Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3652286ybf; Tue, 3 Mar 2020 09:50:04 -0800 (PST) X-Google-Smtp-Source: ADFU+vsuu3Xkl8l+MV+fCM2lz24GnoQ3ejoEz09/KdC9iaAKbBoBBZu0b4ZKUF4XeH/RHd3o3YqM X-Received: by 2002:a9d:7410:: with SMTP id n16mr4417407otk.23.1583257804018; Tue, 03 Mar 2020 09:50:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583257804; cv=none; d=google.com; s=arc-20160816; b=ZhWl49327p/UKjj6/0slTDMqr3+xusm4ur7+YmV0ZetMux7AJVKz083DKa3bOyo456 cD9DGsjbSXCf527IuutYO+Z37QGsmoOusjUvF5btRCccEHZu2NZz6v7aYdRo+c5IWvq7 1epSOQC8G4d9WRZB1tv8BKWZ4ESMCQ5SYq9WPb2nOGnC37wm0Uc8MbMon1Tw9q9AqFRm P9fzrDcD0VAdseRi4pq4Cf8LVeR2Jt6d6cyqoi+lt3RpIJE19kxrKAu7gIFVs4ZHLgoT f5mUoUECKEuGCTBZQB5ABEh3lNpZforWhmAqMo1VGOpNCwo6jDz13TgfYt4SbNeAlkhA B2FQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WsYsP3spOgJEo4NAC+pLlbLUAhpHN4nJV4r8ZUpupnU=; b=sonqjDcaoZafg5BWCmL1kZg0noFJP5FzGL8zb9Lt2MKJS8wvzRcXuOzVSfafh9VmzD 5ZEHCRYu+9LL09XqkdHwrNtcg/g1h+q0TCPO9sw5ZBjtlXfxYlii4APh3CeQtz6n+rfL aQL1/M4Tzk0zQPL5FqXrPdLfm8MbOrvIwsTCGxVlh28ND4vC91IXQZWO6ykd+u8TOw7u R6R5Xkr6jGu4DxO4bzBDyPJziWt8Lu8kDLFZaSlufqVFpReONyXLCkxv+PE+AZGZDjaX 9OgA7CjcREqcREC4tx65LP7jceA5OGuhItpecgTx9xutK8GjsirhDBIVsjc+sghOrFjP k5oQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SMPuKDTN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l133si2076463oih.188.2020.03.03.09.49.52; Tue, 03 Mar 2020 09:50:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SMPuKDTN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731519AbgCCRs2 (ORCPT + 99 others); Tue, 3 Mar 2020 12:48:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:55558 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731657AbgCCRs1 (ORCPT ); Tue, 3 Mar 2020 12:48:27 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 38767208C3; Tue, 3 Mar 2020 17:48:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583257705; bh=/fUNwf/vztwTSEohLnloV9eTLI537OBCYIVodXwIu6Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SMPuKDTNZTR9o+IXEIcVcUXx06DdoKL4iKr3Tz4ld2fhGqCQKJLM5Xaqy+Z7WkKSR zJo7sfA8Wxkapkz5v5COv/TQ7hxurlNX7OpCjng7DvmBjazTfMyy6JIzzbyrZ1dRee YMz5fNeXDjmHX44kNymiJ7vXlFbTmJQfSzhVtbhg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven Rostedt (VMware)" Subject: [PATCH 5.5 097/176] tracing: Disable trace_printk() on post poned tests Date: Tue, 3 Mar 2020 18:42:41 +0100 Message-Id: <20200303174316.051529563@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200303174304.593872177@linuxfoundation.org> References: <20200303174304.593872177@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (VMware) commit 78041c0c9e935d9ce4086feeff6c569ed88ddfd4 upstream. The tracing seftests checks various aspects of the tracing infrastructure, and one is filtering. If trace_printk() is active during a self test, it can cause the filtering to fail, which will disable that part of the trace. To keep the selftests from failing because of trace_printk() calls, trace_printk() checks the variable tracing_selftest_running, and if set, it does not write to the tracing buffer. As some tracers were registered earlier in boot, the selftest they triggered would fail because not all the infrastructure was set up for the full selftest. Thus, some of the tests were post poned to when their infrastructure was ready (namely file system code). The postpone code did not set the tracing_seftest_running variable, and could fail if a trace_printk() was added and executed during their run. Cc: stable@vger.kernel.org Fixes: 9afecfbb95198 ("tracing: Postpone tracer start-up tests till the system is more robust") Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace.c | 2 ++ 1 file changed, 2 insertions(+) --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -1827,6 +1827,7 @@ static __init int init_trace_selftests(v pr_info("Running postponed tracer tests:\n"); + tracing_selftest_running = true; list_for_each_entry_safe(p, n, &postponed_selftests, list) { /* This loop can take minutes when sanitizers are enabled, so * lets make sure we allow RCU processing. @@ -1849,6 +1850,7 @@ static __init int init_trace_selftests(v list_del(&p->list); kfree(p); } + tracing_selftest_running = false; out: mutex_unlock(&trace_types_lock);