On Thu, 3 Oct 2024 11:16:37 -0400 Mathieu Desnoyers <[email protected]> wrote:
> Add a might_fault() check to validate that the perf sys_enter/sys_exit > probe callbacks are indeed called from a context where page faults can > be handled. > > Signed-off-by: Mathieu Desnoyers <[email protected]> > Cc: Michael Jeanson <[email protected]> > Cc: Steven Rostedt <[email protected]> > Cc: Masami Hiramatsu <[email protected]> > Cc: Peter Zijlstra <[email protected]> > Cc: Alexei Starovoitov <[email protected]> > Cc: Yonghong Song <[email protected]> > Cc: Paul E. McKenney <[email protected]> > Cc: Ingo Molnar <[email protected]> > Cc: Arnaldo Carvalho de Melo <[email protected]> > Cc: Mark Rutland <[email protected]> > Cc: Alexander Shishkin <[email protected]> > Cc: Namhyung Kim <[email protected]> > Cc: Andrii Nakryiko <[email protected]> > Cc: [email protected] > Cc: Joel Fernandes <[email protected]> > --- > include/trace/perf.h | 1 + > kernel/trace/trace_syscalls.c | 2 ++ > 2 files changed, 3 insertions(+) > > diff --git a/include/trace/perf.h b/include/trace/perf.h > index 5650c1bad088..321bfd7919f6 100644 > --- a/include/trace/perf.h > +++ b/include/trace/perf.h > @@ -84,6 +84,7 @@ perf_trace_##call(void *__data, proto) > \ > u64 __count __attribute__((unused)); \ > struct task_struct *__task __attribute__((unused)); \ > \ > + might_fault(); \ > guard(preempt_notrace)(); \ > do_perf_trace_##call(__data, args); \ Same for this. This is used for all tracepoints that perf hooks to. -- Steve > } > diff --git a/kernel/trace/trace_syscalls.c b/kernel/trace/trace_syscalls.c > index 89d7e4c57b5b..0d42d6f293d6 100644 > --- a/kernel/trace/trace_syscalls.c > +++ b/kernel/trace/trace_syscalls.c > @@ -602,6 +602,7 @@ static void perf_syscall_enter(void *ignore, struct > pt_regs *regs, long id) > * Syscall probe called with preemption enabled, but the ring > * buffer and per-cpu data require preemption to be disabled. > */ > + might_fault(); > guard(preempt_notrace)(); > > syscall_nr = trace_get_syscall_nr(current, regs); > @@ -710,6 +711,7 @@ static void perf_syscall_exit(void *ignore, struct > pt_regs *regs, long ret) > * Syscall probe called with preemption enabled, but the ring > * buffer and per-cpu data require preemption to be disabled. > */ > + might_fault(); > guard(preempt_notrace)(); > > syscall_nr = trace_get_syscall_nr(current, regs);
