disable bit updates. + */ +struct user_unreg { + /* Input: Size of the user_unreg structure being used */ + __u32 size; + + /* Input: Bit to unregister */ + __u8 disable_bit; + + /* Input: Reserved, set to 0 */ + __u8 __reserved; + + /* Input: Reserved, set to 0 */ + __u16 __reserved2; + + /* Input: Address to unregister */ + __u64 disable_addr; +} __attribute__((__packed__)); + #define DIAG_IOC_MAGIC '*' /* Request to register a user_event */ @@ -54,4 +75,7 @@ struct user_reg { /* Request to delete a user_event */ #define DIAG_IOCSDEL _IOW(DIAG_IOC_MAGIC, 1, char *) +/* Requests to unregister a user_event */ +#define DIAG_IOCSUNREG _IOW(DIAG_IOC_MAGIC, 2, struct user_unreg*) + #endif /* _UAPI_LINUX_USER_EVENTS_H */ diff --git a/kernel/trace/trace_events_user.c b/kernel/trace/trace_events_user.c index 86bda1660536..f88bab3f1fe1 100644 --- a/kernel/trace/trace_events_user.c +++ b/kernel/trace/trace_events_user.c @@ -102,6 +102,9 @@ struct user_event_enabler { /* Bit 6 is for faulting status of enablement */ #define ENABLE_VAL_FAULTING_BIT 6 +/* Bit 7 is for freeing status of enablement */ +#define ENABLE_VAL_FREEING_BIT 7 + /* Only duplicate the bit value */ #define ENABLE_VAL_DUP_MASK ENABLE_VAL_BIT_MASK @@ -301,6 +304,12 @@ static void user_event_enabler_fault_fixup(struct work_struct *work) /* Prevent state changes from racing */ mutex_lock(&event_mutex); + /* User asked for enabler to be removed during fault */ + if (test_bit(ENABLE_VAL_FREEING_BIT, ENABLE_BITOPS(enabler))) { + user_event_enabler_destroy(enabler); + goto out; + } + /* * If we managed to get the page, re-issue the write. We do not * want to get into a possible infinite loop, which is why we only @@ -315,7 +324,7 @@ static void user_event_enabler_fault_fixup(struct work_struct *work) user_event_enabler_write(mm, enabler, true); mmap_read_unlock(mm->mm); } - +out: mutex_unlock(&event_mutex); /* In all cases we no longer need the mm or fault */ @@ -370,7 +379,8 @@ static int user_event_enabler_write(struct user_event_mm *mm, if (refcount_read(&mm->tasks) == 0) return -ENOENT; - if (unlikely(test_bit(ENABLE_VAL_FAULTING_BIT, ENABLE_BITOPS(enabler)))) + if (unlikely(test_bit(ENABLE_VAL_FAULTING_BIT, ENABLE_BITOPS(enabler)) || + test_bit(ENABLE_VAL_FREEING_BIT, ENABLE_BITOPS(enabler)))) return -EBUSY; ret = pin_user_pages_remote(mm->mm, uaddr, 1, FOLL_WRITE | FOLL_NOFAULT, @@ -428,6 +438,10 @@ static bool user_event_enabler_dup(struct user_event_enabler *orig, { struct user_event_enabler *enabler; + /* Skip pending frees */ + if (unlikely(test_bit(ENABLE_VAL_FREEING_BIT, ENABLE_BITOPS(orig)))) + return true; + enabler = kzalloc(sizeof(*enabler), GFP_NOWAIT); if (!enabler) @@ -2086,6 +2100,79 @@ static long user_events_ioctl_del(struct user_event_file_info *info, return ret; } +static long user_unreg_get(struct user_unreg __user *ureg, + struct user_unreg *kreg) +{ + u32 size; + long ret; + + ret = get_user(size, &ureg->size); + + if (ret) + return ret; + + if (size > PAGE_SIZE) + return -E2BIG; + + if (size < offsetofend(struct user_unreg, disable_addr)) + return -EINVAL; + + ret = copy_struct_from_user(kreg, sizeof(*kreg), ureg, size); + + /* Ensure no reserved values, since we don't support any yet */ + if (kreg->__reserved || kreg->__reserved2) + return -EINVAL; + + return ret; +} + +/* + * Unregisters an enablement address/bit within a task/user mm. + */ +static long user_events_ioctl_unreg(unsigned long uarg) +{ + struct user_unreg __user *ureg = (struct user_unreg __user *)uarg; + struct user_event_mm *mm = current->user_event_mm; + struct user_event_enabler *enabler, *next; + struct user_unreg reg; + long ret; + + ret = user_unreg_get(ureg, ®); + + if (ret) + return ret; + + if (!mm) + return -ENOENT; + + ret = -ENOENT; + + /* + * Flags freeing and faulting are used to indicate if the enabler is in + * use at all. When faulting is set a page-fault is occurring asyncly. + * During async fault if freeing is set, the enabler will be destroyed. + * If no async fault is happening, we can destroy it now since we hold + * the event_mutex during these checks. + */ + mutex_lock(&event_mutex); + + list_for_each_entry_safe(enabler, next, &mm->enablers, link) + if (enabler->addr == reg.disable_addr && + (enabler->values & ENABLE_VAL_BIT_MASK) == reg.disable_bit) { + set_bit(ENABLE_VAL_FREEING_BIT, ENABLE_BITOPS(enabler)); + + if (!test_bit(ENABLE_VAL_FAULTING_BIT, ENABLE_BITOPS(enabler))) + user_event_enabler_destroy(enabler); + + /* Removed at least one */ + ret = 0; + } + + mutex_unlock(&event_mutex); + + return ret; +} + /* * Handles the ioctl from user mode to register or alter operations. */ @@ -2108,6 +2195,12 @@ static long user_events_ioctl(struct file *file, unsigned int cmd, ret = user_events_ioctl_del(info, uarg); mutex_unlock(&group->reg_mutex); break; + + case DIAG_IOCSUNREG: + mutex_lock(&group->reg_mutex); + ret = user_events_ioctl_unreg(uarg); + mutex_unlock(&group->reg_mutex); + break; } return ret;