Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp1544296rdh; Fri, 27 Oct 2023 19:34:29 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFxLR4GOJgnYBcjjZIAkLaz61d/ocTMWxbzQT8BN3HhBD2y04g9fVv0wmzI6DbSDnI6/oYU X-Received: by 2002:a05:6a20:9384:b0:17b:a34d:5b56 with SMTP id x4-20020a056a20938400b0017ba34d5b56mr4936474pzh.19.1698460469543; Fri, 27 Oct 2023 19:34:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698460469; cv=none; d=google.com; s=arc-20160816; b=U+LstLdOS7olYToz9f+Y16iXojrVgBMPJuWG8pwURd90ZhzrPSsutPi1plL4uY6W3u ZcATCgYnHzPEbtyNChzu2pB73YGNZnbrfxK3amqwFSja3sI+UJ1MZUa0HD1+59Ek+h83 wocFcBTIsL3c9oHTIQ2tcT+rv+IIINTYkp0H0/ebSLRtQYD5ANEE3Jdy9aeX59CjtQpp uc/zLaa62zr+UsP70mF9EUbjyJJHwd9vtpPBs3LE2V5LBG0E0gFPmRs0wvf7c1sCH1NE J6fetLz3XSq9p74hMLd/J73OPh3zSbMjhGoHi+5FTZT707DrjdWu4hJbuP8oj79Hj8Hj qg5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=1pR/LwsC//tse7b6bKDia848foF0jAh2/+C8h+0S2wE=; fh=LQ+YmPWaCryw4FLKFLZYw5UVqIoj11MLZfrw3IwMtPg=; b=ivTHVjCphas4J84SfofLJVw+GXMciYrUl5qFvfMNTy+s+PCNhb1UATtfMjqBXTeljG U05KwhdDbyH2otrSlKOvNl9aPKURRAaI17MSuO7C4vguv7PPzgvwUCc/MC/upZXBNmE/ 9yagXBA94+f1VcsHyXIH/kNbBIMbg4HunqHsBOcTz+mVN0EAmDFOt2NhfIXjnP1SZHuZ TVc3JPt1iqJQG5dUNu22X61xibyLNgsaiA8oIgM0SSsyz+4TejzNXaUmr24g+nfGAkKm EXzVNb22u9+ZfHxqg4UQ2A78+3N6z8XL6EoV7lVD0jpD6i8A+KV3+ITm3ak4PcT5jQz/ gFJw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id u13-20020a65670d000000b0056569ee3ae6si1809341pgf.798.2023.10.27.19.34.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Oct 2023 19:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 83A2E83E8FEF; Fri, 27 Oct 2023 19:34:26 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232936AbjJ1Cdv (ORCPT + 99 others); Fri, 27 Oct 2023 22:33:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbjJ1Cdt (ORCPT ); Fri, 27 Oct 2023 22:33:49 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8BCBCC0; Fri, 27 Oct 2023 19:33:47 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 12903C433C8; Sat, 28 Oct 2023 02:33:45 +0000 (UTC) Date: Fri, 27 Oct 2023 22:33:44 -0400 From: Steven Rostedt To: Beau Belgrave Cc: Naresh Kamboju , "open list:KERNEL SELFTEST FRAMEWORK" , open list , linux-trace-kernel@vger.kernel.org, lkft-triage@lists.linaro.org, Mark Brown , Zheng Yejian , Dan Carpenter , Arnd Bergmann Subject: Re: selftests: user_events: ftrace_test - RIP: 0010:tracing_update_buffers (kernel/trace/trace.c:6470) Message-ID: <20231027223344.3854ac1f@rorschach.local.home> In-Reply-To: <20231027183640.2529ab68@gandalf.local.home> References: <20231027192011.GA436-beaub@linux.microsoft.com> <20231027183640.2529ab68@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Fri, 27 Oct 2023 19:34:26 -0700 (PDT) On Fri, 27 Oct 2023 18:36:40 -0400 Steven Rostedt wrote: > On Fri, 27 Oct 2023 12:20:11 -0700 > Beau Belgrave wrote: > > > On Fri, Oct 27, 2023 at 05:38:41PM +0530, Naresh Kamboju wrote: > > > Following kernel crash noticed on x86_64 while running selftests: user_events: > > > ftrace_test running 6.6.0-rc7-next-20231026. > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > kselftest: Running tests in user_events > > > TAP version 13 > > > 1..4 > > > # timeout set to 90 > > > # selftests: user_events: ftrace_test > > > [ 2391.606817] general protection fault, probably for non-canonical > > > address 0x6b6b6b6b6b6b8a83: 0000 [#1] PREEMPT SMP PTI > > > [ 2391.617519] CPU: 1 PID: 34662 Comm: ftrace_test Not tainted > > > 6.6.0-rc7-next-20231026 #1 > > > [ 2391.625428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > > > 2.7 12/07/2021 > > > [ 2391.632811] RIP: 0010:tracing_update_buffers (kernel/trace/trace.c:6470) > > > [ 2391.637952] Code: 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 > > > 55 31 f6 48 89 e5 41 55 41 54 53 48 89 fb 48 c7 c7 40 8c 61 94 e8 92 > > > d3 5a 01 <44> 0f b6 a3 18 1f 00 00 41 80 fc 01 0f 87 c8 dc 4e 01 45 31 > > > > > Warning is from this code: > > static void __trace_array_put(struct trace_array *this_tr) > > { > > WARN_ON(!this_tr->ref); > > this_tr->ref--; > > } > > > > It seems like there might be a timing window or an incorrect call to > > trace_array_put() somewhere. Do you think this is related to the eventfs > > work? > > No, I think this is was probably introduced by: > > a1f157c7a3bb ("tracing: Expand all ring buffers individually") > > Or possibly a mixture of the two changes? But anyway I think I need to look > at this one first. Not sure if the bug Beau hit is the same as this one, but the one Beau hit I think is fixed by this: -- Steve diff --git a/fs/tracefs/event_inode.c b/fs/tracefs/event_inode.c index 4d2da7480e5f..4a54493b8419 100644 --- a/fs/tracefs/event_inode.c +++ b/fs/tracefs/event_inode.c @@ -234,6 +234,10 @@ create_file_dentry(struct eventfs_inode *ei, struct dentry **e_dentry, bool invalidate = false; mutex_lock(&eventfs_mutex); + if (ei->is_freed) { + mutex_unlock(&eventfs_mutex); + return NULL; + } /* If the e_dentry already has a dentry, use it */ if (*e_dentry) { /* lookup does not need to up the ref count */