Received: by 10.192.165.148 with SMTP id m20csp488295imm; Fri, 20 Apr 2018 09:58:00 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+cH+fzbQhRrtjZ81HD9BSDneCtqC9wk0f/DmzouxueA9anNzehHz05DXPjaAR9kAYMLTVn X-Received: by 2002:a17:902:7249:: with SMTP id c9-v6mr11013766pll.217.1524243480100; Fri, 20 Apr 2018 09:58:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524243480; cv=none; d=google.com; s=arc-20160816; b=EHn/JHHVlb/QWZd5RnG67qls2r4w+CcGVzxHMMjB/2W7fcpWkXuJ8iYmQ0XTex7EPH usrboXTCmpERNUODx/iGvyNoQUtNrfhEkLFh7ZBIdT58sRu195qypxP9k88TBnaz3xd4 kEm0bUUtfGQJIPMEgw4JHejLtrOyDVkqG9jdqA2Q/A9/sNzNNJq1AzLqZ4OUv61acob+ aXOI+390Q+WSrg725cCzusOb+VtSpCjqTmB0+C9S7/DIfU6bspLZkw6TmXltThnTaaGc jZDh46P3GV7OpRAfJGKpSFDaQlF1huRocM/+yrS768jWSng4T+X3la3sTqBZmmutN9gZ GUoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject :smtp-origin-cluster:cc:to:smtp-origin-hostname:from :smtp-origin-hostprefix:dkim-signature:arc-authentication-results; bh=WZpP3FI72JkXuaO38enHUbTtO+FIPJTorUe12unhJOo=; b=KrXjitVPMKyJEXUBh5IzapTAG0N7OFH7uM0/MMQDu9ZSJZBw8fFaI85KR6NpZCxMSJ kW01syifumH7iWgAXDt9nGujxCZxHLRCuQymuGgtAqfHxsPIgE5R0p1E2wa1iZI43yKU lQuhWZw1QPT0zpzXdldg42WJpCYCk/VKdl8wl0DhHZ26yNTAgOZwNMyeLvPp7YZotwBR F013iCSVdLEYwlqfSEt0hIyDHq2A6eOCiEdWconggVhWMLP26TOL2WsX5RgL8N079UEI IzYTSB9tEKAZvBbHPg8L2Zociydz0GEY0J1XByAouqEsYmFJUj4VrVbq+qO0x8zazYAQ erAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=rWxgz/pd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g3-v6si5582291plp.471.2018.04.20.09.57.45; Fri, 20 Apr 2018 09:58:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=rWxgz/pd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752958AbeDTQ4a (ORCPT + 99 others); Fri, 20 Apr 2018 12:56:30 -0400 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:46440 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752618AbeDTQ43 (ORCPT ); Fri, 20 Apr 2018 12:56:29 -0400 Received: from pps.filterd (m0044008.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3KGnO3R006590 for ; Fri, 20 Apr 2018 09:56:29 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=facebook; bh=WZpP3FI72JkXuaO38enHUbTtO+FIPJTorUe12unhJOo=; b=rWxgz/pdDqekWEwi4tJruNAuFi0YLHDU5YW1ihdctrzZp+KYI6FKZ08quH/5XLb6kCDH hVewP0hMPdc8HU+Uwwd7wG0E6gUCOJNu1Uga4Iu2gpFBHKmVwuxtsBmbE1/+RCyfAXs2 sLWZhcU+KPzggdU3BuaWiZ5ELvIbX7KYGe0= Received: from mail.thefacebook.com ([199.201.64.23]) by mx0a-00082601.pphosted.com with ESMTP id 2hfjscr7pe-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Fri, 20 Apr 2018 09:56:29 -0700 Received: from mx-out.facebook.com (192.168.52.123) by PRN-CHUB07.TheFacebook.com (192.168.16.17) with Microsoft SMTP Server id 14.3.361.1; Fri, 20 Apr 2018 09:56:27 -0700 Received: by devbig102.frc2.facebook.com (Postfix, from userid 4523) id 61077428245C; Fri, 20 Apr 2018 09:56:27 -0700 (PDT) Smtp-Origin-Hostprefix: devbig From: Song Liu Smtp-Origin-Hostname: devbig102.frc2.facebook.com To: CC: , Song Liu , Steven Rostedt , Ingo Molnar , Howard McLauchlan , Josef Bacik , Srikar Dronamraju , Miklos Szeredi Smtp-Origin-Cluster: frc2c02 Subject: [PATCH v3 1/2] tracing: fix bad use of igrab in trace_uprobe.c Date: Fri, 20 Apr 2018 09:56:24 -0700 Message-ID: <20180420165625.129593-1-songliubraving@fb.com> X-Mailer: git-send-email 2.9.5 X-FB-Internal: Safe MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-20_07:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As Miklos reported and suggested: This pattern repeats two times in trace_uprobe.c and in kernel/events/core.c as well: ret = kern_path(filename, LOOKUP_FOLLOW, &path); if (ret) goto fail_address_parse; inode = igrab(d_inode(path.dentry)); path_put(&path); And it's wrong. You can only hold a reference to the inode if you have an active ref to the superblock as well (which is normally through path.mnt) or holding s_umount. This way unmounting the containing filesystem while the tracepoint is active will give you the "VFS: Busy inodes after unmount..." message and a crash when the inode is finally put. Solution: store path instead of inode. This patch fixes two instances in trace_uprobe.c. struct path is added to struct trace_uprobe to keep the inode and containing mount point referenced. Fixes: f3f096cfedf8 ("tracing: Provide trace events interface for uprobes") Fixes: 33ea4b24277b ("perf/core: Implement the 'perf_uprobe' PMU") Cc: Steven Rostedt Cc: Ingo Molnar Cc: Howard McLauchlan Cc: Josef Bacik Cc: Srikar Dronamraju Cc: Miklos Szeredi Reported-by: Miklos Szeredi Signed-off-by: Song Liu --- kernel/trace/trace_uprobe.c | 55 +++++++++++++++++++-------------------------- 1 file changed, 23 insertions(+), 32 deletions(-) diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index 34fd0e0..e7ffb5e 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -55,6 +55,7 @@ struct trace_uprobe { struct list_head list; struct trace_uprobe_filter filter; struct uprobe_consumer consumer; + struct path path; struct inode *inode; char *filename; unsigned long offset; @@ -289,7 +290,7 @@ static void free_trace_uprobe(struct trace_uprobe *tu) for (i = 0; i < tu->tp.nr_args; i++) traceprobe_free_probe_arg(&tu->tp.args[i]); - iput(tu->inode); + path_put(&tu->path); kfree(tu->tp.call.class->system); kfree(tu->tp.call.name); kfree(tu->filename); @@ -363,7 +364,6 @@ static int register_trace_uprobe(struct trace_uprobe *tu) static int create_trace_uprobe(int argc, char **argv) { struct trace_uprobe *tu; - struct inode *inode; char *arg, *event, *group, *filename; char buf[MAX_EVENT_NAME_LEN]; struct path path; @@ -371,7 +371,6 @@ static int create_trace_uprobe(int argc, char **argv) bool is_delete, is_return; int i, ret; - inode = NULL; ret = 0; is_delete = false; is_return = false; @@ -437,24 +436,14 @@ static int create_trace_uprobe(int argc, char **argv) } /* Find the last occurrence, in case the path contains ':' too. */ arg = strrchr(argv[1], ':'); - if (!arg) { - ret = -EINVAL; - goto fail_address_parse; - } + if (!arg) + return -EINVAL; *arg++ = '\0'; filename = argv[1]; ret = kern_path(filename, LOOKUP_FOLLOW, &path); if (ret) - goto fail_address_parse; - - inode = igrab(d_real_inode(path.dentry)); - path_put(&path); - - if (!inode || !S_ISREG(inode->i_mode)) { - ret = -EINVAL; - goto fail_address_parse; - } + return ret; ret = kstrtoul(arg, 0, &offset); if (ret) @@ -490,7 +479,7 @@ static int create_trace_uprobe(int argc, char **argv) goto fail_address_parse; } tu->offset = offset; - tu->inode = inode; + tu->path = path; tu->filename = kstrdup(filename, GFP_KERNEL); if (!tu->filename) { @@ -558,7 +547,7 @@ static int create_trace_uprobe(int argc, char **argv) return ret; fail_address_parse: - iput(inode); + path_put(&path); pr_info("Failed to parse address or file.\n"); @@ -922,7 +911,14 @@ probe_event_enable(struct trace_uprobe *tu, struct trace_event_file *file, goto err_flags; tu->consumer.filter = filter; - ret = uprobe_register(tu->inode, tu->offset, &tu->consumer); + tu->inode = d_real_inode(tu->path.dentry); + if (!tu->inode || !S_ISREG(tu->inode->i_mode)) { + tu->inode = NULL; + ret = -EINVAL; + goto err_buffer; + } + ret = uprobe_register(tu->inode, tu->offset, + &tu->consumer); if (ret) goto err_buffer; @@ -966,7 +962,8 @@ probe_event_disable(struct trace_uprobe *tu, struct trace_event_file *file) WARN_ON(!uprobe_filter_is_empty(&tu->filter)); - uprobe_unregister(tu->inode, tu->offset, &tu->consumer); + uprobe_unregister(d_inode(tu->path.dentry), tu->offset, &tu->consumer); + tu->inode = NULL; tu->tp.flags &= file ? ~TP_FLAG_TRACE : ~TP_FLAG_PROFILE; uprobe_buffer_disable(); @@ -1041,7 +1038,8 @@ static int uprobe_perf_close(struct trace_uprobe *tu, struct perf_event *event) write_unlock(&tu->filter.rwlock); if (!done) - return uprobe_apply(tu->inode, tu->offset, &tu->consumer, false); + return uprobe_apply(d_inode(tu->path.dentry), tu->offset, + &tu->consumer, false); return 0; } @@ -1073,7 +1071,8 @@ static int uprobe_perf_open(struct trace_uprobe *tu, struct perf_event *event) err = 0; if (!done) { - err = uprobe_apply(tu->inode, tu->offset, &tu->consumer, true); + err = uprobe_apply(d_inode(tu->path.dentry), + tu->offset, &tu->consumer, true); if (err) uprobe_perf_close(tu, event); } @@ -1337,7 +1336,6 @@ struct trace_event_call * create_local_trace_uprobe(char *name, unsigned long offs, bool is_return) { struct trace_uprobe *tu; - struct inode *inode; struct path path; int ret; @@ -1345,14 +1343,6 @@ create_local_trace_uprobe(char *name, unsigned long offs, bool is_return) if (ret) return ERR_PTR(ret); - inode = igrab(d_inode(path.dentry)); - path_put(&path); - - if (!inode || !S_ISREG(inode->i_mode)) { - iput(inode); - return ERR_PTR(-EINVAL); - } - /* * local trace_kprobes are not added to probe_list, so they are never * searched in find_trace_kprobe(). Therefore, there is no concern of @@ -1364,11 +1354,12 @@ create_local_trace_uprobe(char *name, unsigned long offs, bool is_return) if (IS_ERR(tu)) { pr_info("Failed to allocate trace_uprobe.(%d)\n", (int)PTR_ERR(tu)); + path_put(&path); return ERR_CAST(tu); } tu->offset = offs; - tu->inode = inode; + tu->path = path; tu->filename = kstrdup(name, GFP_KERNEL); init_trace_event_call(tu, &tu->tp.call); -- 2.9.5