Re: uprobes: bug in comm/string output?
On Thu, 17 Jan 2019 14:44:41 +0100 Andreas Ziegler wrote: > Hi, > > On 1/17/19 10:47 AM, Masami Hiramatsu wrote: > > On Thu, 17 Jan 2019 09:08:41 +0100 > > Andreas Ziegler wrote: > > > >> On 17.01.19 09:00, Masami Hiramatsu wrote: > >>> On Thu, 17 Jan 2019 15:13:09 +0900 > >>> Masami Hiramatsu wrote: > >>> > On Wed, 16 Jan 2019 11:16:07 +0100 > Andreas Ziegler wrote: > > > > > I went into this a bit deeper today, and right now it is simply failing > > to parse the code because there is no FETCH_OP_COMM case in > > process_fetch_insn() for uprobes so that will return -EILSEQ, leading to > > a make_data_loc(0, ...) in store_trace_args(). If we just add > > FETCH_OP_COMM and let val point to current->comm (that's what > > trace_kprobe.c does), we get an -EFAULT return value from > > fetch_store_string because strncpy_from_user() checks if the argument is > > in user space. > > Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string > is only for user space strings. > > > So I think we might need a special case for that, something like > > FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies > > current->comm over to the dynamic area. The implementation could be > > similar to the old fetch_comm_string implementation before your rewrite. > > Hmm, instead, I would like to add current->comm checker and only allows > to copy that. That would be simpler and enough. > > Could you test below patch? > > > tracing: uprobes: Re-enable $comm support for uprobe events > > From: Masami Hiramatsu > > Since commit 533059281ee5 ("tracing: probeevent: Introduce new > argument fetching code") dropped the $comm support from uprobe > events, this re-enable it. > >> > >> this should read 're-enables'. > >> > > For $comm support, use strncpy() instead of strncpy_from_user() > >> ^ > >> we're using strlcpy(), not strncpy(). > >> > to copy current task's comm. Because it is in the kernel space, > strncpy_from_user() always fails to copy the comm. > This also use strlen() instead of strlen_user() to measure the > >> ^^ > >> 'uses', and the function should be 'strnlen_user()'. > >> > length of the comm. > > Signed-off-by: Masami Hiramatsu > Reported-by: Andreas Ziegler > --- > kernel/trace/trace_uprobe.c | 13 +++-- > 1 file changed, 11 insertions(+), 2 deletions(-) > > diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c > index e335576b9411..97d134e83e0f 100644 > --- a/kernel/trace/trace_uprobe.c > +++ b/kernel/trace/trace_uprobe.c > @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, > void *base) > if (unlikely(!maxlen)) > return -ENOMEM; > > -ret = strncpy_from_user(dst, src, maxlen); > +if (addr == (unsigned long)current->comm) > +ret = strlcpy(dst, current->comm, maxlen); > +else > +ret = strncpy_from_user(dst, src, maxlen); > if (ret >= 0) { > if (ret == maxlen) > dst[ret - 1] = '\0'; > @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) > int len; > void __user *vaddr = (void __force __user *) addr; > > -len = strnlen_user(vaddr, MAX_STRING_SIZE); > +if (addr == (unsigned long)current->comm) > +len = strlen(current->comm); > >>> > >>> To balance with the strnlen_user, we must increse the len in this block. > >>> (strlen doesn't count the final '\0', but strnlen_user counts it) > >>> > >> > >> yes, we need to add a '+ 1' here. > >> > >> With the typos and this one fixed, this is > >> > >> Acked-by: Andreas Ziegler > > > > Thank you for fixing typo and Ack :) > > > > Thanks you, > > > >> > >>> Thank you, > >>> > +else > +len = strnlen_user(vaddr, MAX_STRING_SIZE); > > return (len > MAX_STRING_SIZE) ? 0 : len; > } > @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct > pt_regs *regs, void *dest, > case FETCH_OP_IMM: > val = code->immediate; > break; > +case FETCH_OP_COMM: > +val = (unsigned long)current->comm; > +break; > case FETCH_OP_FOFFS: > val = translate_user_vaddr(code->immediate); > break; > >>> > >>> > >> > > > > > as the original commit breaking $comm support was merged for v4.20 > (which is a stable kernel) and the wrong behaviour with multiple strings > ex
Re: uprobes: bug in comm/string output?
On Thu, Jan 17, 2019 at 02:44:41PM +0100, Andreas Ziegler wrote: > Hi, > > On 1/17/19 10:47 AM, Masami Hiramatsu wrote: > > On Thu, 17 Jan 2019 09:08:41 +0100 > > Andreas Ziegler wrote: > > > > > On 17.01.19 09:00, Masami Hiramatsu wrote: > > > > On Thu, 17 Jan 2019 15:13:09 +0900 > > > > Masami Hiramatsu wrote: > > > > > > > > > On Wed, 16 Jan 2019 11:16:07 +0100 > > > > > Andreas Ziegler wrote: > > > > > > > > > > > > > > > > > I went into this a bit deeper today, and right now it is simply > > > > > > failing > > > > > > to parse the code because there is no FETCH_OP_COMM case in > > > > > > process_fetch_insn() for uprobes so that will return -EILSEQ, > > > > > > leading to > > > > > > a make_data_loc(0, ...) in store_trace_args(). If we just add > > > > > > FETCH_OP_COMM and let val point to current->comm (that's what > > > > > > trace_kprobe.c does), we get an -EFAULT return value from > > > > > > fetch_store_string because strncpy_from_user() checks if the > > > > > > argument is > > > > > > in user space. > > > > > > > > > > Correct. I missed to add OP_COMM support. And uprobe's > > > > > fetch_store_string > > > > > is only for user space strings. > > > > > > > > > > > So I think we might need a special case for that, something like > > > > > > FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and > > > > > > copies > > > > > > current->comm over to the dynamic area. The implementation could be > > > > > > similar to the old fetch_comm_string implementation before your > > > > > > rewrite. > > > > > > > > > > Hmm, instead, I would like to add current->comm checker and only > > > > > allows > > > > > to copy that. That would be simpler and enough. > > > > > > > > > > Could you test below patch? > > > > > > > > > > > > > > > tracing: uprobes: Re-enable $comm support for uprobe events > > > > > > > > > > From: Masami Hiramatsu > > > > > > > > > > Since commit 533059281ee5 ("tracing: probeevent: Introduce new > > > > > argument fetching code") dropped the $comm support from uprobe > > > > > events, this re-enable it. > > > > > > this should read 're-enables'. > > > > > > > > > > > > > For $comm support, use strncpy() instead of strncpy_from_user() > > > ^ > > > we're using strlcpy(), not strncpy(). > > > > > > > > to copy current task's comm. Because it is in the kernel space, > > > > > strncpy_from_user() always fails to copy the comm. > > > > > This also use strlen() instead of strlen_user() to measure the > > > ^^ > > > 'uses', and the function should be 'strnlen_user()'. > > > > > > > > length of the comm. > > > > > > > > > > Signed-off-by: Masami Hiramatsu > > > > > Reported-by: Andreas Ziegler > > > > > --- > > > > > kernel/trace/trace_uprobe.c | 13 +++-- > > > > > 1 file changed, 11 insertions(+), 2 deletions(-) > > > > > > > > > > diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c > > > > > index e335576b9411..97d134e83e0f 100644 > > > > > --- a/kernel/trace/trace_uprobe.c > > > > > +++ b/kernel/trace/trace_uprobe.c > > > > > @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void > > > > > *dest, void *base) > > > > > if (unlikely(!maxlen)) > > > > > return -ENOMEM; > > > > > - ret = strncpy_from_user(dst, src, maxlen); > > > > > + if (addr == (unsigned long)current->comm) > > > > > + ret = strlcpy(dst, current->comm, maxlen); > > > > > + else > > > > > + ret = strncpy_from_user(dst, src, maxlen); > > > > > if (ret >= 0) { > > > > > if (ret == maxlen) > > > > > dst[ret - 1] = '\0'; > > > > > @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) > > > > > int len; > > > > > void __user *vaddr = (void __force __user *) addr; > > > > > - len = strnlen_user(vaddr, MAX_STRING_SIZE); > > > > > + if (addr == (unsigned long)current->comm) > > > > > + len = strlen(current->comm); > > > > > > > > To balance with the strnlen_user, we must increse the len in this block. > > > > (strlen doesn't count the final '\0', but strnlen_user counts it) > > > > > > > > > > yes, we need to add a '+ 1' here. > > > > > > With the typos and this one fixed, this is > > > > > > Acked-by: Andreas Ziegler > > > > Thank you for fixing typo and Ack :) > > > > Thanks you, > > > > > > > > > Thank you, > > > > > > > > > + else > > > > > + len = strnlen_user(vaddr, MAX_STRING_SIZE); > > > > > return (len > MAX_STRING_SIZE) ? 0 : len; > > > > > } > > > > > @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, > > > > > struct pt_regs *regs, void *dest, > > > > > case FETCH_OP_IMM: > > > > > val = code->immediate; > > > > > break; > > > > > + case FETCH_OP_COMM: > > > > > + val = (unsigned long)current->comm; > > > > > + break; > > > > >
Re: uprobes: bug in comm/string output?
Hi, On 1/17/19 10:47 AM, Masami Hiramatsu wrote: On Thu, 17 Jan 2019 09:08:41 +0100 Andreas Ziegler wrote: On 17.01.19 09:00, Masami Hiramatsu wrote: On Thu, 17 Jan 2019 15:13:09 +0900 Masami Hiramatsu wrote: On Wed, 16 Jan 2019 11:16:07 +0100 Andreas Ziegler wrote: I went into this a bit deeper today, and right now it is simply failing to parse the code because there is no FETCH_OP_COMM case in process_fetch_insn() for uprobes so that will return -EILSEQ, leading to a make_data_loc(0, ...) in store_trace_args(). If we just add FETCH_OP_COMM and let val point to current->comm (that's what trace_kprobe.c does), we get an -EFAULT return value from fetch_store_string because strncpy_from_user() checks if the argument is in user space. Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string is only for user space strings. So I think we might need a special case for that, something like FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies current->comm over to the dynamic area. The implementation could be similar to the old fetch_comm_string implementation before your rewrite. Hmm, instead, I would like to add current->comm checker and only allows to copy that. That would be simpler and enough. Could you test below patch? tracing: uprobes: Re-enable $comm support for uprobe events From: Masami Hiramatsu Since commit 533059281ee5 ("tracing: probeevent: Introduce new argument fetching code") dropped the $comm support from uprobe events, this re-enable it. this should read 're-enables'. For $comm support, use strncpy() instead of strncpy_from_user() ^ we're using strlcpy(), not strncpy(). to copy current task's comm. Because it is in the kernel space, strncpy_from_user() always fails to copy the comm. This also use strlen() instead of strlen_user() to measure the ^^ 'uses', and the function should be 'strnlen_user()'. length of the comm. Signed-off-by: Masami Hiramatsu Reported-by: Andreas Ziegler --- kernel/trace/trace_uprobe.c | 13 +++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index e335576b9411..97d134e83e0f 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, void *base) if (unlikely(!maxlen)) return -ENOMEM; - ret = strncpy_from_user(dst, src, maxlen); + if (addr == (unsigned long)current->comm) + ret = strlcpy(dst, current->comm, maxlen); + else + ret = strncpy_from_user(dst, src, maxlen); if (ret >= 0) { if (ret == maxlen) dst[ret - 1] = '\0'; @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) int len; void __user *vaddr = (void __force __user *) addr; - len = strnlen_user(vaddr, MAX_STRING_SIZE); + if (addr == (unsigned long)current->comm) + len = strlen(current->comm); To balance with the strnlen_user, we must increse the len in this block. (strlen doesn't count the final '\0', but strnlen_user counts it) yes, we need to add a '+ 1' here. With the typos and this one fixed, this is Acked-by: Andreas Ziegler Thank you for fixing typo and Ack :) Thanks you, > Thank you, + else + len = strnlen_user(vaddr, MAX_STRING_SIZE); return (len > MAX_STRING_SIZE) ? 0 : len; } @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct pt_regs *regs, void *dest, case FETCH_OP_IMM: val = code->immediate; break; + case FETCH_OP_COMM: + val = (unsigned long)current->comm; + break; case FETCH_OP_FOFFS: val = translate_user_vaddr(code->immediate); break; as the original commit breaking $comm support was merged for v4.20 (which is a stable kernel) and the wrong behaviour with multiple strings exists in all longterm/stable releases (tested back to v4.4), do you think this should be going into a stable release once it's merged? I added Greg as he might know the answer to that. Thanks, Andreas smime.p7s Description: S/MIME Cryptographic Signature
Re: uprobes: bug in comm/string output?
On Thu, 17 Jan 2019 09:08:41 +0100 Andreas Ziegler wrote: > On 17.01.19 09:00, Masami Hiramatsu wrote: > > On Thu, 17 Jan 2019 15:13:09 +0900 > > Masami Hiramatsu wrote: > > > >> On Wed, 16 Jan 2019 11:16:07 +0100 > >> Andreas Ziegler wrote: > >> > >>> > >>> I went into this a bit deeper today, and right now it is simply failing > >>> to parse the code because there is no FETCH_OP_COMM case in > >>> process_fetch_insn() for uprobes so that will return -EILSEQ, leading to > >>> a make_data_loc(0, ...) in store_trace_args(). If we just add > >>> FETCH_OP_COMM and let val point to current->comm (that's what > >>> trace_kprobe.c does), we get an -EFAULT return value from > >>> fetch_store_string because strncpy_from_user() checks if the argument is > >>> in user space. > >> > >> Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string > >> is only for user space strings. > >> > >>> So I think we might need a special case for that, something like > >>> FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies > >>> current->comm over to the dynamic area. The implementation could be > >>> similar to the old fetch_comm_string implementation before your rewrite. > >> > >> Hmm, instead, I would like to add current->comm checker and only allows > >> to copy that. That would be simpler and enough. > >> > >> Could you test below patch? > >> > >> > >> tracing: uprobes: Re-enable $comm support for uprobe events > >> > >> From: Masami Hiramatsu > >> > >> Since commit 533059281ee5 ("tracing: probeevent: Introduce new > >> argument fetching code") dropped the $comm support from uprobe > >> events, this re-enable it. > > this should read 're-enables'. > > >> > >> For $comm support, use strncpy() instead of strncpy_from_user() > ^ > we're using strlcpy(), not strncpy(). > > >> to copy current task's comm. Because it is in the kernel space, > >> strncpy_from_user() always fails to copy the comm. > >> This also use strlen() instead of strlen_user() to measure the >^^ > 'uses', and the function should be 'strnlen_user()'. > > >> length of the comm. > >> > >> Signed-off-by: Masami Hiramatsu > >> Reported-by: Andreas Ziegler > >> --- > >> kernel/trace/trace_uprobe.c | 13 +++-- > >> 1 file changed, 11 insertions(+), 2 deletions(-) > >> > >> diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c > >> index e335576b9411..97d134e83e0f 100644 > >> --- a/kernel/trace/trace_uprobe.c > >> +++ b/kernel/trace/trace_uprobe.c > >> @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, > >> void *base) > >>if (unlikely(!maxlen)) > >>return -ENOMEM; > >> > >> - ret = strncpy_from_user(dst, src, maxlen); > >> + if (addr == (unsigned long)current->comm) > >> + ret = strlcpy(dst, current->comm, maxlen); > >> + else > >> + ret = strncpy_from_user(dst, src, maxlen); > >>if (ret >= 0) { > >>if (ret == maxlen) > >>dst[ret - 1] = '\0'; > >> @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) > >>int len; > >>void __user *vaddr = (void __force __user *) addr; > >> > >> - len = strnlen_user(vaddr, MAX_STRING_SIZE); > >> + if (addr == (unsigned long)current->comm) > >> + len = strlen(current->comm); > > > > To balance with the strnlen_user, we must increse the len in this block. > > (strlen doesn't count the final '\0', but strnlen_user counts it) > > > > yes, we need to add a '+ 1' here. > > With the typos and this one fixed, this is > > Acked-by: Andreas Ziegler Thank you for fixing typo and Ack :) Thanks you, > > > Thank you, > > > >> + else > >> + len = strnlen_user(vaddr, MAX_STRING_SIZE); > >> > >>return (len > MAX_STRING_SIZE) ? 0 : len; > >> } > >> @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct > >> pt_regs *regs, void *dest, > >>case FETCH_OP_IMM: > >>val = code->immediate; > >>break; > >> + case FETCH_OP_COMM: > >> + val = (unsigned long)current->comm; > >> + break; > >>case FETCH_OP_FOFFS: > >>val = translate_user_vaddr(code->immediate); > >>break; > > > > > -- Masami Hiramatsu
Re: uprobes: bug in comm/string output?
On 17.01.19 09:00, Masami Hiramatsu wrote: > On Thu, 17 Jan 2019 15:13:09 +0900 > Masami Hiramatsu wrote: > >> On Wed, 16 Jan 2019 11:16:07 +0100 >> Andreas Ziegler wrote: >> >>> >>> I went into this a bit deeper today, and right now it is simply failing >>> to parse the code because there is no FETCH_OP_COMM case in >>> process_fetch_insn() for uprobes so that will return -EILSEQ, leading to >>> a make_data_loc(0, ...) in store_trace_args(). If we just add >>> FETCH_OP_COMM and let val point to current->comm (that's what >>> trace_kprobe.c does), we get an -EFAULT return value from >>> fetch_store_string because strncpy_from_user() checks if the argument is >>> in user space. >> >> Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string >> is only for user space strings. >> >>> So I think we might need a special case for that, something like >>> FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies >>> current->comm over to the dynamic area. The implementation could be >>> similar to the old fetch_comm_string implementation before your rewrite. >> >> Hmm, instead, I would like to add current->comm checker and only allows >> to copy that. That would be simpler and enough. >> >> Could you test below patch? >> >> >> tracing: uprobes: Re-enable $comm support for uprobe events >> >> From: Masami Hiramatsu >> >> Since commit 533059281ee5 ("tracing: probeevent: Introduce new >> argument fetching code") dropped the $comm support from uprobe >> events, this re-enable it. this should read 're-enables'. >> >> For $comm support, use strncpy() instead of strncpy_from_user() ^ we're using strlcpy(), not strncpy(). >> to copy current task's comm. Because it is in the kernel space, >> strncpy_from_user() always fails to copy the comm. >> This also use strlen() instead of strlen_user() to measure the ^^ 'uses', and the function should be 'strnlen_user()'. >> length of the comm. >> >> Signed-off-by: Masami Hiramatsu >> Reported-by: Andreas Ziegler >> --- >> kernel/trace/trace_uprobe.c | 13 +++-- >> 1 file changed, 11 insertions(+), 2 deletions(-) >> >> diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c >> index e335576b9411..97d134e83e0f 100644 >> --- a/kernel/trace/trace_uprobe.c >> +++ b/kernel/trace/trace_uprobe.c >> @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, void >> *base) >> if (unlikely(!maxlen)) >> return -ENOMEM; >> >> -ret = strncpy_from_user(dst, src, maxlen); >> +if (addr == (unsigned long)current->comm) >> +ret = strlcpy(dst, current->comm, maxlen); >> +else >> +ret = strncpy_from_user(dst, src, maxlen); >> if (ret >= 0) { >> if (ret == maxlen) >> dst[ret - 1] = '\0'; >> @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) >> int len; >> void __user *vaddr = (void __force __user *) addr; >> >> -len = strnlen_user(vaddr, MAX_STRING_SIZE); >> +if (addr == (unsigned long)current->comm) >> +len = strlen(current->comm); > > To balance with the strnlen_user, we must increse the len in this block. > (strlen doesn't count the final '\0', but strnlen_user counts it) > yes, we need to add a '+ 1' here. With the typos and this one fixed, this is Acked-by: Andreas Ziegler > Thank you, > >> +else >> +len = strnlen_user(vaddr, MAX_STRING_SIZE); >> >> return (len > MAX_STRING_SIZE) ? 0 : len; >> } >> @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct >> pt_regs *regs, void *dest, >> case FETCH_OP_IMM: >> val = code->immediate; >> break; >> +case FETCH_OP_COMM: >> +val = (unsigned long)current->comm; >> +break; >> case FETCH_OP_FOFFS: >> val = translate_user_vaddr(code->immediate); >> break; > >
Re: uprobes: bug in comm/string output?
On Thu, 17 Jan 2019 15:13:09 +0900 Masami Hiramatsu wrote: > On Wed, 16 Jan 2019 11:16:07 +0100 > Andreas Ziegler wrote: > > > > > I went into this a bit deeper today, and right now it is simply failing > > to parse the code because there is no FETCH_OP_COMM case in > > process_fetch_insn() for uprobes so that will return -EILSEQ, leading to > > a make_data_loc(0, ...) in store_trace_args(). If we just add > > FETCH_OP_COMM and let val point to current->comm (that's what > > trace_kprobe.c does), we get an -EFAULT return value from > > fetch_store_string because strncpy_from_user() checks if the argument is > > in user space. > > Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string > is only for user space strings. > > > So I think we might need a special case for that, something like > > FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies > > current->comm over to the dynamic area. The implementation could be > > similar to the old fetch_comm_string implementation before your rewrite. > > Hmm, instead, I would like to add current->comm checker and only allows > to copy that. That would be simpler and enough. > > Could you test below patch? > > > tracing: uprobes: Re-enable $comm support for uprobe events > > From: Masami Hiramatsu > > Since commit 533059281ee5 ("tracing: probeevent: Introduce new > argument fetching code") dropped the $comm support from uprobe > events, this re-enable it. > > For $comm support, use strncpy() instead of strncpy_from_user() > to copy current task's comm. Because it is in the kernel space, > strncpy_from_user() always fails to copy the comm. > This also use strlen() instead of strlen_user() to measure the > length of the comm. > > Signed-off-by: Masami Hiramatsu > Reported-by: Andreas Ziegler > --- > kernel/trace/trace_uprobe.c | 13 +++-- > 1 file changed, 11 insertions(+), 2 deletions(-) > > diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c > index e335576b9411..97d134e83e0f 100644 > --- a/kernel/trace/trace_uprobe.c > +++ b/kernel/trace/trace_uprobe.c > @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, void > *base) > if (unlikely(!maxlen)) > return -ENOMEM; > > - ret = strncpy_from_user(dst, src, maxlen); > + if (addr == (unsigned long)current->comm) > + ret = strlcpy(dst, current->comm, maxlen); > + else > + ret = strncpy_from_user(dst, src, maxlen); > if (ret >= 0) { > if (ret == maxlen) > dst[ret - 1] = '\0'; > @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) > int len; > void __user *vaddr = (void __force __user *) addr; > > - len = strnlen_user(vaddr, MAX_STRING_SIZE); > + if (addr == (unsigned long)current->comm) > + len = strlen(current->comm); To balance with the strnlen_user, we must increse the len in this block. (strlen doesn't count the final '\0', but strnlen_user counts it) Thank you, > + else > + len = strnlen_user(vaddr, MAX_STRING_SIZE); > > return (len > MAX_STRING_SIZE) ? 0 : len; > } > @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct > pt_regs *regs, void *dest, > case FETCH_OP_IMM: > val = code->immediate; > break; > + case FETCH_OP_COMM: > + val = (unsigned long)current->comm; > + break; > case FETCH_OP_FOFFS: > val = translate_user_vaddr(code->immediate); > break; -- Masami Hiramatsu
Re: uprobes: bug in comm/string output?
On Wed, 16 Jan 2019 11:16:07 +0100 Andreas Ziegler wrote: > > I went into this a bit deeper today, and right now it is simply failing > to parse the code because there is no FETCH_OP_COMM case in > process_fetch_insn() for uprobes so that will return -EILSEQ, leading to > a make_data_loc(0, ...) in store_trace_args(). If we just add > FETCH_OP_COMM and let val point to current->comm (that's what > trace_kprobe.c does), we get an -EFAULT return value from > fetch_store_string because strncpy_from_user() checks if the argument is > in user space. Correct. I missed to add OP_COMM support. And uprobe's fetch_store_string is only for user space strings. > So I think we might need a special case for that, something like > FETCH_OP_ST_COMM_STRING which is only used for FETCH_OP_COMM and copies > current->comm over to the dynamic area. The implementation could be > similar to the old fetch_comm_string implementation before your rewrite. Hmm, instead, I would like to add current->comm checker and only allows to copy that. That would be simpler and enough. Could you test below patch? tracing: uprobes: Re-enable $comm support for uprobe events From: Masami Hiramatsu Since commit 533059281ee5 ("tracing: probeevent: Introduce new argument fetching code") dropped the $comm support from uprobe events, this re-enable it. For $comm support, use strncpy() instead of strncpy_from_user() to copy current task's comm. Because it is in the kernel space, strncpy_from_user() always fails to copy the comm. This also use strlen() instead of strlen_user() to measure the length of the comm. Signed-off-by: Masami Hiramatsu Reported-by: Andreas Ziegler --- kernel/trace/trace_uprobe.c | 13 +++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index e335576b9411..97d134e83e0f 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -156,7 +156,10 @@ fetch_store_string(unsigned long addr, void *dest, void *base) if (unlikely(!maxlen)) return -ENOMEM; - ret = strncpy_from_user(dst, src, maxlen); + if (addr == (unsigned long)current->comm) + ret = strlcpy(dst, current->comm, maxlen); + else + ret = strncpy_from_user(dst, src, maxlen); if (ret >= 0) { if (ret == maxlen) dst[ret - 1] = '\0'; @@ -173,7 +176,10 @@ fetch_store_strlen(unsigned long addr) int len; void __user *vaddr = (void __force __user *) addr; - len = strnlen_user(vaddr, MAX_STRING_SIZE); + if (addr == (unsigned long)current->comm) + len = strlen(current->comm); + else + len = strnlen_user(vaddr, MAX_STRING_SIZE); return (len > MAX_STRING_SIZE) ? 0 : len; } @@ -213,6 +219,9 @@ process_fetch_insn(struct fetch_insn *code, struct pt_regs *regs, void *dest, case FETCH_OP_IMM: val = code->immediate; break; + case FETCH_OP_COMM: + val = (unsigned long)current->comm; + break; case FETCH_OP_FOFFS: val = translate_user_vaddr(code->immediate); break;
Re: uprobes: bug in comm/string output?
Hi, thanks for your reply! On 1/16/19 11:00 AM, Masami Hiramatsu wrote: On Tue, 15 Jan 2019 14:36:48 +0100 Andreas Ziegler wrote: Hi again, On 1/14/19 1:38 PM, Andreas Ziegler wrote: Hi, I've been playing around with uprobes today and found the following weird behaviour/output when using more than one string argument (or using the $comm argument). This was run on a v4.20 mainline build on Ubuntu 18.04. root@ubuntu1810:~# uname -a Linux ubuntu1810 4.20.0-042000-generic #201812232030 SMP Mon Dec 24 01:32:58 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux I'm trying to track calls to dlopen so I'm looking up the correct offset in libdl.so: root@ubuntu1810:/sys/kernel/debug/tracing# readelf -s /lib/x86_64-linux-gnu/libdl-2.28.so | grep dlopen 34: 12a0 133 FUNCGLOBAL DEFAULT 14 dlopen@@GLIBC_2.2.5 Then I'm creating a uprobe with two prints of $comm and two prints of the first argument to dlopen, and enable that probe. The '/root/test' program only does a dlopen("libc.so.6", RTLD_LAZY) in main(). root@ubuntu1810:/sys/kernel/debug/tracing# echo 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm +0(%di):string +0(%di):string' > uprobe_events root@ubuntu1810:/sys/kernel/debug/tracing# echo 1 > events/uprobes/dlopen/enable root@ubuntu1810:/sys/kernel/debug/tracing# /root/test The trace output looks like this: root@ubuntu1810:/sys/kernel/debug/tracing# cat trace # tracer: nop # # _-=> irqs-off # / _=> need-resched #| / _---=> hardirq/softirq #|| / _--=> preempt-depth #||| / delay # TASK-PID CPU# TIMESTAMP FUNCTION # | | | | | test-1617 [000] d... 1237.959168: dlopen: (0x7fbd5272e2a0) arg1=(fault) arg2=(fault) arg3="libc.so.6libc.so.6" arg4="libc.so.6" That's very weird for two reasons: - fetching $comm seems to fail with an invalid pointer - arg3 contains the text twice (if I add another print of the argument, arg3 will contain the wanted string three times, arg4 two times and the last argument will contain it once). at least for the second problem I think I found the answer, and for the first problem I have a suspicion (see last paragraph for that). OK, this looks broken. Thank you very much for reporting it! BTW, I tried to reproduce it with kprobe event, but it seems working well. e.g. # echo 'p ksys_chdir $comm $comm +0(%di):string +0(%di):string' > kprobe_events # echo 1 > events/kprobes/enable # cd /sys/kernel/debug/tracing # cat trace sh-812 [003] ...1 229.344360: p_ksys_chdir_0: (ksys_chdir+0x0/0xc0) arg1="sh" arg2="sh" arg3="/sys/kernel/debug/tracing" arg4="/sys/kernel/debug/tracing" So, it might be an issue on uprobe_event. yes, kprobes work because they use strncpy_from_unsafe which *includes* the null byte in its return value... the fact that both are called strncpy_* but behave differently is really annoying... I just sent a patch for this case half an hour ago which simply adds 1 to the returned value for uprobes if it didn't hit the maximum allowed length. For this, I installed a uprobe for libdl.so/dlopen once again, the command would be 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm' so it should print the process name twice (using a kernel v4.18 on Ubuntu 18.10). The code which prints the collected data (print_type_string, defined by PRINT_TYPE_FUNC_NAME(string) in kernel/trace/trace_probe.c) is the following, it simply passes the respective data to trace_seq_printf with a "%s" format string: int PRINT_TYPE_FUNC_NAME(string)(struct trace_seq *s, void *data, void *ent) { int len = *(u32 *)data >> 16; if (!len) trace_seq_puts(s, "(fault)"); else trace_seq_printf(s, "\"%s\"", (const char *)get_loc_data(data, ent)); return !trace_seq_has_overflowed(s); } I dug into that function with KGDB and found the following: 'data' holds the size and offset for the member in question, which is 0xf and 0x18, respectively. 'ent' holds the base address for event. When we print the string at ent + 0x18, we can see that the output for 'arg1' will be "update-notifierupdate-notifier" Thread 511 hit Breakpoint 6, print_type_string (s=0x880078fd1090, name=0x880078fe4458 "arg1", data=0x88007d01f05c, ent=0x88007d01f04c) at /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c:67 67 in /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c gdb$ p *(uint32_t *) data $46 = 0xf0018 gdb$ p ent $47 = (void *) 0x88007d01f04c gdb$ p ((char *)ent + 0x18) $48 = 0x88007d01f064 "update-notifierupdate-notifier" Moving on printing 'arg2' (e.g., the other $comm string). Here we see that the string in question is at offset 0x27, and i
Re: uprobes: bug in comm/string output?
On Tue, 15 Jan 2019 14:36:48 +0100 Andreas Ziegler wrote: > Hi again, > > On 1/14/19 1:38 PM, Andreas Ziegler wrote: > > Hi, > > > > I've been playing around with uprobes today and found the following weird > > behaviour/output when using more than one string argument (or using the > > $comm argument). This was run on a v4.20 mainline build on Ubuntu 18.04. > > > > root@ubuntu1810:~# uname -a > > Linux ubuntu1810 4.20.0-042000-generic #201812232030 SMP Mon Dec 24 > > 01:32:58 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux > > > > I'm trying to track calls to dlopen so I'm looking up the correct offset in > > libdl.so: > > > > root@ubuntu1810:/sys/kernel/debug/tracing# readelf -s > > /lib/x86_64-linux-gnu/libdl-2.28.so | grep dlopen > > 34: 12a0 133 FUNCGLOBAL DEFAULT 14 > > dlopen@@GLIBC_2.2.5 > > > > Then I'm creating a uprobe with two prints of $comm and two prints of the > > first argument to dlopen, and enable that probe. The '/root/test' program > > only does a dlopen("libc.so.6", RTLD_LAZY) in main(). > > > > root@ubuntu1810:/sys/kernel/debug/tracing# echo 'p:dlopen > > /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm +0(%di):string > > +0(%di):string' > uprobe_events > > root@ubuntu1810:/sys/kernel/debug/tracing# echo 1 > > > events/uprobes/dlopen/enable > > root@ubuntu1810:/sys/kernel/debug/tracing# /root/test > > > > The trace output looks like this: > > > > root@ubuntu1810:/sys/kernel/debug/tracing# cat trace > > # tracer: nop > > # > > # _-=> irqs-off > > # / _=> need-resched > > #| / _---=> hardirq/softirq > > #|| / _--=> preempt-depth > > #||| / delay > > # TASK-PID CPU# TIMESTAMP FUNCTION > > # | | | | | > > test-1617 [000] d... 1237.959168: dlopen: (0x7fbd5272e2a0) > > arg1=(fault) arg2=(fault) arg3="libc.so.6libc.so.6" arg4="libc.so.6" > > > > That's very weird for two reasons: > > - fetching $comm seems to fail with an invalid pointer > > - arg3 contains the text twice (if I add another print of the argument, > > arg3 will contain the wanted string three times, arg4 two times and the > > last argument will contain it once). > > at least for the second problem I think I found the answer, and for the > first problem I have a suspicion (see last paragraph for that). OK, this looks broken. Thank you very much for reporting it! BTW, I tried to reproduce it with kprobe event, but it seems working well. e.g. # echo 'p ksys_chdir $comm $comm +0(%di):string +0(%di):string' > kprobe_events # echo 1 > events/kprobes/enable # cd /sys/kernel/debug/tracing # cat trace sh-812 [003] ...1 229.344360: p_ksys_chdir_0: (ksys_chdir+0x0/0xc0) arg1="sh" arg2="sh" arg3="/sys/kernel/debug/tracing" arg4="/sys/kernel/debug/tracing" So, it might be an issue on uprobe_event. > > For this, I installed a uprobe for libdl.so/dlopen once again, the > command would be > > 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm' > > so it should print the process name twice (using a kernel v4.18 on > Ubuntu 18.10). > > The code which prints the collected data (print_type_string, defined by > PRINT_TYPE_FUNC_NAME(string) in kernel/trace/trace_probe.c) is the > following, it simply passes the respective data to trace_seq_printf with > a "%s" format string: > > int PRINT_TYPE_FUNC_NAME(string)(struct trace_seq *s, void *data, void *ent) > { > int len = *(u32 *)data >> 16; > > if (!len) > trace_seq_puts(s, "(fault)"); > else > trace_seq_printf(s, "\"%s\"", > (const char *)get_loc_data(data, ent)); > return !trace_seq_has_overflowed(s); > } > > I dug into that function with KGDB and found the following: 'data' holds > the size and offset for the member in question, which is 0xf and 0x18, > respectively. 'ent' holds the base address for event. When we print the > string at ent + 0x18, we can see that the output for 'arg1' will be > "update-notifierupdate-notifier" > > Thread 511 hit Breakpoint 6, print_type_string (s=0x880078fd1090, > name=0x880078fe4458 "arg1", data=0x88007d01f05c, > ent=0x88007d01f04c) at > /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c:67 > 67in /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c > gdb$ p *(uint32_t *) data > $46 = 0xf0018 > gdb$ p ent > $47 = (void *) 0x88007d01f04c > gdb$ p ((char *)ent + 0x18) > $48 = 0x88007d01f064 "update-notifierupdate-notifier" > > Moving on printing 'arg2' (e.g., the other $comm string). Here we see > that the string in question is at offset 0x27, and if we print that, we > see the correct "update-notifier". > > Thread 511 hit Breakpoint 6, print_type_string (s=0x880078fd1090
Re: uprobes: bug in comm/string output?
Hi again, On 1/14/19 1:38 PM, Andreas Ziegler wrote: Hi, I've been playing around with uprobes today and found the following weird behaviour/output when using more than one string argument (or using the $comm argument). This was run on a v4.20 mainline build on Ubuntu 18.04. root@ubuntu1810:~# uname -a Linux ubuntu1810 4.20.0-042000-generic #201812232030 SMP Mon Dec 24 01:32:58 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux I'm trying to track calls to dlopen so I'm looking up the correct offset in libdl.so: root@ubuntu1810:/sys/kernel/debug/tracing# readelf -s /lib/x86_64-linux-gnu/libdl-2.28.so | grep dlopen 34: 12a0 133 FUNCGLOBAL DEFAULT 14 dlopen@@GLIBC_2.2.5 Then I'm creating a uprobe with two prints of $comm and two prints of the first argument to dlopen, and enable that probe. The '/root/test' program only does a dlopen("libc.so.6", RTLD_LAZY) in main(). root@ubuntu1810:/sys/kernel/debug/tracing# echo 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm +0(%di):string +0(%di):string' > uprobe_events root@ubuntu1810:/sys/kernel/debug/tracing# echo 1 > events/uprobes/dlopen/enable root@ubuntu1810:/sys/kernel/debug/tracing# /root/test The trace output looks like this: root@ubuntu1810:/sys/kernel/debug/tracing# cat trace # tracer: nop # # _-=> irqs-off # / _=> need-resched #| / _---=> hardirq/softirq #|| / _--=> preempt-depth #||| / delay # TASK-PID CPU# TIMESTAMP FUNCTION # | | | | | test-1617 [000] d... 1237.959168: dlopen: (0x7fbd5272e2a0) arg1=(fault) arg2=(fault) arg3="libc.so.6libc.so.6" arg4="libc.so.6" That's very weird for two reasons: - fetching $comm seems to fail with an invalid pointer - arg3 contains the text twice (if I add another print of the argument, arg3 will contain the wanted string three times, arg4 two times and the last argument will contain it once). at least for the second problem I think I found the answer, and for the first problem I have a suspicion (see last paragraph for that). For this, I installed a uprobe for libdl.so/dlopen once again, the command would be 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm' so it should print the process name twice (using a kernel v4.18 on Ubuntu 18.10). The code which prints the collected data (print_type_string, defined by PRINT_TYPE_FUNC_NAME(string) in kernel/trace/trace_probe.c) is the following, it simply passes the respective data to trace_seq_printf with a "%s" format string: int PRINT_TYPE_FUNC_NAME(string)(struct trace_seq *s, void *data, void *ent) { int len = *(u32 *)data >> 16; if (!len) trace_seq_puts(s, "(fault)"); else trace_seq_printf(s, "\"%s\"", (const char *)get_loc_data(data, ent)); return !trace_seq_has_overflowed(s); } I dug into that function with KGDB and found the following: 'data' holds the size and offset for the member in question, which is 0xf and 0x18, respectively. 'ent' holds the base address for event. When we print the string at ent + 0x18, we can see that the output for 'arg1' will be "update-notifierupdate-notifier" Thread 511 hit Breakpoint 6, print_type_string (s=0x880078fd1090, name=0x880078fe4458 "arg1", data=0x88007d01f05c, ent=0x88007d01f04c) at /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c:67 67 in /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c gdb$ p *(uint32_t *) data $46 = 0xf0018 gdb$ p ent $47 = (void *) 0x88007d01f04c gdb$ p ((char *)ent + 0x18) $48 = 0x88007d01f064 "update-notifierupdate-notifier" Moving on printing 'arg2' (e.g., the other $comm string). Here we see that the string in question is at offset 0x27, and if we print that, we see the correct "update-notifier". Thread 511 hit Breakpoint 6, print_type_string (s=0x880078fd1090, name=0x880078fe4d70 "arg2", data=0x88007d01f060, ent=0x88007d01f04c) at /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c:67 67 in /build/linux-EsXT4r/linux-4.18.0/kernel/trace/trace_probe.c gdb$ p *(uint32_t *) data $49 = 0xf0027 gdb$ p ((char *)ent + 0x27) $50 = 0x88007d01f073 "update-notifier" Looking at the bytes in memory and the offsets it becomes clear that there is no \0 byte at the end of the first entry (which would need to be at address 0x88007d01f064 + 0xf = 0x88007d01f073 but instead that's the start address of the second entry which simply gets consumed by the (first) "%s" as well. gdb$ x/32x ent 0x88007d01f04c: 0x00010592 0x2143 0xe83522a0 0x7f7f 0x88007d01f05c: 0x000f0018 0x000f0027 0x61647075 0x6e2d6574 0x88007d01f06c: 0x6669746f 0x75726569
uprobes: bug in comm/string output?
Hi, I've been playing around with uprobes today and found the following weird behaviour/output when using more than one string argument (or using the $comm argument). This was run on a v4.20 mainline build on Ubuntu 18.04. root@ubuntu1810:~# uname -a Linux ubuntu1810 4.20.0-042000-generic #201812232030 SMP Mon Dec 24 01:32:58 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux I'm trying to track calls to dlopen so I'm looking up the correct offset in libdl.so: root@ubuntu1810:/sys/kernel/debug/tracing# readelf -s /lib/x86_64-linux-gnu/libdl-2.28.so | grep dlopen 34: 12a0 133 FUNCGLOBAL DEFAULT 14 dlopen@@GLIBC_2.2.5 Then I'm creating a uprobe with two prints of $comm and two prints of the first argument to dlopen, and enable that probe. The '/root/test' program only does a dlopen("libc.so.6", RTLD_LAZY) in main(). root@ubuntu1810:/sys/kernel/debug/tracing# echo 'p:dlopen /lib/x86_64-linux-gnu/libdl-2.28.so:0x12a0 $comm $comm +0(%di):string +0(%di):string' > uprobe_events root@ubuntu1810:/sys/kernel/debug/tracing# echo 1 > events/uprobes/dlopen/enable root@ubuntu1810:/sys/kernel/debug/tracing# /root/test The trace output looks like this: root@ubuntu1810:/sys/kernel/debug/tracing# cat trace # tracer: nop # # _-=> irqs-off # / _=> need-resched #| / _---=> hardirq/softirq #|| / _--=> preempt-depth #||| / delay # TASK-PID CPU# TIMESTAMP FUNCTION # | | | | | test-1617 [000] d... 1237.959168: dlopen: (0x7fbd5272e2a0) arg1=(fault) arg2=(fault) arg3="libc.so.6libc.so.6" arg4="libc.so.6" That's very weird for two reasons: - fetching $comm seems to fail with an invalid pointer - arg3 contains the text twice (if I add another print of the argument, arg3 will contain the wanted string three times, arg4 two times and the last argument will contain it once). On the "standard" kernel shipped with Ubuntu 18.04 (4.18) printing $comm works but also "accumulates" (in lack of a better word) the later string arguments in the earlier output arguments, so for the probe above arg1 would be "testtestlibc.so.6libc.so.6", arg2 would be "testlibc.so.6libc.so.6" and arg3/arg4 will be the same as in the output above. Is there anything in the documentation why multiple string outputs might not work with uprobes? Am I installing the uprobe wrong? Or is this a bug? I found that the kprobe selftest at tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_string.tc contains a similar situation for kprobes (it prints the parameter two times) which works fine on the same system. Regards, Andreas smime.p7s Description: S/MIME Cryptographic Signature