Received: by 10.192.165.156 with SMTP id m28csp919286imm; Thu, 19 Apr 2018 09:39:17 -0700 (PDT) X-Google-Smtp-Source: AIpwx49ce+aFIsJGbYWwQRAGBxz62MeNivdPhxSVn/1DMFGpwyfnM6ehcOI9J7PtMNMAUfogZClz X-Received: by 2002:a17:902:b212:: with SMTP id t18-v6mr6694416plr.137.1524155957661; Thu, 19 Apr 2018 09:39:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524155957; cv=none; d=google.com; s=arc-20160816; b=LbHSOPnBMNn4Ye4l5oebB11wYiMXqU156j/Ku+2XS6WsjPSJ253LDzVz4yllQBfBRv 2jfPeYZuDDR1jPAgf7k9j62TxGdvY40M22WOBNyj7sfpDtaA3IBjr7Fk9uMhgthqGTZS OAB4wQCdjn8HVRj9zsqxKu59mYeVdPvnJQgeknHH89GgGGDTHKRQIRqDAFSbexU1FsXW iLDHk2jdX8z10o/Oel2UsdPi/LD6dXmhRbhoKoZYADLcE1Xt5JLUzxnw/OmTUd6g37Ep o9Rt0l9fB1Tx2NhPoKibFx+OlgKN2gYC1+Y7CZlGa10OHWiTHUe//dsgLeMs4t1Y71/4 nZdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:spamdiagnosticmetadata:spamdiagnosticoutput :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature :dkim-signature:arc-authentication-results; bh=1BjGCyCdSHDoD8YP29byEbnUueHh0e02FENIWn/kb5s=; b=IbEBIF1HhL7BvjI4XO9bkrDp7FEg53uf8GH5s+D+gmjd07NZYmcgn14jdi4ZpjqOh1 qFFYFuXgaHlsAbK9vAz5PJ5Ms0SVzkZAB0EaZipzqzAX0qZuyZ8BGXErzBSi3q5hrgmP OmftGEJRiJvHRnqLcbBfaNj1pvqGV6Y3nne5tz1xZ0Km5CcAbohfV01y1itHPIY7sMdV vJ/rVR8x+NIakRcAtQPluQlNq+o5aU0JSp37D576X3uJFmt5bw8dH2O6exq4owTBTpPV zwyFOvuFjP3NYLoM/ach8Xu5IJUFDq4jVSCwMNAzvUcDGXxwBD8Sn/5CrRmgLWnZdJJX Kzmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=J9p7NIVW; dkim=pass header.i=@fb.onmicrosoft.com header.s=selector1-fb-com header.b=Ys3jqzbU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a73si3452170pfe.23.2018.04.19.09.39.01; Thu, 19 Apr 2018 09:39:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=J9p7NIVW; dkim=pass header.i=@fb.onmicrosoft.com header.s=selector1-fb-com header.b=Ys3jqzbU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754067AbeDSQh1 (ORCPT + 99 others); Thu, 19 Apr 2018 12:37:27 -0400 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:53826 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754043AbeDSQhZ (ORCPT ); Thu, 19 Apr 2018 12:37:25 -0400 Received: from pps.filterd (m0109334.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3JGY8fe000459; Thu, 19 Apr 2018 09:37:12 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=facebook; bh=1BjGCyCdSHDoD8YP29byEbnUueHh0e02FENIWn/kb5s=; b=J9p7NIVWs/YhoK7k1nHoswuZlYYnEcgzogD+mi+mcZm1R8DNs14+6IB/dL8JyNTBfXTx MgbJ6mR2+H+iEEcv6/A/4jlzDJ+oK6BPJKXShvDuGjylvhW1rP0EPRisueocwhTwMsTX lZOV66ZMdMLnfh2ueV5E0JSLYSy42rR/kWg= Received: from maileast.thefacebook.com ([199.201.65.23]) by mx0a-00082601.pphosted.com with ESMTP id 2heuadrmgq-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 19 Apr 2018 09:37:12 -0700 Received: from NAM01-BY2-obe.outbound.protection.outlook.com (192.168.183.28) by o365-in.thefacebook.com (192.168.177.33) with Microsoft SMTP Server (TLS) id 14.3.361.1; Thu, 19 Apr 2018 12:37:10 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.onmicrosoft.com; s=selector1-fb-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=1BjGCyCdSHDoD8YP29byEbnUueHh0e02FENIWn/kb5s=; b=Ys3jqzbUBpLB2hYmBrMjPG1o/yXGErtO5VyDlQbqVDinNQg9SW/buUVexyHnhqdxf0kC8d+/tyXXsbNji4GokOUAE+kMA33Qdn+llR31Md0HyuULxuCpWnecXU5HVBQNMiJ/IwWwcpyBhc3b3cYSFd89yQHlgH63ZWnk4WBMKws= Received: from DM5PR15MB1548.namprd15.prod.outlook.com (10.173.222.139) by DM5PR15MB1547.namprd15.prod.outlook.com (10.173.222.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.675.13; Thu, 19 Apr 2018 16:37:08 +0000 Received: from DM5PR15MB1548.namprd15.prod.outlook.com ([fe80::d87a:fa34:57e7:1e2c]) by DM5PR15MB1548.namprd15.prod.outlook.com ([fe80::d87a:fa34:57e7:1e2c%17]) with mapi id 15.20.0696.013; Thu, 19 Apr 2018 16:37:08 +0000 From: Song Liu To: Miklos Szeredi CC: LKML , Kernel Team , Steven Rostedt , Ingo Molnar , "Howard McLauchlan" , Josef Bacik , "Srikar Dronamraju" Subject: Re: [PATCH v2] tracing: fix bad use of igrab in trace_uprobe.c Thread-Topic: [PATCH v2] tracing: fix bad use of igrab in trace_uprobe.c Thread-Index: AQHT1zxd/hOH+TsgmUiWuxUvrApKJqQHypiAgABgrQCAAB+SAA== Date: Thu, 19 Apr 2018 16:37:08 +0000 Message-ID: References: <20180418174014.1592871-1-songliubraving@fb.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3445.6.18) authentication-results: szeredi.hu; dkim=none (message not signed) header.d=none;szeredi.hu; dmarc=none action=none header.from=fb.com; x-originating-ip: [2620:10d:c090:200::5:56a2] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR15MB1547;7:Re5FSeLYqlAnqTmuNiElRlxYTk9oflgfiBK0DHYThI6HR33S8ntw+WE6Ppe1PtbdgoAKFIuwYUcPBccJlfWGBV3l7bF80lehpHSKycpV1MBOHRXGKekNohYOwP9sufEivwdVoWH/i4Wnyz9AyJB3MJlG8riBAwrHjS0szHIT/9CjbPqzY3Ade3IPnguRM6hAXpjk8pbcZ4XxmD86FCTuX9jzjL61t7aVoYijTH7FrZoifCqhnXaAxK8hSmZcbbMs;20:Y5nIHtgdAjX3gi35HiE2LC9KE24DZL97zvxCIXxkNyFMaEP9fDVC7yIGLvnKdZqdWGbi7yySCXlzr7JtavuC+kymxbqBPhKs55BU4dWPP54LofSQfw0U9jFVqv+d/KPfI5b6EeLnblh8qbW4lsUxUFoDrGfoUGItawZiz8hjaQc= x-ms-exchange-antispam-srfa-diagnostics: SOS;SOR; x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);SRVR:DM5PR15MB1547; x-ms-traffictypediagnostic: DM5PR15MB1547: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(67672495146484)(104084551191319); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3231232)(11241501184)(944501327)(52105095)(3002001)(10201501046)(6041310)(20161123560045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011);SRVR:DM5PR15MB1547;BCL:0;PCL:0;RULEID:;SRVR:DM5PR15MB1547; x-forefront-prvs: 0647963F84 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(366004)(39860400002)(39380400002)(376002)(396003)(346002)(57704003)(2616005)(11346002)(5250100002)(305945005)(8676002)(81166006)(33656002)(50226002)(46003)(8936002)(7736002)(57306001)(6512007)(478600001)(6506007)(53546011)(54906003)(316002)(2900100001)(59450400001)(6486002)(76176011)(6436002)(229853002)(82746002)(6246003)(186003)(102836004)(36756003)(446003)(53936002)(6916009)(6116002)(25786009)(5660300001)(86362001)(3660700001)(575784001)(476003)(4326008)(83716003)(3280700002)(2906002);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR15MB1547;H:DM5PR15MB1548.namprd15.prod.outlook.com;FPR:;SPF:None;LANG:en;MLV:sfv; x-microsoft-antispam-message-info: 48yo3I6R0bLZxv5+MHm6RDm8UclaNdAqAo8m5l4SinTPi/OK0Da5wB1RYRi1+a56uwaf8KuZdZnxytBYopnoBxsfs3T7MnrWUzxdksWW45B81jDD0I0lcv5con2qO+mOhnEFauBXo+jbT5zSzh/YCFyxWFuZURJJjrLpuP2QR/OmWQqKna5n5zF6GsrRDW36 spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-ID: <1A8CB80C42C3244A8CD8B3DBD972B37F@namprd15.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: cfd8bfd8-d914-48b9-8c5f-08d5a613cb45 X-MS-Exchange-CrossTenant-Network-Message-Id: cfd8bfd8-d914-48b9-8c5f-08d5a613cb45 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Apr 2018 16:37:08.6152 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR15MB1547 X-OriginatorOrg: fb.com X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-19_05:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Apr 19, 2018, at 7:44 AM, Miklos Szeredi wrote: >=20 > On Thu, Apr 19, 2018 at 10:58 AM, Miklos Szeredi wrot= e: >> On Wed, Apr 18, 2018 at 7:40 PM, Song Liu wrote: >>> As Miklos reported and suggested: >>>=20 >>> This pattern repeats two times in trace_uprobe.c and in >>> kernel/events/core.c as well: >>>=20 >>> ret =3D kern_path(filename, LOOKUP_FOLLOW, &path); >>> if (ret) >>> goto fail_address_parse; >>>=20 >>> inode =3D igrab(d_inode(path.dentry)); >>> path_put(&path); >>>=20 >>> And it's wrong. You can only hold a reference to the inode if you >>> have an active ref to the superblock as well (which is normally >>> through path.mnt) or holding s_umount. >>>=20 >>> This way unmounting the containing filesystem while the tracepoint is >>> active will give you the "VFS: Busy inodes after unmount..." message >>> and a crash when the inode is finally put. >>>=20 >>> Solution: store path instead of inode. >>>=20 >>> This patch fixes two instances in trace_uprobe.c. >>>=20 >>> Fixes: f3f096cfedf8 ("tracing: Provide trace events interface for uprob= es") >>> Fixes: 33ea4b24277b ("perf/core: Implement the 'perf_uprobe' PMU") >>> Cc: Steven Rostedt >>> Cc: Ingo Molnar >>> Cc: Howard McLauchlan >>> Cc: Josef Bacik >>> Cc: Srikar Dronamraju >>> Reported-by: Miklos Szeredi >>> Signed-off-by: Song Liu >>> --- >>> kernel/trace/trace_uprobe.c | 49 +++++++++++++++-----------------------= ------- >>> 1 file changed, 16 insertions(+), 33 deletions(-) >>>=20 >>> diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c >>> index 34fd0e0..d9ee522c 100644 >>> --- a/kernel/trace/trace_uprobe.c >>> +++ b/kernel/trace/trace_uprobe.c >>> @@ -55,7 +55,7 @@ struct trace_uprobe { >>> struct list_head list; >>> struct trace_uprobe_filter filter; >>> struct uprobe_consumer consumer; >>> - struct inode *inode; >>> + struct path path; >>> char *filename; >>> unsigned long offset; >>> unsigned long nhit; >>> @@ -289,7 +289,7 @@ static void free_trace_uprobe(struct trace_uprobe *= tu) >>> for (i =3D 0; i < tu->tp.nr_args; i++) >>> traceprobe_free_probe_arg(&tu->tp.args[i]); >>>=20 >>> - iput(tu->inode); >>> + path_put(&tu->path); >>> kfree(tu->tp.call.class->system); >>> kfree(tu->tp.call.name); >>> kfree(tu->filename); >>> @@ -363,7 +363,6 @@ static int register_trace_uprobe(struct trace_uprob= e *tu) >>> static int create_trace_uprobe(int argc, char **argv) >>> { >>> struct trace_uprobe *tu; >>> - struct inode *inode; >>> char *arg, *event, *group, *filename; >>> char buf[MAX_EVENT_NAME_LEN]; >>> struct path path; >>> @@ -371,7 +370,6 @@ static int create_trace_uprobe(int argc, char **arg= v) >>> bool is_delete, is_return; >>> int i, ret; >>>=20 >>> - inode =3D NULL; >>> ret =3D 0; >>> is_delete =3D false; >>> is_return =3D false; >>> @@ -437,24 +435,14 @@ static int create_trace_uprobe(int argc, char **a= rgv) >>> } >>> /* Find the last occurrence, in case the path contains ':' too. = */ >>> arg =3D strrchr(argv[1], ':'); >>> - if (!arg) { >>> - ret =3D -EINVAL; >>> - goto fail_address_parse; >>> - } >>> + if (!arg) >>> + return -EINVAL; >>>=20 >>> *arg++ =3D '\0'; >>> filename =3D argv[1]; >>> ret =3D kern_path(filename, LOOKUP_FOLLOW, &path); >>> if (ret) >>> - goto fail_address_parse; >>> - >>> - inode =3D igrab(d_real_inode(path.dentry)); >=20 > Also, where has the d_real_inode() gone? >=20 > Looks like we need tu->inode back, since the return value of > d_real_inode() may change over time. I'd do the "tu->inode =3D > d_real_inode(tu->path.dentry)" just before first use (i.e. when > enabling the tracepoint). >=20 > Thanks, > Miklos >=20 Do we need mechanism to prevent the return value of d_real_inode() to change? Would the following sequence happen? create trace_uprobe enable trace_uprobe (uprobe_register) d_real changes disable trace_uprobe (uprobe_unregister get wrong inode?) =20 Another case might be: create trace_uprobe enable trace_uprobe (uprobe_register) disable trace_uprobe (uprobe_unregister) d_real changes enable trace_uprobe (do we need new inode for uprobe_register) Thanks, Song >=20 >>> - path_put(&path); >>> - >>> - if (!inode || !S_ISREG(inode->i_mode)) { >>=20 >> Where has the S_ISREG check gone? >>=20 >>> - ret =3D -EINVAL; >>> - goto fail_address_parse; >>> - } >>> + return ret; >>>=20 >>> ret =3D kstrtoul(arg, 0, &offset); >>> if (ret) >>> @@ -490,7 +478,7 @@ static int create_trace_uprobe(int argc, char **arg= v) >>> goto fail_address_parse; >>> } >>> tu->offset =3D offset; >>> - tu->inode =3D inode; >>> + tu->path =3D path; >>> tu->filename =3D kstrdup(filename, GFP_KERNEL); >>>=20 >>> if (!tu->filename) { >>> @@ -558,7 +546,7 @@ static int create_trace_uprobe(int argc, char **arg= v) >>> return ret; >>>=20 >>> fail_address_parse: >>> - iput(inode); >>> + path_put(&path); >>>=20 >>> pr_info("Failed to parse address or file.\n"); >>>=20 >>> @@ -922,7 +910,8 @@ probe_event_enable(struct trace_uprobe *tu, struct = trace_event_file *file, >>> goto err_flags; >>>=20 >>> tu->consumer.filter =3D filter; >>> - ret =3D uprobe_register(tu->inode, tu->offset, &tu->consumer); >>> + ret =3D uprobe_register(d_inode(tu->path.dentry), tu->offset, >>> + &tu->consumer); >>> if (ret) >>> goto err_buffer; >>>=20 >>> @@ -966,7 +955,7 @@ probe_event_disable(struct trace_uprobe *tu, struct= trace_event_file *file) >>>=20 >>> WARN_ON(!uprobe_filter_is_empty(&tu->filter)); >>>=20 >>> - uprobe_unregister(tu->inode, tu->offset, &tu->consumer); >>> + uprobe_unregister(d_inode(tu->path.dentry), tu->offset, &tu->co= nsumer); >>> tu->tp.flags &=3D file ? ~TP_FLAG_TRACE : ~TP_FLAG_PROFILE; >>>=20 >>> uprobe_buffer_disable(); >>> @@ -1041,7 +1030,8 @@ static int uprobe_perf_close(struct trace_uprobe = *tu, struct perf_event *event) >>> write_unlock(&tu->filter.rwlock); >>>=20 >>> if (!done) >>> - return uprobe_apply(tu->inode, tu->offset, &tu->consume= r, false); >>> + return uprobe_apply(d_inode(tu->path.dentry), tu->offse= t, >>> + &tu->consumer, false); >>>=20 >>> return 0; >>> } >>> @@ -1073,7 +1063,8 @@ static int uprobe_perf_open(struct trace_uprobe *= tu, struct perf_event *event) >>>=20 >>> err =3D 0; >>> if (!done) { >>> - err =3D uprobe_apply(tu->inode, tu->offset, &tu->consum= er, true); >>> + err =3D uprobe_apply(d_inode(tu->path.dentry), >>> + tu->offset, &tu->consumer, true); >>> if (err) >>> uprobe_perf_close(tu, event); >>> } >>> @@ -1337,7 +1328,6 @@ struct trace_event_call * >>> create_local_trace_uprobe(char *name, unsigned long offs, bool is_retur= n) >>> { >>> struct trace_uprobe *tu; >>> - struct inode *inode; >>> struct path path; >>> int ret; >>>=20 >>> @@ -1345,14 +1335,6 @@ create_local_trace_uprobe(char *name, unsigned l= ong offs, bool is_return) >>> if (ret) >>> return ERR_PTR(ret); >>>=20 >>> - inode =3D igrab(d_inode(path.dentry)); >>> - path_put(&path); >>> - >>> - if (!inode || !S_ISREG(inode->i_mode)) { >>=20 >> And here, again. >>=20 >> Otherwise ACK. >>=20 >> Also please create a separate patch that removes igrab/iput calls from >> kernel/events/uprobes.c and adds a comment to the effect that the >> caller is required to keep the inode (and the containing mount) >> referenced. >>=20 >> Thanks, >> Miklos