From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D40B2C761A6 for ; Tue, 28 Mar 2023 21:32:11 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 685426B0075; Tue, 28 Mar 2023 17:32:11 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 636706B0078; Tue, 28 Mar 2023 17:32:11 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4FE72900002; Tue, 28 Mar 2023 17:32:11 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 424046B0075 for ; Tue, 28 Mar 2023 17:32:11 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 1A75580B2D for ; Tue, 28 Mar 2023 21:32:11 +0000 (UTC) X-FDA: 80619605262.21.F24DDA8 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf05.hostedemail.com (Postfix) with ESMTP id 0A7EE100006 for ; Tue, 28 Mar 2023 21:32:08 +0000 (UTC) Authentication-Results: imf05.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf05.hostedemail.com: domain of "SRS0=rtO5=7U=goodmis.org=rostedt@kernel.org" designates 145.40.68.75 as permitted sender) smtp.mailfrom="SRS0=rtO5=7U=goodmis.org=rostedt@kernel.org" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1680039129; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jPHAJ6qp9y2lgPIvqxwseM1JFqmp0gVfcZL1tJQv860=; b=SePth3YgqKQDvTCMTanYy1bSYBvpJQ61F3fdjuhoyQOb4Kx4QL6Em2UW1oflz95z5nYg/7 OmmhrXCPhRYGm7ViUsZzekSpahEBf+mmaUKmNQ5xdZ+pqoPncZo19d0Frk1iWOTfS/9Ek9 nSIeaJ+orUNDkSdId3aUfxbuKIY789c= ARC-Authentication-Results: i=1; imf05.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf05.hostedemail.com: domain of "SRS0=rtO5=7U=goodmis.org=rostedt@kernel.org" designates 145.40.68.75 as permitted sender) smtp.mailfrom="SRS0=rtO5=7U=goodmis.org=rostedt@kernel.org" ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1680039129; a=rsa-sha256; cv=none; b=M1qze4pdJsRw/VyLkBHkug74KzDBHc3QFIjJZN9EcQk/UCIBIyQfW8NiwONG17wOGXA0te TXqouO/2mZSVz82auqpQ3l7Z2aQdWg19BpXaueK2Y+/nrf3RX9eEW5HsnKwLSo2uwGNYz8 60ZuRhzT7uPJOcRE2TDE1uxuxCMUQLc= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 55F76B81E73; Tue, 28 Mar 2023 21:32:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9AC12C433D2; Tue, 28 Mar 2023 21:32:04 +0000 (UTC) Date: Tue, 28 Mar 2023 17:32:00 -0400 From: Steven Rostedt To: Beau Belgrave Cc: mhiramat@kernel.org, mathieu.desnoyers@efficios.com, dcook@linux.microsoft.com, alanau@linux.microsoft.com, brauner@kernel.org, akpm@linux-foundation.org, ebiederm@xmission.com, keescook@chromium.org, tglx@linutronix.de, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: Re: [PATCH v9 05/11] tracing/user_events: Add ioctl for disabling addresses Message-ID: <20230328173200.22ac45dc@gandalf.local.home> In-Reply-To: <20230324223028.172-6-beaub@linux.microsoft.com> References: <20230324223028.172-1-beaub@linux.microsoft.com> <20230324223028.172-6-beaub@linux.microsoft.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 0A7EE100006 X-Stat-Signature: nsxg8dbf15r5gamkpptgwmtkhprrj4ty X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1680039128-681606 X-HE-Meta: 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 2/8xi2Al 7AAu37vT01tRD9n5czTGDHEUVqocM8hqOGhFpNVACDdhn+I2h5kDbJcsv+X0DWsVBfNXEO0EN5IShJ6XoP4J8sk7GYmGUWYvRm+sJkvX9Y6E+EObdxQYC7eTiWXHdFym9EYi8B6wUI0kuLGns1idzwyItwDmwusoSAjSStYTKPpWWWoR+M0Nmush+yhyXcl5JJOBvO63r+VbE+avsJAhZOirePXElYamWZfqnH3eZfK5skorc6osa83LPlCG7YFLmATyaYMoFjx47fY8vGcuWDdHhRex7/iJ6SG7Z2ZORhA8eRI/+HeflfVG9bg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, 24 Mar 2023 15:30:22 -0700 Beau Belgrave wrote: > Enablements are now tracked by the lifetime of the task/mm. User > processes need to be able to disable their addresses if tracing is > requested to be turned off. Before unmapping the page would suffice. > However, we now need a stronger contract. Add an ioctl to enable this. > > A new flag bit is added, freeing, to user_event_enabler to ensure that > if the event is attempted to be removed while a fault is being handled > that the remove is delayed until after the fault is reattempted. > > Signed-off-by: Beau Belgrave > --- > include/uapi/linux/user_events.h | 24 +++++++++ > kernel/trace/trace_events_user.c | 93 +++++++++++++++++++++++++++++++- > 2 files changed, 115 insertions(+), 2 deletions(-) > > diff --git a/include/uapi/linux/user_events.h b/include/uapi/linux/user_events.h > index 22521bc622db..3e7275e3234a 100644 > --- a/include/uapi/linux/user_events.h > +++ b/include/uapi/linux/user_events.h > @@ -46,6 +46,27 @@ struct user_reg { > __u32 write_index; > } __attribute__((__packed__)); > > +/* > + * Describes an event unregister, callers must set the size, address and bit. > + * This structure is passed to the DIAG_IOCSUNREG ioctl to disable bit updates. > + */ > +struct user_unreg { > + /* Input: Size of the user_unreg structure being used */ > + __u32 size; > + > + /* Input: Bit to unregister */ > + __u8 disable_bit; > + > + /* Input: Reserved, set to 0 */ > + __u8 __reserved; > + > + /* Input: Reserved, set to 0 */ > + __u16 __reserved2; These are reserved so they must be set to zero, such that old programs do not break when they become meaningful and something had it randomly set (due to being uninitialized). > + > + /* Input: Address to unregister */ > + __u64 disable_addr; > +} __attribute__((__packed__)); > + > #define DIAG_IOC_MAGIC '*' > > @@ -2086,6 +2100,75 @@ static long user_events_ioctl_del(struct user_event_file_info *info, > return ret; > } > > +static long user_unreg_get(struct user_unreg __user *ureg, > + struct user_unreg *kreg) > +{ > + u32 size; > + long ret; > + > + ret = get_user(size, &ureg->size); > + > + if (ret) > + return ret; > + > + if (size > PAGE_SIZE) > + return -E2BIG; > + > + if (size < offsetofend(struct user_unreg, disable_addr)) > + return -EINVAL; > + > + ret = copy_struct_from_user(kreg, sizeof(*kreg), ureg, size); > + > + return ret; > +} > + > +/* > + * Unregisters an enablement address/bit within a task/user mm. > + */ > +static long user_events_ioctl_unreg(unsigned long uarg) > +{ > + struct user_unreg __user *ureg = (struct user_unreg __user *)uarg; > + struct user_event_mm *mm = current->user_event_mm; > + struct user_event_enabler *enabler, *next; > + struct user_unreg reg; > + long ret; > + > + ret = user_unreg_get(ureg, ®); > + > + if (ret) > + return ret; > + > + if (!mm) > + return -ENOENT; > + > + ret = -ENOENT; Probably should add: if (reg.__reserved || reg.__reserved2) return -EINVAL; here. -- Steve > + > + /* > + * Flags freeing and faulting are used to indicate if the enabler is in > + * use at all. When faulting is set a page-fault is occurring asyncly. > + * During async fault if freeing is set, the enabler will be destroyed. > + * If no async fault is happening, we can destroy it now since we hold > + * the event_mutex during these checks. > + */ > + mutex_lock(&event_mutex); > + > + list_for_each_entry_safe(enabler, next, &mm->enablers, link) > + if (enabler->addr == reg.disable_addr && > + (enabler->values & ENABLE_VAL_BIT_MASK) == reg.disable_bit) { > + set_bit(ENABLE_VAL_FREEING_BIT, ENABLE_BITOPS(enabler)); > + > + if (!test_bit(ENABLE_VAL_FAULTING_BIT, ENABLE_BITOPS(enabler))) > + user_event_enabler_destroy(enabler); > + > + /* Removed at least one */ > + ret = 0; > + } > + > + mutex_unlock(&event_mutex); > + > + return ret; > +} > + > /* > * Handles the ioctl from user mode to register or alter operations. > */ > @@ -2108,6 +2191,12 @@ static long user_events_ioctl(struct file *file, unsigned int cmd, > ret = user_events_ioctl_del(info, uarg); > mutex_unlock(&group->reg_mutex); > break; > + > + case DIAG_IOCSUNREG: > + mutex_lock(&group->reg_mutex); > + ret = user_events_ioctl_unreg(uarg); > + mutex_unlock(&group->reg_mutex); > + break; > } > > return ret;