lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aStEaM9tcGlRclQ4@google.com>
Date: Sat, 29 Nov 2025 11:07:20 -0800
From: Namhyung Kim <namhyung@...nel.org>
To: Steven Rostedt <rostedt@...dmis.org>
Cc: Arnaldo Carvalho de Melo <acme@...nel.org>,
	Ian Rogers <irogers@...gle.com>,
	James Clark <james.clark@...aro.org>, Jiri Olsa <jolsa@...nel.org>,
	Adrian Hunter <adrian.hunter@...el.com>,
	Peter Zijlstra <peterz@...radead.org>,
	Ingo Molnar <mingo@...nel.org>, LKML <linux-kernel@...r.kernel.org>,
	linux-perf-users@...r.kernel.org,
	Thomas Richter <tmricht@...ux.ibm.com>,
	Howard Chu <howardchu95@...il.com>
Subject: Re: [PATCH] perf trace: Skip internal syscall arguments

On Thu, Nov 27, 2025 at 08:30:52PM -0500, Steven Rostedt wrote:
> On Wed, 26 Nov 2025 20:44:18 -0800
> Namhyung Kim <namhyung@...nel.org> wrote:
> 
> > Recent changes in the linux-next kernel will add new field for syscalls
> > to have contents in the userspace like below.
> > 
> >   # cat /sys/kernel/tracing/events/syscalls/sys_enter_write/format
> >   name: sys_enter_write
> >   ID: 758
> >   format:
> >           field:unsigned short common_type;       offset:0;       size:2; signed:0;
> >           field:unsigned char common_flags;       offset:2;       size:1; signed:0;
> >           field:unsigned char common_preempt_count;       offset:3;       size:1; signed:0;
> >           field:int common_pid;   offset:4;       size:4; signed:1;
> > 
> >           field:int __syscall_nr; offset:8;       size:4; signed:1;
> >           field:unsigned int fd;  offset:16;      size:8; signed:0;
> >           field:const char * buf; offset:24;      size:8; signed:0;
> >           field:size_t count;     offset:32;      size:8; signed:0;
> >           field:__data_loc char[] __buf_val;      offset:40;      size:4; signed:0;
> > 
> >   print fmt: "fd: 0x%08lx, buf: 0x%08lx (%s), count: 0x%08lx", ((unsigned long)(REC->fd)),
> >              ((unsigned long)(REC->buf)), __print_dynamic_array(__buf_val, 1),
> >              ((unsigned long)(REC->count))
> > 
> > We have a different way to handle those arguments and this change
> > confuses perf trace then make some tests failing.  Fix it by skipping
> > the new fields that have "__data_loc char[]" type.
> > 
> > Maybe we can switch to this instead of the BPF augmentation later.
> > 
> 
> Even with this patch applied, I still have a segfault with this command:
> 
> # ./perf trace -e syscalls:sys_enter_write 

What about this?

  # ./perf trace -e write

Thanks,
Namhyung


>      0.000 sshd-session/5421 syscalls:sys_enter_write(perf: Segmentation fault
>     #0 0x560ea815187a in dump_stack debug.c:366
>     #1 0x560ea81518f0 in sighandler_dump_stack debug.c:378
>     #2 0x7fb5e14d1df0 in __restore_rt libc_sigaction.c:0
>     #3 0x560ea7fc0cec in syscall_arg__scnprintf_buf builtin-trace.c:1857
>     #4 0x560ea7fc2692 in syscall_arg_fmt__scnprintf_val builtin-trace.c:2398
>     #5 0x560ea7fc2aad in syscall__scnprintf_args builtin-trace.c:2476
>     #6 0x560ea7fc3ea2 in trace__fprintf_sys_enter builtin-trace.c:2885
>     #7 0x560ea7fc57a5 in trace__event_handler builtin-trace.c:3312
>     #8 0x560ea7fc68dd in trace__handle_event builtin-trace.c:3649
>     #9 0x560ea7fc7f7a in __trace__deliver_event builtin-trace.c:4183
>     #10 0x560ea7fc80cc in trace__deliver_event builtin-trace.c:4209
>     #11 0x560ea7fc92b7 in trace__run builtin-trace.c:4577
>     #12 0x560ea7fcd648 in cmd_trace builtin-trace.c:5773
>     #13 0x560ea7fd35e3 in run_builtin perf.c:349
>     #14 0x560ea7fd387b in handle_internal_command perf.c:401
>     #15 0x560ea7fd39d4 in run_argv perf.c:448
>     #16 0x560ea7fd3d1d in main perf.c:555
>     #17 0x7fb5e14bbca8 in __libc_start_call_main libc_start_call_main.h:74
>     #18 0x7fb5e14bbd65 in __libc_start_main@@GLIBC_2.34 libc-start.c:128
>     #19 0x560ea7f25f41 in _start perf[53f41]
> Segmentation fault
> 
> This doesn't crash in a kernel without the __data_loc.
> 
> -- Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ