Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2439913ioo; Sat, 28 May 2022 13:46:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxPpD/QQ5mWnsZTkrJvelNwkISJoFPtlJvVC4vIANNY+OkbhxgSSD7G/u7o66pAsifpkNgH X-Received: by 2002:a17:903:228e:b0:161:8632:2725 with SMTP id b14-20020a170903228e00b0016186322725mr49380063plh.126.1653770766189; Sat, 28 May 2022 13:46:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653770766; cv=none; d=google.com; s=arc-20160816; b=NuNXUqOavVsnWMa3woojsPcdxGCWzrrKR9Rq6uXb9eOQ1iip3+SuFAqPJ1slBemKDN ngJyhpLIz0KqQ10Qkjkh5qyy1QMH0hEOvTXbyCpNHS0TZGiXqA51UGDQIeYyIHcFuiOz sOVV5yZnhDx3SaJVHHuSUEnkUwG9kNY1wYJ5VdTKJWe9Cml35EKcdhqw/tHW3VA6ySu5 4QzXEBA2o5YRHzR2h4qULm+tWLrsvoEiKQkaem8cWmJVCN47euGmMSYbZ1zMW6KFMkOz JMHYZuwvbksIN2RMNAPFGk47kbST2/ORg+gRfO7wAm+TMv8Rg27xJppcajQLP8W2dDsh 5ymw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:subject:cc:to:from:dkim-signature; bh=BHP2MH2EqqCvYZe6HjRCTZtmQLJSNzmf5t9y8oQS1gw=; b=hhMRzN4iNniZcTG400hd0DPDFmhPCS6uGZblSE+yrZdWh2bBNAZhJosBeXzX/x9dPX 9lSF22VaTbGXY1xz77sjdUssgBSaOX8nr7xLJyJS1rjVF5Sugex/HJXXHHC2l9ylM1Rp 3qFA05134Y6GGHw7FDqq8xmNlMc6Nb5fYc/XK2la7j0iOMIOkpBSS9KBTxVqBCPiOJd1 GFhBswTkuHhDSQTsvJEkcvspAs4txzY9zbNm2gZm0Uq6UgkKuWJCE5+j4vUx0FJwtJBt JPYuTL8UfuSbnH/xsbak0dhC1ecSKNBZK4wPgKsHs11i+LwRvEukOjv7776P2uMRpdUO q9VA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gsAvd6ro; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id w13-20020a63c10d000000b003c642cb0fefsi11287936pgf.130.2022.05.28.13.46.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:46:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gsAvd6ro; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 93B281BE651; Sat, 28 May 2022 12:45:31 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353164AbiE0Pzt (ORCPT + 99 others); Fri, 27 May 2022 11:55:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42188 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345868AbiE0Pzs (ORCPT ); Fri, 27 May 2022 11:55:48 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3FEC713F420; Fri, 27 May 2022 08:55:47 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id A6CE5CE259F; Fri, 27 May 2022 15:55:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C648AC385A9; Fri, 27 May 2022 15:55:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1653666943; bh=cCOkIPySWpvVdaAN06SdyUyZG3iiUBVWghvfYHnbzYk=; h=From:To:Cc:Subject:Date:From; b=gsAvd6roIaIqzKsnQUK5DspCDPDDGAQJXkPtmL1depNCcT4JpOnPu0V0J752DWZl+ 4udQcnsOftggPJYYy7C7XYP56rFgNMesvlXZyOBmt5BBYgUQiz8jVobYlLI+XaRcen 4YHielmJTa/YwQtL4tzyhq9r0q9aQyS5FGcQsGG/kpLQrS3tsqXUAHETCTT12Oflv+ HLfj+9FX+bmJFwyra1PaeHel/GGjyn60TiQNok/9nqvPf+4xGN3EgkpLr4xuVoxQHj rRAHZzTsin6DPOr/ZL4/8zneeY+Y/aeTUKVE+89r5/ZYvSdG+2kbqXCn3l1vAoas0l A9+BQVv7/tceA== From: "Masami Hiramatsu (Google)" To: Steven Rostedt Cc: Peter Zijlstra , Masami Hiramatsu , Ingo Molnar , Yonghong Song , bpf , Kernel Team , linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH] tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() Date: Sat, 28 May 2022 00:55:39 +0900 Message-Id: <165366693881.797669.16926184644089588731.stgit@devnote2> X-Mailer: git-send-email 2.25.1 User-Agent: StGit/0.19 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Masami Hiramatsu (Google) There is a small chance that get_kretprobe(ri) returns NULL in kretprobe_dispatcher() when another CPU unregisters the kretprobe right after __kretprobe_trampoline_handler(). To avoid this issue, kretprobe_dispatcher() checks the get_kretprobe() return value again. And if it is NULL, it returns soon because that kretprobe is under unregistering process. This issue has been introduced when the kretprobe is decoupled from the struct kretprobe_instance by commit d741bf41d7c7 ("kprobes: Remove kretprobe hash"). Before that commit, the struct kretprob_instance::rp directly points the kretprobe and it is never be NULL. Reported-by: Yonghong Song Fixes: d741bf41d7c7 ("kprobes: Remove kretprobe hash") Cc: stable@vger.kernel.org Signed-off-by: Masami Hiramatsu (Google) --- kernel/trace/trace_kprobe.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c index 93507330462c..a245ea673715 100644 --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -1718,8 +1718,17 @@ static int kretprobe_dispatcher(struct kretprobe_instance *ri, struct pt_regs *regs) { struct kretprobe *rp = get_kretprobe(ri); - struct trace_kprobe *tk = container_of(rp, struct trace_kprobe, rp); + struct trace_kprobe *tk; + + /* + * There is a small chance that get_kretprobe(ri) returns NULL when + * the kretprobe is unregister on another CPU between kretprobe's + * trampoline_handler and this function. + */ + if (unlikely(!rp)) + return 0; + tk = container_of(rp, struct trace_kprobe, rp); raw_cpu_inc(*tk->nhit); if (trace_probe_test_flag(&tk->tp, TP_FLAG_TRACE))