Received: by 10.192.165.156 with SMTP id m28csp1515353imm; Wed, 18 Apr 2018 10:52:31 -0700 (PDT) X-Google-Smtp-Source: AIpwx4874yy8HOzjVVdkJWDU3SD287xFG2LkCFpRI4t0uRamRA+V63mgysATdgeRLDzj3oP9uo6+ X-Received: by 2002:a17:902:bf04:: with SMTP id bi4-v6mr2913682plb.143.1524073951507; Wed, 18 Apr 2018 10:52:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524073951; cv=none; d=google.com; s=arc-20160816; b=kKawDu2AZ5mIvNf1HBVZt97aiCreHxGUWTRxL5qwu2oSx1oF/oeetUs+kDFVI20rxP 7i4CcBVf0/r50b8rLmOOCfbe88624Tbb2YpbdGrju6drOB8jmkcxlhVoYSRpV9GmrQZd RsMRSj4lJmrZE6lbeR97EfYPyxWFcbWtKgIcL7Dba3CV4qcv8GcTJgWQjW0AY0GUfSNn djLrkDRrvs5CzU/RArDYFyCJQd14ix79HNAFmCzClpabqWBPiKjm0YHpwnLZ3Xi5/nCv hI37VNC7alYYHT8afTuCnZ6+ncSUASVtqpTHIUXREbQqF6orOmzrDs3xrbx0MglQd0QM k5ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:spamdiagnosticmetadata:spamdiagnosticoutput :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature :dkim-signature:arc-authentication-results; bh=vANYXPwloe/8o7DhGsowvXTHkFnHC98FGCdpCImnPLY=; b=hAgr/31OB1qO0RYkB9ioi+pifhWAQBGuEvOtNxkkpnE1IZTzzhAr0KTJT+IkvJnTeo Ep5Srn9lShcXsOF37yhaeMpKEitDx8DDxQePeeJEkyO40BsuMWPHkIdZNLo5mPRb6mGQ dym7kv2YlqNYYQi2Ya/Ljp4w4S7qpCKcdNjmxjshZPYOeoPs82v3A8t6wqyTdsZ25Ktp sbnvvunaaaDApeuZKpJaI0teguKb9xNtxONDyaAdQ0m3m3p5h8be/8+/WSb0zWd6JfMR N7ltsZfITTNnEx8+plg5yZTK5Pxf2lnnJVCzgpqh0WWZlQWSZjmB/P2KPKiuukY1O5Dt FQvw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=nJiKXemI; dkim=pass header.i=@fb.onmicrosoft.com header.s=selector1-fb-com header.b=Cdy+3YhD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t10si1456260pgr.548.2018.04.18.10.52.16; Wed, 18 Apr 2018 10:52:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=nJiKXemI; dkim=pass header.i=@fb.onmicrosoft.com header.s=selector1-fb-com header.b=Cdy+3YhD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752634AbeDRRvE (ORCPT + 99 others); Wed, 18 Apr 2018 13:51:04 -0400 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:48580 "EHLO mx0b-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750885AbeDRRvC (ORCPT ); Wed, 18 Apr 2018 13:51:02 -0400 Received: from pps.filterd (m0109331.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3IHmKPu032224; Wed, 18 Apr 2018 10:50:55 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=facebook; bh=vANYXPwloe/8o7DhGsowvXTHkFnHC98FGCdpCImnPLY=; b=nJiKXemIrjPorjhG65lSU+9YspNnl/nKvDN8TUn1a3nFf3l3YPtNKwGoeg+DI3SxBWtR v8l1Bd3wyE+dKmpGy2cE+tx/Fis2dZOsTrs8RhJT+dsFF/+3tRgv1krgq8cWWYh4RwUs E9oGanu1VrbCQOwjuH6q7RghOD5aIQ/j0h0= Received: from mail.thefacebook.com ([199.201.64.23]) by mx0a-00082601.pphosted.com with ESMTP id 2he8ut0dtq-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 18 Apr 2018 10:50:55 -0700 Received: from NAM02-BL2-obe.outbound.protection.outlook.com (192.168.54.28) by o365-in.thefacebook.com (192.168.16.15) with Microsoft SMTP Server (TLS) id 14.3.361.1; Wed, 18 Apr 2018 10:50:53 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.onmicrosoft.com; s=selector1-fb-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=vANYXPwloe/8o7DhGsowvXTHkFnHC98FGCdpCImnPLY=; b=Cdy+3YhDMYkw3mMad3aFxKHahVvXmnPwx7bAioKXvQKbVH1F0Rh0bFa2r/VoDrfT9mUlNB7LxdCLMq4q0NEEjuXbyk1PB1JE2xzIxE6qN3yf6ZZxV0STKr6siQE9otiL/vG5hJi9/rGIVlhjjfU7z5PPxAw25MuDJ3gv78NBjJE= Received: from DM5PR15MB1548.namprd15.prod.outlook.com (10.173.222.139) by DM5PR15MB1836.namprd15.prod.outlook.com (10.174.247.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.675.13; Wed, 18 Apr 2018 17:50:51 +0000 Received: from DM5PR15MB1548.namprd15.prod.outlook.com ([fe80::d87a:fa34:57e7:1e2c]) by DM5PR15MB1548.namprd15.prod.outlook.com ([fe80::d87a:fa34:57e7:1e2c%17]) with mapi id 15.20.0675.015; Wed, 18 Apr 2018 17:50:51 +0000 From: Song Liu To: Steven Rostedt CC: "linux-kernel@vger.kernel.org" , Kernel Team , Ingo Molnar , Howard McLauchlan , Josef Bacik , Srikar Dronamraju , Miklos Szeredi Subject: Re: [PATCH v2] tracing: fix bad use of igrab in trace_uprobe.c Thread-Topic: [PATCH v2] tracing: fix bad use of igrab in trace_uprobe.c Thread-Index: AQHT1zxd/hOH+TsgmUiWuxUvrApKJqQGzEsAgAAAzwA= Date: Wed, 18 Apr 2018 17:50:51 +0000 Message-ID: References: <20180418174014.1592871-1-songliubraving@fb.com> <20180418134756.482c899f@gandalf.local.home> In-Reply-To: <20180418134756.482c899f@gandalf.local.home> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3445.6.18) authentication-results: goodmis.org; dkim=none (message not signed) header.d=none;goodmis.org; dmarc=none action=none header.from=fb.com; x-originating-ip: [2620:10d:c090:180::1:db29] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR15MB1836;7:9MAZrW0sEUlJj4SXnZiv9LB9FHrs7lagXs0Eh6b2oJ+11VcCU36WnRvu3dpyzze6R1TBHcGvcWAyy1bNu8+S3KZJ5OySnmqGRLzDaoGKBp9NG4CFARt3zTzXng/oyLVRwV38d9P+pmLZNAk4U4L/EHQ0ixJ3vkLkNAKzHLmrzNleWG2amtv4PUdQ/E0/5GRTNVjTFwUwYjglRowdLtZKJYULjItlUWLiLavgr0MRDpH4xctaZFaNffVX5lKTUBLm;20:4RV3zg26DX4aD1ZcuZfG+07zQ+TniiDVcb9fIJnSPsGH8p0Ln40lpn6FxtkRBRYKI315cIy3TjuXBmBx7uDMAD/wBbm7Uttw1AoOgRKm6NZl0J6uAGDVn0oDZbiTpYsRZ4bvCw+HRNaIaKVCHvQCeA/jvfI5FdRRFj8SnF5xqs8= x-ms-exchange-antispam-srfa-diagnostics: SOS;SOR; x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);SRVR:DM5PR15MB1836; x-ms-traffictypediagnostic: DM5PR15MB1836: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(67672495146484)(104084551191319); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231232)(11241501184)(944501327)(52105095)(6041310)(20161123564045)(20161123560045)(20161123562045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011);SRVR:DM5PR15MB1836;BCL:0;PCL:0;RULEID:;SRVR:DM5PR15MB1836; x-forefront-prvs: 06469BCC91 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(346002)(366004)(376002)(39860400002)(39380400002)(305945005)(4326008)(8676002)(5660300001)(316002)(81166006)(8936002)(54906003)(6916009)(3280700002)(7736002)(3660700001)(6116002)(6246003)(2906002)(478600001)(5250100002)(59450400001)(11346002)(102836004)(6506007)(186003)(33656002)(76176011)(53546011)(6486002)(6436002)(6512007)(476003)(229853002)(53936002)(25786009)(57306001)(83716003)(446003)(99286004)(36756003)(82746002)(14454004)(2616005)(86362001)(575784001)(50226002);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR15MB1836;H:DM5PR15MB1548.namprd15.prod.outlook.com;FPR:;SPF:None;LANG:en;MLV:sfv; x-microsoft-antispam-message-info: gwg3hETboxR8EZos6iWBM7ewA99R7GpEmbK1rHgWTsvKH/MNhd5c3APGj4SdPN1Btmme0Hg4PV2z+YdzMNn33Mw+AU1meI6lnTlOXgmNvWrIYmgHaLtVkkB/qPz+HAESPbXGZhq5b0CwCbzYAcbN835sD6ZzOIuqYVXcEfuNRlsWwjD5m5sZb/Q8boRx0XJr spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-ID: <35925EEBDAD3B2489D3B073591090B58@namprd15.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 08f3225d-931b-4ab8-c241-08d5a554ecf6 X-MS-Exchange-CrossTenant-Network-Message-Id: 08f3225d-931b-4ab8-c241-08d5a554ecf6 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2018 17:50:51.2973 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR15MB1836 X-OriginatorOrg: fb.com X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-18_04:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Apr 18, 2018, at 10:47 AM, Steven Rostedt wrote: >=20 > You forgot to add Miklos again. >=20 I am really sorry! I was expecting "Reported-by" to add Miklos. Song > Miklos, have any comments on this patch? Or can you give a > "Reviewed-by"? >=20 > -- Steve >=20 >=20 > On Wed, 18 Apr 2018 10:40:14 -0700 > Song Liu wrote: >=20 >> As Miklos reported and suggested: >>=20 >> This pattern repeats two times in trace_uprobe.c and in >> kernel/events/core.c as well: >>=20 >> ret =3D kern_path(filename, LOOKUP_FOLLOW, &path); >> if (ret) >> goto fail_address_parse; >>=20 >> inode =3D igrab(d_inode(path.dentry)); >> path_put(&path); >>=20 >> And it's wrong. You can only hold a reference to the inode if you >> have an active ref to the superblock as well (which is normally >> through path.mnt) or holding s_umount. >>=20 >> This way unmounting the containing filesystem while the tracepoint is >> active will give you the "VFS: Busy inodes after unmount..." message >> and a crash when the inode is finally put. >>=20 >> Solution: store path instead of inode. >>=20 >> This patch fixes two instances in trace_uprobe.c. >>=20 >> Fixes: f3f096cfedf8 ("tracing: Provide trace events interface for uprobe= s") >> Fixes: 33ea4b24277b ("perf/core: Implement the 'perf_uprobe' PMU") >> Cc: Steven Rostedt >> Cc: Ingo Molnar >> Cc: Howard McLauchlan >> Cc: Josef Bacik >> Cc: Srikar Dronamraju >> Reported-by: Miklos Szeredi >> Signed-off-by: Song Liu >> --- >> kernel/trace/trace_uprobe.c | 49 +++++++++++++++------------------------= ------ >> 1 file changed, 16 insertions(+), 33 deletions(-) >>=20 >> diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c >> index 34fd0e0..d9ee522c 100644 >> --- a/kernel/trace/trace_uprobe.c >> +++ b/kernel/trace/trace_uprobe.c >> @@ -55,7 +55,7 @@ struct trace_uprobe { >> struct list_head list; >> struct trace_uprobe_filter filter; >> struct uprobe_consumer consumer; >> - struct inode *inode; >> + struct path path; >> char *filename; >> unsigned long offset; >> unsigned long nhit; >> @@ -289,7 +289,7 @@ static void free_trace_uprobe(struct trace_uprobe *t= u) >> for (i =3D 0; i < tu->tp.nr_args; i++) >> traceprobe_free_probe_arg(&tu->tp.args[i]); >>=20 >> - iput(tu->inode); >> + path_put(&tu->path); >> kfree(tu->tp.call.class->system); >> kfree(tu->tp.call.name); >> kfree(tu->filename); >> @@ -363,7 +363,6 @@ static int register_trace_uprobe(struct trace_uprobe= *tu) >> static int create_trace_uprobe(int argc, char **argv) >> { >> struct trace_uprobe *tu; >> - struct inode *inode; >> char *arg, *event, *group, *filename; >> char buf[MAX_EVENT_NAME_LEN]; >> struct path path; >> @@ -371,7 +370,6 @@ static int create_trace_uprobe(int argc, char **argv= ) >> bool is_delete, is_return; >> int i, ret; >>=20 >> - inode =3D NULL; >> ret =3D 0; >> is_delete =3D false; >> is_return =3D false; >> @@ -437,24 +435,14 @@ static int create_trace_uprobe(int argc, char **ar= gv) >> } >> /* Find the last occurrence, in case the path contains ':' too. */ >> arg =3D strrchr(argv[1], ':'); >> - if (!arg) { >> - ret =3D -EINVAL; >> - goto fail_address_parse; >> - } >> + if (!arg) >> + return -EINVAL; >>=20 >> *arg++ =3D '\0'; >> filename =3D argv[1]; >> ret =3D kern_path(filename, LOOKUP_FOLLOW, &path); >> if (ret) >> - goto fail_address_parse; >> - >> - inode =3D igrab(d_real_inode(path.dentry)); >> - path_put(&path); >> - >> - if (!inode || !S_ISREG(inode->i_mode)) { >> - ret =3D -EINVAL; >> - goto fail_address_parse; >> - } >> + return ret; >>=20 >> ret =3D kstrtoul(arg, 0, &offset); >> if (ret) >> @@ -490,7 +478,7 @@ static int create_trace_uprobe(int argc, char **argv= ) >> goto fail_address_parse; >> } >> tu->offset =3D offset; >> - tu->inode =3D inode; >> + tu->path =3D path; >> tu->filename =3D kstrdup(filename, GFP_KERNEL); >>=20 >> if (!tu->filename) { >> @@ -558,7 +546,7 @@ static int create_trace_uprobe(int argc, char **argv= ) >> return ret; >>=20 >> fail_address_parse: >> - iput(inode); >> + path_put(&path); >>=20 >> pr_info("Failed to parse address or file.\n"); >>=20 >> @@ -922,7 +910,8 @@ probe_event_enable(struct trace_uprobe *tu, struct t= race_event_file *file, >> goto err_flags; >>=20 >> tu->consumer.filter =3D filter; >> - ret =3D uprobe_register(tu->inode, tu->offset, &tu->consumer); >> + ret =3D uprobe_register(d_inode(tu->path.dentry), tu->offset, >> + &tu->consumer); >> if (ret) >> goto err_buffer; >>=20 >> @@ -966,7 +955,7 @@ probe_event_disable(struct trace_uprobe *tu, struct = trace_event_file *file) >>=20 >> WARN_ON(!uprobe_filter_is_empty(&tu->filter)); >>=20 >> - uprobe_unregister(tu->inode, tu->offset, &tu->consumer); >> + uprobe_unregister(d_inode(tu->path.dentry), tu->offset, &tu->consumer)= ; >> tu->tp.flags &=3D file ? ~TP_FLAG_TRACE : ~TP_FLAG_PROFILE; >>=20 >> uprobe_buffer_disable(); >> @@ -1041,7 +1030,8 @@ static int uprobe_perf_close(struct trace_uprobe *= tu, struct perf_event *event) >> write_unlock(&tu->filter.rwlock); >>=20 >> if (!done) >> - return uprobe_apply(tu->inode, tu->offset, &tu->consumer, false); >> + return uprobe_apply(d_inode(tu->path.dentry), tu->offset, >> + &tu->consumer, false); >>=20 >> return 0; >> } >> @@ -1073,7 +1063,8 @@ static int uprobe_perf_open(struct trace_uprobe *t= u, struct perf_event *event) >>=20 >> err =3D 0; >> if (!done) { >> - err =3D uprobe_apply(tu->inode, tu->offset, &tu->consumer, true); >> + err =3D uprobe_apply(d_inode(tu->path.dentry), >> + tu->offset, &tu->consumer, true); >> if (err) >> uprobe_perf_close(tu, event); >> } >> @@ -1337,7 +1328,6 @@ struct trace_event_call * >> create_local_trace_uprobe(char *name, unsigned long offs, bool is_return= ) >> { >> struct trace_uprobe *tu; >> - struct inode *inode; >> struct path path; >> int ret; >>=20 >> @@ -1345,14 +1335,6 @@ create_local_trace_uprobe(char *name, unsigned lo= ng offs, bool is_return) >> if (ret) >> return ERR_PTR(ret); >>=20 >> - inode =3D igrab(d_inode(path.dentry)); >> - path_put(&path); >> - >> - if (!inode || !S_ISREG(inode->i_mode)) { >> - iput(inode); >> - return ERR_PTR(-EINVAL); >> - } >> - >> /* >> * local trace_kprobes are not added to probe_list, so they are never >> * searched in find_trace_kprobe(). Therefore, there is no concern of >> @@ -1364,11 +1346,12 @@ create_local_trace_uprobe(char *name, unsigned l= ong offs, bool is_return) >> if (IS_ERR(tu)) { >> pr_info("Failed to allocate trace_uprobe.(%d)\n", >> (int)PTR_ERR(tu)); >> + path_put(&path); >> return ERR_CAST(tu); >> } >>=20 >> tu->offset =3D offs; >> - tu->inode =3D inode; >> + tu->path =3D path; >> tu->filename =3D kstrdup(name, GFP_KERNEL); >> init_trace_event_call(tu, &tu->tp.call); >>=20 >=20