Message ID | 170505424954.459169.10630626365737237288.stgit@devnote2 |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2614:b0:101:6a76:bbe3 with SMTP id mm20csp74828dyc; Fri, 12 Jan 2024 02:11:46 -0800 (PST) X-Google-Smtp-Source: AGHT+IEDyy5JtbLY17ucP+pSdBYn41VYYf7Wn6iWfdUqDIbkAzxL3EAUTB4dUPHtd4WVYXkVQdMm X-Received: by 2002:ac2:5637:0:b0:50e:9570:b34b with SMTP id b23-20020ac25637000000b0050e9570b34bmr431767lff.90.1705054305914; Fri, 12 Jan 2024 02:11:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705054305; cv=none; d=google.com; s=arc-20160816; b=AuR7PImadVx56fr+RZgZgg+p6SNlLAnbp4qf2Mz17EQ6+8MxEuY/Seqz6XLjEDvM5x xAHR3A7oGiVU7HUX38TyFgIwc50AaTapReconzpH8SBevDoTC+HQQfU3mZ7bL5gTT+j3 IlX+CyuZkcB96rVHDYM9c/kEyblkQxgfdXv1/vbsmryqzoZhHTdgKU4RTbTsfEBrqqMk KlFSp1Fqg9OoYw01mskOQPdd8IJzNtx1pUuRMozLFz6NuJinp7dk0D1NF+PgtkMhyUcC A933ItkyZKgh5XrQpEQDGJSoNrohvQ9sCk2KukpCqFwu3pXSHcUmgk+5rf3eAyx91DfT Kymg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:user-agent:message-id:date :subject:cc:to:from:dkim-signature; bh=MgL0fsFE1v08WH2jTox51/B3OK3JdgJpErD7DWQ60Qk=; fh=SIgps5XdV0XNwjZfT2uAI7g3mrspDldK9Qs8qQAfoa4=; b=w/J8eewYO1qZ+1taydiiRvhtpYllJ/2RP3lX4D1ibXmQ6j5r7S8HGJqmDtY+AlEJk6 NOHgw4bQHcs5vHiIIM3vtfSsyWP7Mubs/28W2g2uBOwF5g1wtUvO2Flsl7FkvSVZBjKL hdkCbl5mXprCJFXoTmU6oIAKrpzCJd9OUe9mzbXPWN5Xc53DjXElAEtc46pCgHjQqJge hcftzIlO8Iy43GVRTUfsN1yEJFG3MOM93Ngi+nOJBe4Nwu5L1CVo93nPQveQ8Edup8Qp l28o+KMvNgKAZ+od/0lq7voLOAdXX0cMBln40GQGQFj0TuBGaoGKVcGEMk9FjpdQEu3c SD1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CzhPqmYc; spf=pass (google.com: domain of linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id q26-20020a170906361a00b00a26bdda5037si1271951ejb.410.2024.01.12.02.11.45 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 12 Jan 2024 02:11:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CzhPqmYc; spf=pass (google.com: domain of linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-24545-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 570E51F21364 for <ouuuleilei@gmail.com>; Fri, 12 Jan 2024 10:11:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4585F5D91D; Fri, 12 Jan 2024 10:11:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CzhPqmYc" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 81C705C8FE; Fri, 12 Jan 2024 10:10:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D885AC433C7; Fri, 12 Jan 2024 10:10:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705054257; bh=zMCldC3g0if4jocUa7hXngCNMXtp+UiFT5i/S3qyfxU=; h=From:To:Cc:Subject:Date:From; b=CzhPqmYcyijuC6OkxKcjAEV54/ThoBtq93+JD03SpasKNxKZyIdXCYGfzusHi/emr oVQhPe0WZyVlmL5yDFNSb0jlhHHxOKHwa+lx9XbgprRivq75UuS8Q90Zpk6XC8sZOW +OQDgC8bKjFaensf/VBlVYpTybZdnX7VLBK6UXA5Mwdf0jHxj7Fx1AYvxk2mvOTpxD NnlJMi2oOKl8i42Lf6JJYNgrQf56tFYfPA4mXMtlIFrZWWtxy87DiURkdMhEo6Q0rA XQQ1LSxdA3LD3no8kavQx6nufBptxd5PpyZVVAqTFj01GIV18trVEkEQ5T3Kt8pHJh 0qofCsrSxNTSg== From: "Masami Hiramatsu (Google)" <mhiramat@kernel.org> To: Alexei Starovoitov <alexei.starovoitov@gmail.com>, Steven Rostedt <rostedt@goodmis.org>, Florent Revest <revest@chromium.org> Cc: linux-trace-kernel@vger.kernel.org, LKML <linux-kernel@vger.kernel.org>, Martin KaFai Lau <martin.lau@linux.dev>, bpf <bpf@vger.kernel.org>, Sven Schnelle <svens@linux.ibm.com>, Alexei Starovoitov <ast@kernel.org>, Jiri Olsa <jolsa@kernel.org>, Arnaldo Carvalho de Melo <acme@kernel.org>, Daniel Borkmann <daniel@iogearbox.net>, Alan Maguire <alan.maguire@oracle.com>, Mark Rutland <mark.rutland@arm.com>, Peter Zijlstra <peterz@infradead.org>, Thomas Gleixner <tglx@linutronix.de>, Guo Ren <guoren@kernel.org> Subject: [PATCH v6 00/36] tracing: fprobe: function_graph: Multi-function graph and fprobe on fgraph Date: Fri, 12 Jan 2024 19:10:50 +0900 Message-Id: <170505424954.459169.10630626365737237288.stgit@devnote2> X-Mailer: git-send-email 2.34.1 User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1787879023810350281 X-GMAIL-MSGID: 1787879023810350281 |
Series |
tracing: fprobe: function_graph: Multi-function graph and fprobe on fgraph
|
|
Message
Masami Hiramatsu (Google)
Jan. 12, 2024, 10:10 a.m. UTC
Hi, Here is the 6th version of the series to re-implement the fprobe on function-graph tracer. The previous version is; https://lore.kernel.org/all/170290509018.220107.1347127510564358608.stgit@devnote2/ This version fixes use-after-unregister bug and arm64 stack unwinding bug [13/36], add an improvement for multiple interrupts during push operation[20/36], keep SAVE_REGS until BPF and fprobe_event using ftrace_regs[26/36], also reorder the patches[30/36][31/36] so that new fprobe can switch to SAVE_ARGS[32/36] safely. This series also temporarily adds a DIRECT_CALLS bugfix[1/36], which should be pushed separatedly as a stable bugfix. There are some TODOs: - Add s390x and loongarch support to fprobe (multiple fgraph). - Fix to get the symbol address from ftrace entry address on arm64. (This should be done in BPF trace event) - Cleanup code, rename some terms(offset/index) and FGRAPH_TYPE_BITMAP part should be merged to FGRAPH_TYPE_ARRAY patch. Overview -------- This series does major 2 changes, enable multiple function-graphs on the ftrace (e.g. allow function-graph on sub instances) and rewrite the fprobe on this function-graph. The former changes had been sent from Steven Rostedt 4 years ago (*), which allows users to set different setting function-graph tracer (and other tracers based on function-graph) in each trace-instances at the same time. (*) https://lore.kernel.org/all/20190525031633.811342628@goodmis.org/ The purpose of latter change are; 1) Remove dependency of the rethook from fprobe so that we can reduce the return hook code and shadow stack. 2) Make 'ftrace_regs' the common trace interface for the function boundary. 1) Currently we have 2(or 3) different function return hook codes, the function-graph tracer and rethook (and legacy kretprobe). But since this is redundant and needs double maintenance cost, I would like to unify those. From the user's viewpoint, function- graph tracer is very useful to grasp the execution path. For this purpose, it is hard to use the rethook in the function-graph tracer, but the opposite is possible. (Strictly speaking, kretprobe can not use it because it requires 'pt_regs' for historical reasons.) 2) Now the fprobe provides the 'pt_regs' for its handler, but that is wrong for the function entry and exit. Moreover, depending on the architecture, there is no way to accurately reproduce 'pt_regs' outside of interrupt or exception handlers. This means fprobe should not use 'pt_regs' because it does not use such exceptions. (Conversely, kprobe should use 'pt_regs' because it is an abstract interface of the software breakpoint exception.) This series changes fprobe to use function-graph tracer for tracing function entry and exit, instead of mixture of ftrace and rethook. Unlike the rethook which is a per-task list of system-wide allocated nodes, the function graph's ret_stack is a per-task shadow stack. Thus it does not need to set 'nr_maxactive' (which is the number of pre-allocated nodes). Also the handlers will get the 'ftrace_regs' instead of 'pt_regs'. Since eBPF mulit_kprobe/multi_kretprobe events still use 'pt_regs' as their register interface, this changes it to convert 'ftrace_regs' to 'pt_regs'. Of course this conversion makes an incomplete 'pt_regs', so users must access only registers for function parameters or return value. Design ------ Instead of using ftrace's function entry hook directly, the new fprobe is built on top of the function-graph's entry and return callbacks with 'ftrace_regs'. Since the fprobe requires access to 'ftrace_regs', the architecture must support CONFIG_HAVE_DYNAMIC_FTRACE_WITH_ARGS, which enables to call function-graph entry callback with 'ftrace_regs', and also CONFIG_HAVE_FUNCTION_GRAPH_FREGS, which passes the ftrace_regs to return_to_handler. All fprobes share a single function-graph ops (means shares a common ftrace filter) similar to the kprobe-on-ftrace. This needs another layer to find corresponding fprobe in the common function-graph callbacks, but has much better scalability, since the number of registered function-graph ops is limited. In the entry callback, the fprobe runs its entry_handler and saves the address of 'fprobe' on the function-graph's shadow stack as data. The return callback decodes the data to get the 'fprobe' address, and runs the exit_handler. The fprobe introduces two hash-tables, one is for entry callback which searches fprobes related to the given function address passed by entry callback. The other is for a return callback which checks if the given 'fprobe' data structure pointer is still valid. Note that it is possible to unregister fprobe before the return callback runs. Thus the address validation must be done before using it in the return callback. This series can be applied against the v6.7 kernel. This series can also be found below branch. https://git.kernel.org/pub/scm/linux/kernel/git/mhiramat/linux.git/log/?h=topic/fprobe-on-fgraph Thank you, --- Masami Hiramatsu (Google) (21): ftrace: Fix DIRECT_CALLS to use SAVE_REGS by default tracing: Add a comment about ftrace_regs definition tracing: Rename ftrace_regs_return_value to ftrace_regs_get_return_value x86: tracing: Add ftrace_regs definition in the header function_graph: Use a simple LRU for fgraph_array index number function_graph: Improve push operation for several interrupts function_graph: Add a new entry handler with parent_ip and ftrace_regs function_graph: Add a new exit handler with parent_ip and ftrace_regs x86/ftrace: Enable HAVE_FUNCTION_GRAPH_FREGS arm64: ftrace: Enable HAVE_FUNCTION_GRAPH_FREGS fprobe: Use ftrace_regs in fprobe entry handler fprobe: Use ftrace_regs in fprobe exit handler tracing: Add ftrace_partial_regs() for converting ftrace_regs to pt_regs tracing: Add ftrace_fill_perf_regs() for perf event tracing/fprobe: Enable fprobe events with CONFIG_DYNAMIC_FTRACE_WITH_ARGS bpf: Enable kprobe_multi feature if CONFIG_FPROBE is enabled fprobe: Rewrite fprobe on function-graph tracer tracing/fprobe: Remove nr_maxactive from fprobe selftests: ftrace: Remove obsolate maxactive syntax check selftests/ftrace: Add a test case for repeating register/unregister fprobe Documentation: probes: Update fprobe on function-graph tracer Steven Rostedt (VMware) (15): function_graph: Convert ret_stack to a series of longs fgraph: Use BUILD_BUG_ON() to make sure we have structures divisible by long function_graph: Add an array structure that will allow multiple callbacks function_graph: Allow multiple users to attach to function graph function_graph: Remove logic around ftrace_graph_entry and return ftrace/function_graph: Pass fgraph_ops to function graph callbacks ftrace: Allow function_graph tracer to be enabled in instances ftrace: Allow ftrace startup flags exist without dynamic ftrace function_graph: Have the instances use their own ftrace_ops for filtering function_graph: Add "task variables" per task for fgraph_ops function_graph: Move set_graph_function tests to shadow stack global var function_graph: Move graph depth stored data to shadow stack global var function_graph: Move graph notrace bit to shadow stack global var function_graph: Implement fgraph_reserve_data() and fgraph_retrieve_data() function_graph: Add selftest for passing local variables Documentation/trace/fprobe.rst | 42 + arch/arm64/Kconfig | 2 arch/arm64/include/asm/ftrace.h | 24 arch/arm64/kernel/entry-ftrace.S | 28 + arch/arm64/kernel/ftrace.c | 21 arch/loongarch/Kconfig | 1 arch/loongarch/include/asm/ftrace.h | 2 arch/loongarch/kernel/ftrace_dyn.c | 6 arch/powerpc/include/asm/ftrace.h | 9 arch/powerpc/kernel/trace/ftrace.c | 2 arch/powerpc/kernel/trace/ftrace_64_pg.c | 10 arch/s390/Kconfig | 1 arch/s390/include/asm/ftrace.h | 7 arch/x86/Kconfig | 4 arch/x86/include/asm/ftrace.h | 17 arch/x86/kernel/ftrace.c | 51 + arch/x86/kernel/ftrace_64.S | 37 + include/linux/fprobe.h | 58 + include/linux/ftrace.h | 167 +++ include/linux/sched.h | 3 include/linux/trace_recursion.h | 39 - kernel/trace/Kconfig | 19 kernel/trace/bpf_trace.c | 14 kernel/trace/fgraph.c | 1067 ++++++++++++++++---- kernel/trace/fprobe.c | 631 ++++++++---- kernel/trace/ftrace.c | 23 kernel/trace/ftrace_internal.h | 2 kernel/trace/trace.h | 94 +- kernel/trace/trace_fprobe.c | 114 +- kernel/trace/trace_functions.c | 8 kernel/trace/trace_functions_graph.c | 96 +- kernel/trace/trace_irqsoff.c | 10 kernel/trace/trace_probe_tmpl.h | 2 kernel/trace/trace_sched_wakeup.c | 10 kernel/trace/trace_selftest.c | 178 +++ lib/test_fprobe.c | 51 - samples/fprobe/fprobe_example.c | 4 .../test.d/dynevent/add_remove_fprobe_repeat.tc | 19 .../ftrace/test.d/dynevent/fprobe_syntax_errors.tc | 4 39 files changed, 2177 insertions(+), 700 deletions(-) create mode 100644 tools/testing/selftests/ftrace/test.d/dynevent/add_remove_fprobe_repeat.tc -- Masami Hiramatsu (Google) <mhiramat@kernel.org>
Comments
On Thu, 25 Jan 2024 15:54:53 +0100 Jiri Olsa <olsajiri@gmail.com> wrote: > On Fri, Jan 12, 2024 at 07:10:50PM +0900, Masami Hiramatsu (Google) wrote: > > Hi, > > > > Here is the 6th version of the series to re-implement the fprobe on > > function-graph tracer. The previous version is; > > > > https://lore.kernel.org/all/170290509018.220107.1347127510564358608.stgit@devnote2/ > > > > This version fixes use-after-unregister bug and arm64 stack unwinding > > bug [13/36], add an improvement for multiple interrupts during push > > operation[20/36], keep SAVE_REGS until BPF and fprobe_event using > > ftrace_regs[26/36], also reorder the patches[30/36][31/36] so that new > > fprobe can switch to SAVE_ARGS[32/36] safely. > > This series also temporarily adds a DIRECT_CALLS bugfix[1/36], which > > should be pushed separatedly as a stable bugfix. > > > > There are some TODOs: > > - Add s390x and loongarch support to fprobe (multiple fgraph). > > - Fix to get the symbol address from ftrace entry address on arm64. > > (This should be done in BPF trace event) > > - Cleanup code, rename some terms(offset/index) and FGRAPH_TYPE_BITMAP > > part should be merged to FGRAPH_TYPE_ARRAY patch. > > hi, > I'm getting kasan bugs below when running bpf selftests on top of this > patchset.. I think it's probably the reason I see failures in some bpf > kprobe_multi/fprobe tests > > so far I couldn't find the reason.. still checking ;-) Thanks for reporting! Have you built the kernel with debuginfo? In that case, can you decode the line from the address? $ eu-addr2line -fi -e vmlinux ftrace_push_return_trace.isra.0+0x346 This helps me a lot. Thank you, > > jirka > > > --- > [ 507.585913][ T697] BUG: KASAN: slab-out-of-bounds in ftrace_push_return_trace.isra.0+0x346/0x370 > [ 507.586747][ T697] Write of size 8 at addr ffff888148193ff8 by task test_progs/697 > [ 507.587460][ T697] > [ 507.587713][ T697] CPU: 2 PID: 697 Comm: test_progs Tainted: G OE 6.7.0+ #309 d8e2cbcdc10865c6eb2d28ed0cbf958842aa75a8 > [ 507.588821][ T697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 > [ 507.589681][ T697] Call Trace: > [ 507.590044][ T697] <TASK> > [ 507.590357][ T697] dump_stack_lvl+0xf6/0x180 > [ 507.590807][ T697] print_report+0xc4/0x610 > [ 507.591259][ T697] ? fixup_red_left+0x5/0x20 > [ 507.591781][ T697] kasan_report+0xbe/0xf0 > [ 507.592241][ T697] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 507.592928][ T697] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 507.593535][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > [ 507.594076][ T697] ? ftrace_replace_code+0x17a/0x230 > [ 507.594586][ T697] ftrace_push_return_trace.isra.0+0x346/0x370 > [ 507.595192][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > [ 507.595747][ T697] function_graph_enter_ops+0xbb/0x2d0 > [ 507.596271][ T697] ? ftrace_replace_code+0x17a/0x230 > [ 507.596784][ T697] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 507.597353][ T697] ? preempt_count_sub+0x14/0xc0 > [ 507.598576][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > [ 507.599145][ T697] ? __pfx_fuse_sync_fs+0x10/0x10 > [ 507.599718][ T697] ftrace_graph_func+0x142/0x270 > [ 507.600293][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > [ 507.600892][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > [ 507.601484][ T697] 0xffffffffa0560097 > [ 507.602067][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > [ 507.602715][ T697] ? text_poke_loc_init+0x5/0x2e0 > [ 507.603288][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > [ 507.603923][ T697] text_poke_loc_init+0x5/0x2e0 > [ 507.604468][ T697] ftrace_replace_code+0x17a/0x230 > [ 507.605071][ T697] ftrace_modify_all_code+0x131/0x1a0 > [ 507.605663][ T697] ftrace_startup+0x10b/0x210 > [ 507.606200][ T697] register_ftrace_graph+0x313/0x8a0 > [ 507.606805][ T697] ? register_ftrace_graph+0x3fe/0x8a0 > [ 507.607427][ T697] register_fprobe_ips.part.0+0x25a/0x3f0 > [ 507.608090][ T697] bpf_kprobe_multi_link_attach+0x49e/0x850 > [ 507.608781][ T697] ? __pfx_bpf_kprobe_multi_link_attach+0x10/0x10 > [ 507.609500][ T697] ? __debug_check_no_obj_freed+0x1d8/0x3a0 > [ 507.610194][ T697] ? __fget_light+0x96/0xe0 > [ 507.610741][ T697] __sys_bpf+0x307a/0x3180 > [ 507.611286][ T697] ? __pfx___sys_bpf+0x10/0x10 > [ 507.611838][ T697] ? __kasan_slab_free+0x12d/0x1c0 > [ 507.612434][ T697] ? audit_log_exit+0x8e0/0x1960 > [ 507.613003][ T697] ? kmem_cache_free+0x19d/0x460 > [ 507.613644][ T697] ? rcu_is_watching+0x34/0x60 > [ 507.614202][ T697] ? lockdep_hardirqs_on_prepare+0xe/0x250 > [ 507.614865][ T697] ? seqcount_lockdep_reader_access.constprop.0+0x105/0x120 > [ 507.615662][ T697] ? seqcount_lockdep_reader_access.constprop.0+0xb2/0x120 > [ 507.616431][ T697] __x64_sys_bpf+0x44/0x60 > [ 507.616940][ T697] do_syscall_64+0x87/0x1b0 > [ 507.617495][ T697] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > [ 507.618179][ T697] RIP: 0033:0x7ff2edca6b4d > [ 507.618745][ T697] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b 92 0c 00 f7 d8 64 89 01 48 > [ 507.620863][ T697] RSP: 002b:00007ffe2e58a8f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000141 > [ 507.621749][ T697] RAX: ffffffffffffffda RBX: 00007ffe2e58b018 RCX: 00007ff2edca6b4d > [ 507.622580][ T697] RDX: 0000000000000040 RSI: 00007ffe2e58a970 RDI: 000000000000001c > [ 507.623395][ T697] RBP: 00007ffe2e58a910 R08: 0000000000000001 R09: 00007ffe2e58a970 > [ 507.624198][ T697] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000001 > [ 507.625029][ T697] R13: 0000000000000000 R14: 00007ff2eddee000 R15: 0000000000edcdb0 > [ 507.625989][ T697] </TASK> > [ 507.626377][ T697] > [ 507.626678][ T697] Allocated by task 697: > [ 507.627175][ T697] kasan_save_stack+0x1c/0x40 > [ 507.627757][ T697] kasan_save_track+0x10/0x30 > [ 507.628992][ T697] __kasan_kmalloc+0xa6/0xb0 > [ 507.629502][ T697] register_ftrace_graph+0x42b/0x8a0 > [ 507.630071][ T697] register_fprobe_ips.part.0+0x25a/0x3f0 > [ 507.630649][ T697] bpf_kprobe_multi_link_attach+0x49e/0x850 > [ 507.631218][ T697] __sys_bpf+0x307a/0x3180 > [ 507.631662][ T697] __x64_sys_bpf+0x44/0x60 > [ 507.632128][ T697] do_syscall_64+0x87/0x1b0 > [ 507.632577][ T697] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > [ 507.633136][ T697] > [ 507.633399][ T697] The buggy address belongs to the object at ffff888148194000 > [ 507.633399][ T697] which belongs to the cache kmalloc-4k of size 4096 > [ 507.634667][ T697] The buggy address is located 8 bytes to the left of > [ 507.634667][ T697] allocated 4096-byte region [ffff888148194000, ffff888148195000) > [ 507.636028][ T697] > [ 507.636392][ T697] The buggy address belongs to the physical page: > [ 507.637106][ T697] page:ffffea0005206400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x148190 > [ 507.638206][ T697] head:ffffea0005206400 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 > [ 507.639082][ T697] flags: 0x17ffe000000840(slab|head|node=0|zone=2|lastcpupid=0x3fff) > [ 507.639858][ T697] page_type: 0xffffffff() > [ 507.640306][ T697] raw: 0017ffe000000840 ffff888100043a40 ffffea0005a89610 ffffea0005d0de10 > [ 507.641244][ T697] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 > [ 507.642184][ T697] page dumped because: kasan: bad access detected > [ 507.642853][ T697] > [ 507.643152][ T697] Memory state around the buggy address: > [ 507.643773][ T697] ffff888148193e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 507.644661][ T697] ffff888148193f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 507.645490][ T697] >ffff888148193f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 507.646263][ T697] ^ > [ 507.647025][ T697] ffff888148194000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > [ 507.647821][ T697] ffff888148194080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > [ 507.648588][ T697] ================================================================== > > --- > > [ 367.302586][ T973] BUG: KASAN: slab-out-of-bounds in ftrace_push_return_trace.isra.0+0x346/0x370 > [ 367.303380][ T973] Write of size 8 at addr ffff888174e58ff8 by task kworker/u12:10/973 > [ 367.304243][ T973] > [ 367.304599][ T973] CPU: 3 PID: 973 Comm: kworker/u12:10 Tainted: G OE 6.7.0+ #312 a13024221ef8bb3aaeade334af809d35027f09e3 > [ 367.305894][ T973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 > [ 367.306834][ T973] Workqueue: writeback wb_workfn (flush-253:0) > [ 367.307415][ T973] Call Trace: > [ 367.307786][ T973] <TASK> > [ 367.308130][ T973] dump_stack_lvl+0xf6/0x180 > [ 367.308610][ T973] print_report+0xc4/0x610 > [ 367.309090][ T973] ? fixup_red_left+0x5/0x20 > [ 367.309557][ T973] kasan_report+0xbe/0xf0 > [ 367.309926][ T973] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 367.310404][ T973] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 367.310932][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > [ 367.311529][ T973] ? arch_stack_walk+0x9e/0xf0 > [ 367.312092][ T973] ftrace_push_return_trace.isra.0+0x346/0x370 > [ 367.312769][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 367.313414][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > [ 367.313946][ T973] function_graph_enter_ops+0xbb/0x2d0 > [ 367.314518][ T973] ? arch_stack_walk+0x9e/0xf0 > [ 367.315016][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 367.315540][ T973] ? ftrace_graph_func+0x173/0x270 > [ 367.316084][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > [ 367.317791][ T973] ftrace_graph_func+0x142/0x270 > [ 367.318231][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > [ 367.318690][ T973] ? __pfx_stack_trace_consume_entry+0x10/0x10 > [ 367.319159][ T973] 0xffffffffa0568097 > [ 367.319542][ T973] ? preempt_count_sub+0x5/0xc0 > [ 367.320073][ T973] ? preempt_count_sub+0x14/0xc0 > [ 367.320610][ T973] ? preempt_count_sub+0x14/0xc0 > [ 367.321226][ T973] ? unwind_get_return_address+0x5/0x50 > [ 367.321862][ T973] unwind_get_return_address+0x5/0x50 > [ 367.322449][ T973] arch_stack_walk+0x9e/0xf0 > [ 367.322997][ T973] ? worker_thread+0x393/0x680 > [ 367.323553][ T973] stack_trace_save+0x91/0xd0 > [ 367.324087][ T973] ? __pfx_stack_trace_save+0x10/0x10 > [ 367.324708][ T973] ? stack_trace_save+0x5/0xd0 > [ 367.325244][ T973] ? kvm_sched_clock_read+0xd/0x20 > [ 367.325822][ T973] kasan_save_stack+0x1c/0x40 > [ 367.326326][ T973] ? kasan_save_stack+0x1c/0x40 > [ 367.326828][ T973] ? kasan_save_track+0x10/0x30 > [ 367.327298][ T973] ? __kasan_slab_alloc+0x85/0x90 > [ 367.327803][ T973] ? kmem_cache_alloc+0x159/0x460 > [ 367.328383][ T973] ? mempool_alloc+0xe1/0x270 > [ 367.328925][ T973] ? bio_alloc_bioset+0x2c6/0x440 > [ 367.329435][ T973] ? iomap_do_writepage+0x784/0x1090 > [ 367.329993][ T973] ? write_cache_pages+0x2be/0x720 > [ 367.330506][ T973] ? iomap_writepages+0x39/0x70 > [ 367.331015][ T973] ? xfs_vm_writepages+0xf6/0x150 > [ 367.331583][ T973] ? do_writepages+0x104/0x320 > [ 367.332163][ T973] ? __writeback_single_inode+0x9e/0x6e0 > [ 367.332754][ T973] ? writeback_sb_inodes+0x384/0x830 > [ 367.333329][ T973] ? __writeback_inodes_wb+0x70/0x130 > [ 367.333915][ T973] ? wb_writeback+0x486/0x5b0 > [ 367.334437][ T973] ? wb_workfn+0x68b/0x8c0 > [ 367.334942][ T973] ? process_one_work+0x48c/0x970 > [ 367.335574][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 367.336257][ T973] ? kmem_cache_alloc+0x415/0x460 > [ 367.336818][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > [ 367.337426][ T973] ? iomap_do_writepage+0x784/0x1090 > [ 367.337947][ T973] ? write_cache_pages+0x2be/0x720 > [ 367.338475][ T973] ? iomap_writepages+0x39/0x70 > [ 367.338981][ T973] ? xfs_vm_writepages+0xf6/0x150 > [ 367.339514][ T973] ? do_writepages+0x104/0x320 > [ 367.340065][ T973] ? ftrace_graph_func+0x173/0x270 > [ 367.340658][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > [ 367.341225][ T973] ? mempool_alloc+0xe1/0x270 > [ 367.341729][ T973] ? 0xffffffffa0568097 > [ 367.342155][ T973] ? 0xffffffffa0568097 > [ 367.342598][ T973] ? preempt_count_sub+0x5/0xc0 > [ 367.343109][ T973] ? mempool_alloc+0xe1/0x270 > [ 367.343590][ T973] kasan_save_track+0x10/0x30 > [ 367.344040][ T973] __kasan_slab_alloc+0x85/0x90 > [ 367.344542][ T973] kmem_cache_alloc+0x159/0x460 > [ 367.345024][ T973] ? __pfx_mempool_alloc_slab+0x10/0x10 > [ 367.345518][ T973] mempool_alloc+0xe1/0x270 > [ 367.345997][ T973] ? __pfx_mempool_alloc+0x10/0x10 > [ 367.346526][ T973] ? 0xffffffffa0568097 > [ 367.346973][ T973] ? ftrace_push_return_trace.isra.0+0x17c/0x370 > [ 367.348141][ T973] bio_alloc_bioset+0x2c6/0x440 > [ 367.348653][ T973] ? __pfx_bio_alloc_bioset+0x10/0x10 > [ 367.349221][ T973] iomap_do_writepage+0x784/0x1090 > [ 367.349763][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > [ 367.350306][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > [ 367.350860][ T973] write_cache_pages+0x2be/0x720 > [ 367.351366][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > [ 367.351921][ T973] ? __pfx_write_cache_pages+0x10/0x10 > [ 367.352468][ T973] ? ftrace_graph_func+0x173/0x270 > [ 367.352967][ T973] ? ksys_fadvise64_64+0x8c/0xc0 > [ 367.357367][ T973] ? __pfx_lock_release+0x10/0x10 > [ 367.357872][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > [ 367.358440][ T973] iomap_writepages+0x39/0x70 > [ 367.358953][ T973] xfs_vm_writepages+0xf6/0x150 > [ 367.359505][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > [ 367.360108][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > [ 367.360740][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > [ 367.361343][ T973] ? do_writepages+0x164/0x320 > [ 367.361893][ T973] do_writepages+0x104/0x320 > [ 367.362414][ T973] ? __pfx_do_writepages+0x10/0x10 > [ 367.362957][ T973] ? 0xffffffffa0568097 > [ 367.363449][ T973] ? __pfx___writeback_single_inode+0x10/0x10 > [ 367.364114][ T973] __writeback_single_inode+0x9e/0x6e0 > [ 367.364705][ T973] writeback_sb_inodes+0x384/0x830 > [ 367.365295][ T973] ? __pfx_writeback_sb_inodes+0x10/0x10 > [ 367.365857][ T973] ? __pfx_writeback_sb_inodes+0x10/0x10 > [ 367.366505][ T973] ? super_trylock_shared+0x46/0x70 > [ 367.367085][ T973] __writeback_inodes_wb+0x70/0x130 > [ 367.367764][ T973] wb_writeback+0x486/0x5b0 > [ 367.368300][ T973] ? __pfx_wb_writeback+0x10/0x10 > [ 367.368860][ T973] ? 0xffffffffa0568097 > [ 367.369339][ T973] ? __pfx_lock_release+0x10/0x10 > [ 367.369940][ T973] wb_workfn+0x68b/0x8c0 > [ 367.370473][ T973] ? _raw_spin_unlock_irqrestore+0x37/0xb0 > [ 367.371131][ T973] ? __pfx_wb_workfn+0x10/0x10 > [ 367.371600][ T973] ? ftrace_graph_func+0x173/0x270 > [ 367.372110][ T973] ? __pfx_wb_workfn+0x10/0x10 > [ 367.372609][ T973] ? 0xffffffffa0568097 > [ 367.373044][ T973] ? __pfx_wb_workfn+0x10/0x10 > [ 367.373507][ T973] ? process_one_work+0x483/0x970 > [ 367.373990][ T973] ? rcu_is_watching+0x34/0x60 > [ 367.374474][ T973] process_one_work+0x48c/0x970 > [ 367.374956][ T973] ? __pfx_process_one_work+0x10/0x10 > [ 367.375474][ T973] ? 0xffffffffa0568097 > [ 367.375903][ T973] ? __list_add_valid_or_report+0x33/0xc0 > [ 367.376518][ T973] ? worker_thread+0x375/0x680 > [ 367.377065][ T973] worker_thread+0x393/0x680 > [ 367.378058][ T973] ? __pfx_worker_thread+0x10/0x10 > [ 367.378649][ T973] kthread+0x1ad/0x1f0 > [ 367.379076][ T973] ? kthread+0xf2/0x1f0 > [ 367.379513][ T973] ? __pfx_kthread+0x10/0x10 > [ 367.380003][ T973] ret_from_fork+0x2d/0x50 > [ 367.380483][ T973] ? __pfx_kthread+0x10/0x10 > [ 367.380993][ T973] ret_from_fork_asm+0x1b/0x30 > [ 367.381486][ T973] </TASK> > [ 367.381815][ T973] > [ 367.382070][ T973] Allocated by task 719: > [ 367.382508][ T973] kasan_save_stack+0x1c/0x40 > [ 367.382988][ T973] kasan_save_track+0x10/0x30 > [ 367.383477][ T973] __kasan_kmalloc+0xa6/0xb0 > [ 367.383960][ T973] register_ftrace_graph+0x42b/0x8a0 > [ 367.384454][ T973] register_fprobe_ips.part.0+0x25a/0x3f0 > [ 367.385075][ T973] bpf_kprobe_multi_link_attach+0x49e/0x850 > [ 367.385713][ T973] __sys_bpf+0x307a/0x3180 > [ 367.386217][ T973] __x64_sys_bpf+0x44/0x60 > [ 367.386716][ T973] do_syscall_64+0x87/0x1b0 > [ 367.387220][ T973] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > [ 367.387878][ T973] > [ 367.388193][ T973] The buggy address belongs to the object at ffff888174e59000 > [ 367.388193][ T973] which belongs to the cache kmalloc-4k of size 4096 > [ 367.389731][ T973] The buggy address is located 8 bytes to the left of > [ 367.389731][ T973] allocated 4096-byte region [ffff888174e59000, ffff888174e5a000) > [ 367.391266][ T973] > [ 367.391580][ T973] The buggy address belongs to the physical page: > [ 367.392285][ T973] page:ffffea0005d39600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x174e58 > [ 367.393398][ T973] head:ffffea0005d39600 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 > [ 367.394437][ T973] flags: 0x17ffe000000840(slab|head|node=0|zone=2|lastcpupid=0x3fff) > [ 367.395335][ T973] page_type: 0xffffffff() > [ 367.395837][ T973] raw: 0017ffe000000840 ffff888100043a40 ffffea000674d010 ffffea0004bc8c10 > [ 367.396786][ T973] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 > [ 367.397728][ T973] page dumped because: kasan: bad access detected > [ 367.398458][ T973] > [ 367.398766][ T973] Memory state around the buggy address: > [ 367.399411][ T973] ffff888174e58e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 367.400296][ T973] ffff888174e58f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 367.401189][ T973] >ffff888174e58f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > [ 367.402093][ T973] ^ > [ 367.402983][ T973] ffff888174e59000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > [ 367.403879][ T973] ffff888174e59080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > [ 367.404769][ T973] ==================================================================
On Sat, 27 Jan 2024 00:14:05 +0900 Masami Hiramatsu (Google) <mhiramat@kernel.org> wrote: > On Thu, 25 Jan 2024 15:54:53 +0100 > Jiri Olsa <olsajiri@gmail.com> wrote: > > > On Fri, Jan 12, 2024 at 07:10:50PM +0900, Masami Hiramatsu (Google) wrote: > > > Hi, > > > > > > Here is the 6th version of the series to re-implement the fprobe on > > > function-graph tracer. The previous version is; > > > > > > https://lore.kernel.org/all/170290509018.220107.1347127510564358608.stgit@devnote2/ > > > > > > This version fixes use-after-unregister bug and arm64 stack unwinding > > > bug [13/36], add an improvement for multiple interrupts during push > > > operation[20/36], keep SAVE_REGS until BPF and fprobe_event using > > > ftrace_regs[26/36], also reorder the patches[30/36][31/36] so that new > > > fprobe can switch to SAVE_ARGS[32/36] safely. > > > This series also temporarily adds a DIRECT_CALLS bugfix[1/36], which > > > should be pushed separatedly as a stable bugfix. > > > > > > There are some TODOs: > > > - Add s390x and loongarch support to fprobe (multiple fgraph). > > > - Fix to get the symbol address from ftrace entry address on arm64. > > > (This should be done in BPF trace event) > > > - Cleanup code, rename some terms(offset/index) and FGRAPH_TYPE_BITMAP > > > part should be merged to FGRAPH_TYPE_ARRAY patch. > > > > hi, > > I'm getting kasan bugs below when running bpf selftests on top of this > > patchset.. I think it's probably the reason I see failures in some bpf > > kprobe_multi/fprobe tests > > > > so far I couldn't find the reason.. still checking ;-) > > Thanks for reporting! Have you built the kernel with debuginfo? In that > case, can you decode the line from the address? > > $ eu-addr2line -fi -e vmlinux ftrace_push_return_trace.isra.0+0x346 > > This helps me a lot. I also got the same KASAN error from intel's test bot: https://lore.kernel.org/all/202401172217.36e37075-oliver.sang@intel.com/ And another one (it should be different one) https://lore.kernel.org/all/202401172200.c8731564-oliver.sang@intel.com/ This is a selftest failure on i386. I might break something on 32bit. Let me check. Thank you, > > Thank you, > > > > > jirka > > > > > > --- > > [ 507.585913][ T697] BUG: KASAN: slab-out-of-bounds in ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 507.586747][ T697] Write of size 8 at addr ffff888148193ff8 by task test_progs/697 > > [ 507.587460][ T697] > > [ 507.587713][ T697] CPU: 2 PID: 697 Comm: test_progs Tainted: G OE 6.7.0+ #309 d8e2cbcdc10865c6eb2d28ed0cbf958842aa75a8 > > [ 507.588821][ T697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 > > [ 507.589681][ T697] Call Trace: > > [ 507.590044][ T697] <TASK> > > [ 507.590357][ T697] dump_stack_lvl+0xf6/0x180 > > [ 507.590807][ T697] print_report+0xc4/0x610 > > [ 507.591259][ T697] ? fixup_red_left+0x5/0x20 > > [ 507.591781][ T697] kasan_report+0xbe/0xf0 > > [ 507.592241][ T697] ? ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 507.592928][ T697] ? ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 507.593535][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > > [ 507.594076][ T697] ? ftrace_replace_code+0x17a/0x230 > > [ 507.594586][ T697] ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 507.595192][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > > [ 507.595747][ T697] function_graph_enter_ops+0xbb/0x2d0 > > [ 507.596271][ T697] ? ftrace_replace_code+0x17a/0x230 > > [ 507.596784][ T697] ? __pfx_function_graph_enter_ops+0x10/0x10 > > [ 507.597353][ T697] ? preempt_count_sub+0x14/0xc0 > > [ 507.598576][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > > [ 507.599145][ T697] ? __pfx_fuse_sync_fs+0x10/0x10 > > [ 507.599718][ T697] ftrace_graph_func+0x142/0x270 > > [ 507.600293][ T697] ? __pfx_text_poke_loc_init+0x10/0x10 > > [ 507.600892][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > > [ 507.601484][ T697] 0xffffffffa0560097 > > [ 507.602067][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > > [ 507.602715][ T697] ? text_poke_loc_init+0x5/0x2e0 > > [ 507.603288][ T697] ? __pfx_fuse_conn_put.part.0+0x10/0x10 > > [ 507.603923][ T697] text_poke_loc_init+0x5/0x2e0 > > [ 507.604468][ T697] ftrace_replace_code+0x17a/0x230 > > [ 507.605071][ T697] ftrace_modify_all_code+0x131/0x1a0 > > [ 507.605663][ T697] ftrace_startup+0x10b/0x210 > > [ 507.606200][ T697] register_ftrace_graph+0x313/0x8a0 > > [ 507.606805][ T697] ? register_ftrace_graph+0x3fe/0x8a0 > > [ 507.607427][ T697] register_fprobe_ips.part.0+0x25a/0x3f0 > > [ 507.608090][ T697] bpf_kprobe_multi_link_attach+0x49e/0x850 > > [ 507.608781][ T697] ? __pfx_bpf_kprobe_multi_link_attach+0x10/0x10 > > [ 507.609500][ T697] ? __debug_check_no_obj_freed+0x1d8/0x3a0 > > [ 507.610194][ T697] ? __fget_light+0x96/0xe0 > > [ 507.610741][ T697] __sys_bpf+0x307a/0x3180 > > [ 507.611286][ T697] ? __pfx___sys_bpf+0x10/0x10 > > [ 507.611838][ T697] ? __kasan_slab_free+0x12d/0x1c0 > > [ 507.612434][ T697] ? audit_log_exit+0x8e0/0x1960 > > [ 507.613003][ T697] ? kmem_cache_free+0x19d/0x460 > > [ 507.613644][ T697] ? rcu_is_watching+0x34/0x60 > > [ 507.614202][ T697] ? lockdep_hardirqs_on_prepare+0xe/0x250 > > [ 507.614865][ T697] ? seqcount_lockdep_reader_access.constprop.0+0x105/0x120 > > [ 507.615662][ T697] ? seqcount_lockdep_reader_access.constprop.0+0xb2/0x120 > > [ 507.616431][ T697] __x64_sys_bpf+0x44/0x60 > > [ 507.616940][ T697] do_syscall_64+0x87/0x1b0 > > [ 507.617495][ T697] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > > [ 507.618179][ T697] RIP: 0033:0x7ff2edca6b4d > > [ 507.618745][ T697] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b 92 0c 00 f7 d8 64 89 01 48 > > [ 507.620863][ T697] RSP: 002b:00007ffe2e58a8f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000141 > > [ 507.621749][ T697] RAX: ffffffffffffffda RBX: 00007ffe2e58b018 RCX: 00007ff2edca6b4d > > [ 507.622580][ T697] RDX: 0000000000000040 RSI: 00007ffe2e58a970 RDI: 000000000000001c > > [ 507.623395][ T697] RBP: 00007ffe2e58a910 R08: 0000000000000001 R09: 00007ffe2e58a970 > > [ 507.624198][ T697] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000001 > > [ 507.625029][ T697] R13: 0000000000000000 R14: 00007ff2eddee000 R15: 0000000000edcdb0 > > [ 507.625989][ T697] </TASK> > > [ 507.626377][ T697] > > [ 507.626678][ T697] Allocated by task 697: > > [ 507.627175][ T697] kasan_save_stack+0x1c/0x40 > > [ 507.627757][ T697] kasan_save_track+0x10/0x30 > > [ 507.628992][ T697] __kasan_kmalloc+0xa6/0xb0 > > [ 507.629502][ T697] register_ftrace_graph+0x42b/0x8a0 > > [ 507.630071][ T697] register_fprobe_ips.part.0+0x25a/0x3f0 > > [ 507.630649][ T697] bpf_kprobe_multi_link_attach+0x49e/0x850 > > [ 507.631218][ T697] __sys_bpf+0x307a/0x3180 > > [ 507.631662][ T697] __x64_sys_bpf+0x44/0x60 > > [ 507.632128][ T697] do_syscall_64+0x87/0x1b0 > > [ 507.632577][ T697] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > > [ 507.633136][ T697] > > [ 507.633399][ T697] The buggy address belongs to the object at ffff888148194000 > > [ 507.633399][ T697] which belongs to the cache kmalloc-4k of size 4096 > > [ 507.634667][ T697] The buggy address is located 8 bytes to the left of > > [ 507.634667][ T697] allocated 4096-byte region [ffff888148194000, ffff888148195000) > > [ 507.636028][ T697] > > [ 507.636392][ T697] The buggy address belongs to the physical page: > > [ 507.637106][ T697] page:ffffea0005206400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x148190 > > [ 507.638206][ T697] head:ffffea0005206400 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 > > [ 507.639082][ T697] flags: 0x17ffe000000840(slab|head|node=0|zone=2|lastcpupid=0x3fff) > > [ 507.639858][ T697] page_type: 0xffffffff() > > [ 507.640306][ T697] raw: 0017ffe000000840 ffff888100043a40 ffffea0005a89610 ffffea0005d0de10 > > [ 507.641244][ T697] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 > > [ 507.642184][ T697] page dumped because: kasan: bad access detected > > [ 507.642853][ T697] > > [ 507.643152][ T697] Memory state around the buggy address: > > [ 507.643773][ T697] ffff888148193e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 507.644661][ T697] ffff888148193f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 507.645490][ T697] >ffff888148193f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 507.646263][ T697] ^ > > [ 507.647025][ T697] ffff888148194000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 507.647821][ T697] ffff888148194080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 507.648588][ T697] ================================================================== > > > > --- > > > > [ 367.302586][ T973] BUG: KASAN: slab-out-of-bounds in ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 367.303380][ T973] Write of size 8 at addr ffff888174e58ff8 by task kworker/u12:10/973 > > [ 367.304243][ T973] > > [ 367.304599][ T973] CPU: 3 PID: 973 Comm: kworker/u12:10 Tainted: G OE 6.7.0+ #312 a13024221ef8bb3aaeade334af809d35027f09e3 > > [ 367.305894][ T973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 > > [ 367.306834][ T973] Workqueue: writeback wb_workfn (flush-253:0) > > [ 367.307415][ T973] Call Trace: > > [ 367.307786][ T973] <TASK> > > [ 367.308130][ T973] dump_stack_lvl+0xf6/0x180 > > [ 367.308610][ T973] print_report+0xc4/0x610 > > [ 367.309090][ T973] ? fixup_red_left+0x5/0x20 > > [ 367.309557][ T973] kasan_report+0xbe/0xf0 > > [ 367.309926][ T973] ? ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 367.310404][ T973] ? ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 367.310932][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > > [ 367.311529][ T973] ? arch_stack_walk+0x9e/0xf0 > > [ 367.312092][ T973] ftrace_push_return_trace.isra.0+0x346/0x370 > > [ 367.312769][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > > [ 367.313414][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > > [ 367.313946][ T973] function_graph_enter_ops+0xbb/0x2d0 > > [ 367.314518][ T973] ? arch_stack_walk+0x9e/0xf0 > > [ 367.315016][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > > [ 367.315540][ T973] ? ftrace_graph_func+0x173/0x270 > > [ 367.316084][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > > [ 367.317791][ T973] ftrace_graph_func+0x142/0x270 > > [ 367.318231][ T973] ? __pfx_unwind_get_return_address+0x10/0x10 > > [ 367.318690][ T973] ? __pfx_stack_trace_consume_entry+0x10/0x10 > > [ 367.319159][ T973] 0xffffffffa0568097 > > [ 367.319542][ T973] ? preempt_count_sub+0x5/0xc0 > > [ 367.320073][ T973] ? preempt_count_sub+0x14/0xc0 > > [ 367.320610][ T973] ? preempt_count_sub+0x14/0xc0 > > [ 367.321226][ T973] ? unwind_get_return_address+0x5/0x50 > > [ 367.321862][ T973] unwind_get_return_address+0x5/0x50 > > [ 367.322449][ T973] arch_stack_walk+0x9e/0xf0 > > [ 367.322997][ T973] ? worker_thread+0x393/0x680 > > [ 367.323553][ T973] stack_trace_save+0x91/0xd0 > > [ 367.324087][ T973] ? __pfx_stack_trace_save+0x10/0x10 > > [ 367.324708][ T973] ? stack_trace_save+0x5/0xd0 > > [ 367.325244][ T973] ? kvm_sched_clock_read+0xd/0x20 > > [ 367.325822][ T973] kasan_save_stack+0x1c/0x40 > > [ 367.326326][ T973] ? kasan_save_stack+0x1c/0x40 > > [ 367.326828][ T973] ? kasan_save_track+0x10/0x30 > > [ 367.327298][ T973] ? __kasan_slab_alloc+0x85/0x90 > > [ 367.327803][ T973] ? kmem_cache_alloc+0x159/0x460 > > [ 367.328383][ T973] ? mempool_alloc+0xe1/0x270 > > [ 367.328925][ T973] ? bio_alloc_bioset+0x2c6/0x440 > > [ 367.329435][ T973] ? iomap_do_writepage+0x784/0x1090 > > [ 367.329993][ T973] ? write_cache_pages+0x2be/0x720 > > [ 367.330506][ T973] ? iomap_writepages+0x39/0x70 > > [ 367.331015][ T973] ? xfs_vm_writepages+0xf6/0x150 > > [ 367.331583][ T973] ? do_writepages+0x104/0x320 > > [ 367.332163][ T973] ? __writeback_single_inode+0x9e/0x6e0 > > [ 367.332754][ T973] ? writeback_sb_inodes+0x384/0x830 > > [ 367.333329][ T973] ? __writeback_inodes_wb+0x70/0x130 > > [ 367.333915][ T973] ? wb_writeback+0x486/0x5b0 > > [ 367.334437][ T973] ? wb_workfn+0x68b/0x8c0 > > [ 367.334942][ T973] ? process_one_work+0x48c/0x970 > > [ 367.335574][ T973] ? __pfx_function_graph_enter_ops+0x10/0x10 > > [ 367.336257][ T973] ? kmem_cache_alloc+0x415/0x460 > > [ 367.336818][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > > [ 367.337426][ T973] ? iomap_do_writepage+0x784/0x1090 > > [ 367.337947][ T973] ? write_cache_pages+0x2be/0x720 > > [ 367.338475][ T973] ? iomap_writepages+0x39/0x70 > > [ 367.338981][ T973] ? xfs_vm_writepages+0xf6/0x150 > > [ 367.339514][ T973] ? do_writepages+0x104/0x320 > > [ 367.340065][ T973] ? ftrace_graph_func+0x173/0x270 > > [ 367.340658][ T973] ? __pfx_preempt_count_sub+0x10/0x10 > > [ 367.341225][ T973] ? mempool_alloc+0xe1/0x270 > > [ 367.341729][ T973] ? 0xffffffffa0568097 > > [ 367.342155][ T973] ? 0xffffffffa0568097 > > [ 367.342598][ T973] ? preempt_count_sub+0x5/0xc0 > > [ 367.343109][ T973] ? mempool_alloc+0xe1/0x270 > > [ 367.343590][ T973] kasan_save_track+0x10/0x30 > > [ 367.344040][ T973] __kasan_slab_alloc+0x85/0x90 > > [ 367.344542][ T973] kmem_cache_alloc+0x159/0x460 > > [ 367.345024][ T973] ? __pfx_mempool_alloc_slab+0x10/0x10 > > [ 367.345518][ T973] mempool_alloc+0xe1/0x270 > > [ 367.345997][ T973] ? __pfx_mempool_alloc+0x10/0x10 > > [ 367.346526][ T973] ? 0xffffffffa0568097 > > [ 367.346973][ T973] ? ftrace_push_return_trace.isra.0+0x17c/0x370 > > [ 367.348141][ T973] bio_alloc_bioset+0x2c6/0x440 > > [ 367.348653][ T973] ? __pfx_bio_alloc_bioset+0x10/0x10 > > [ 367.349221][ T973] iomap_do_writepage+0x784/0x1090 > > [ 367.349763][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > > [ 367.350306][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > > [ 367.350860][ T973] write_cache_pages+0x2be/0x720 > > [ 367.351366][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > > [ 367.351921][ T973] ? __pfx_write_cache_pages+0x10/0x10 > > [ 367.352468][ T973] ? ftrace_graph_func+0x173/0x270 > > [ 367.352967][ T973] ? ksys_fadvise64_64+0x8c/0xc0 > > [ 367.357367][ T973] ? __pfx_lock_release+0x10/0x10 > > [ 367.357872][ T973] ? __pfx_iomap_do_writepage+0x10/0x10 > > [ 367.358440][ T973] iomap_writepages+0x39/0x70 > > [ 367.358953][ T973] xfs_vm_writepages+0xf6/0x150 > > [ 367.359505][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > > [ 367.360108][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > > [ 367.360740][ T973] ? __pfx_xfs_vm_writepages+0x10/0x10 > > [ 367.361343][ T973] ? do_writepages+0x164/0x320 > > [ 367.361893][ T973] do_writepages+0x104/0x320 > > [ 367.362414][ T973] ? __pfx_do_writepages+0x10/0x10 > > [ 367.362957][ T973] ? 0xffffffffa0568097 > > [ 367.363449][ T973] ? __pfx___writeback_single_inode+0x10/0x10 > > [ 367.364114][ T973] __writeback_single_inode+0x9e/0x6e0 > > [ 367.364705][ T973] writeback_sb_inodes+0x384/0x830 > > [ 367.365295][ T973] ? __pfx_writeback_sb_inodes+0x10/0x10 > > [ 367.365857][ T973] ? __pfx_writeback_sb_inodes+0x10/0x10 > > [ 367.366505][ T973] ? super_trylock_shared+0x46/0x70 > > [ 367.367085][ T973] __writeback_inodes_wb+0x70/0x130 > > [ 367.367764][ T973] wb_writeback+0x486/0x5b0 > > [ 367.368300][ T973] ? __pfx_wb_writeback+0x10/0x10 > > [ 367.368860][ T973] ? 0xffffffffa0568097 > > [ 367.369339][ T973] ? __pfx_lock_release+0x10/0x10 > > [ 367.369940][ T973] wb_workfn+0x68b/0x8c0 > > [ 367.370473][ T973] ? _raw_spin_unlock_irqrestore+0x37/0xb0 > > [ 367.371131][ T973] ? __pfx_wb_workfn+0x10/0x10 > > [ 367.371600][ T973] ? ftrace_graph_func+0x173/0x270 > > [ 367.372110][ T973] ? __pfx_wb_workfn+0x10/0x10 > > [ 367.372609][ T973] ? 0xffffffffa0568097 > > [ 367.373044][ T973] ? __pfx_wb_workfn+0x10/0x10 > > [ 367.373507][ T973] ? process_one_work+0x483/0x970 > > [ 367.373990][ T973] ? rcu_is_watching+0x34/0x60 > > [ 367.374474][ T973] process_one_work+0x48c/0x970 > > [ 367.374956][ T973] ? __pfx_process_one_work+0x10/0x10 > > [ 367.375474][ T973] ? 0xffffffffa0568097 > > [ 367.375903][ T973] ? __list_add_valid_or_report+0x33/0xc0 > > [ 367.376518][ T973] ? worker_thread+0x375/0x680 > > [ 367.377065][ T973] worker_thread+0x393/0x680 > > [ 367.378058][ T973] ? __pfx_worker_thread+0x10/0x10 > > [ 367.378649][ T973] kthread+0x1ad/0x1f0 > > [ 367.379076][ T973] ? kthread+0xf2/0x1f0 > > [ 367.379513][ T973] ? __pfx_kthread+0x10/0x10 > > [ 367.380003][ T973] ret_from_fork+0x2d/0x50 > > [ 367.380483][ T973] ? __pfx_kthread+0x10/0x10 > > [ 367.380993][ T973] ret_from_fork_asm+0x1b/0x30 > > [ 367.381486][ T973] </TASK> > > [ 367.381815][ T973] > > [ 367.382070][ T973] Allocated by task 719: > > [ 367.382508][ T973] kasan_save_stack+0x1c/0x40 > > [ 367.382988][ T973] kasan_save_track+0x10/0x30 > > [ 367.383477][ T973] __kasan_kmalloc+0xa6/0xb0 > > [ 367.383960][ T973] register_ftrace_graph+0x42b/0x8a0 > > [ 367.384454][ T973] register_fprobe_ips.part.0+0x25a/0x3f0 > > [ 367.385075][ T973] bpf_kprobe_multi_link_attach+0x49e/0x850 > > [ 367.385713][ T973] __sys_bpf+0x307a/0x3180 > > [ 367.386217][ T973] __x64_sys_bpf+0x44/0x60 > > [ 367.386716][ T973] do_syscall_64+0x87/0x1b0 > > [ 367.387220][ T973] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > > [ 367.387878][ T973] > > [ 367.388193][ T973] The buggy address belongs to the object at ffff888174e59000 > > [ 367.388193][ T973] which belongs to the cache kmalloc-4k of size 4096 > > [ 367.389731][ T973] The buggy address is located 8 bytes to the left of > > [ 367.389731][ T973] allocated 4096-byte region [ffff888174e59000, ffff888174e5a000) > > [ 367.391266][ T973] > > [ 367.391580][ T973] The buggy address belongs to the physical page: > > [ 367.392285][ T973] page:ffffea0005d39600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x174e58 > > [ 367.393398][ T973] head:ffffea0005d39600 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 > > [ 367.394437][ T973] flags: 0x17ffe000000840(slab|head|node=0|zone=2|lastcpupid=0x3fff) > > [ 367.395335][ T973] page_type: 0xffffffff() > > [ 367.395837][ T973] raw: 0017ffe000000840 ffff888100043a40 ffffea000674d010 ffffea0004bc8c10 > > [ 367.396786][ T973] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 > > [ 367.397728][ T973] page dumped because: kasan: bad access detected > > [ 367.398458][ T973] > > [ 367.398766][ T973] Memory state around the buggy address: > > [ 367.399411][ T973] ffff888174e58e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 367.400296][ T973] ffff888174e58f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 367.401189][ T973] >ffff888174e58f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > [ 367.402093][ T973] ^ > > [ 367.402983][ T973] ffff888174e59000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 367.403879][ T973] ffff888174e59080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > [ 367.404769][ T973] ================================================================== > > > -- > Masami Hiramatsu (Google) <mhiramat@kernel.org>
On Sat, 27 Jan 2024 19:44:06 +0100 Jiri Olsa <olsajiri@gmail.com> wrote: > On Sat, Jan 27, 2024 at 12:14:05AM +0900, Masami Hiramatsu wrote: > > On Thu, 25 Jan 2024 15:54:53 +0100 > > Jiri Olsa <olsajiri@gmail.com> wrote: > > > > > On Fri, Jan 12, 2024 at 07:10:50PM +0900, Masami Hiramatsu (Google) wrote: > > > > Hi, > > > > > > > > Here is the 6th version of the series to re-implement the fprobe on > > > > function-graph tracer. The previous version is; > > > > > > > > https://lore.kernel.org/all/170290509018.220107.1347127510564358608.stgit@devnote2/ > > > > > > > > This version fixes use-after-unregister bug and arm64 stack unwinding > > > > bug [13/36], add an improvement for multiple interrupts during push > > > > operation[20/36], keep SAVE_REGS until BPF and fprobe_event using > > > > ftrace_regs[26/36], also reorder the patches[30/36][31/36] so that new > > > > fprobe can switch to SAVE_ARGS[32/36] safely. > > > > This series also temporarily adds a DIRECT_CALLS bugfix[1/36], which > > > > should be pushed separatedly as a stable bugfix. > > > > > > > > There are some TODOs: > > > > - Add s390x and loongarch support to fprobe (multiple fgraph). > > > > - Fix to get the symbol address from ftrace entry address on arm64. > > > > (This should be done in BPF trace event) > > > > - Cleanup code, rename some terms(offset/index) and FGRAPH_TYPE_BITMAP > > > > part should be merged to FGRAPH_TYPE_ARRAY patch. > > > > > > hi, > > > I'm getting kasan bugs below when running bpf selftests on top of this > > > patchset.. I think it's probably the reason I see failures in some bpf > > > kprobe_multi/fprobe tests > > > > > > so far I couldn't find the reason.. still checking ;-) > > > > Thanks for reporting! Have you built the kernel with debuginfo? In that > > case, can you decode the line from the address? > > > > $ eu-addr2line -fi -e vmlinux ftrace_push_return_trace.isra.0+0x346 > > > > This helps me a lot. > > I had to recompile/regenerate the fault, it points in here: > > ffffffff8149b390 <ftrace_push_return_trace.isra.0>: > ... > > current->ret_stack[rindex - 1] = val; > ffffffff8149b6b1: 48 8d bd 78 28 00 00 lea 0x2878(%rbp),%rdi > ffffffff8149b6b8: e8 63 e4 28 00 call ffffffff81729b20 <__asan_load8> > ffffffff8149b6bd: 48 8b 95 78 28 00 00 mov 0x2878(%rbp),%rdx > ffffffff8149b6c4: 41 8d 47 ff lea -0x1(%r15),%eax > ffffffff8149b6c8: 48 98 cltq > ffffffff8149b6ca: 4c 8d 24 c2 lea (%rdx,%rax,8),%r12 > ffffffff8149b6ce: 4c 89 e7 mov %r12,%rdi > ffffffff8149b6d1: e8 ea e4 28 00 call ffffffff81729bc0 <__asan_store8> > ---> ffffffff8149b6d6: 49 89 1c 24 mov %rbx,(%r12) > current->curr_ret_stack = index = rindex; > ffffffff8149b6da: 48 8d bd 6c 28 00 00 lea 0x286c(%rbp),%rdi > ffffffff8149b6e1: e8 9a e3 28 00 call ffffffff81729a80 <__asan_store4> > ffffffff8149b6e6: 44 89 bd 6c 28 00 00 mov %r15d,0x286c(%rbp) > ffffffff8149b6ed: e9 8d fd ff ff jmp ffffffff8149b47f <ftrace_push_return_trace.isra.0+0xef> > if (WARN_ON_ONCE(idx <= 0)) > Thanks! So this shows that this bug is failed to check the boundary of shadow stack while pushing the return trace. diff --git a/kernel/trace/fgraph.c b/kernel/trace/fgraph.c index 0f11f80bdd6c..8e1fcc3f4bda 100644 --- a/kernel/trace/fgraph.c +++ b/kernel/trace/fgraph.c @@ -550,7 +550,7 @@ ftrace_push_return_trace(unsigned long ret, unsigned long func, smp_rmb(); /* The return trace stack is full */ - if (current->curr_ret_stack + FGRAPH_RET_INDEX >= SHADOW_STACK_MAX_INDEX) { + if (current->curr_ret_stack + FGRAPH_RET_INDEX + 1 >= SHADOW_STACK_MAX_INDEX) { atomic_inc(¤t->trace_overrun); return -EBUSY; } Sorry, I forgot to increment the space for reserved entry... Thanks, > > the dump is attached below (same address as in previous email) > > jirka > > > --- > [ 360.152200][ C3] BUG: KASAN: slab-out-of-bounds in ftrace_push_return_trace.isra.0+0x346/0x370 > [ 360.153195][ C3] Write of size 8 at addr ffff8881a0e10ff8 by task kworker/3:4/728 > [ 360.154101][ C3] > [ 360.154414][ C3] CPU: 3 PID: 728 Comm: kworker/3:4 Tainted: G OE 6.7.0+ #316 c9b0d53b3491b547d06b6b50629b74711600ddc9 > [ 360.155679][ C3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 > [ 360.156611][ C3] Workqueue: events free_obj_work > [ 360.157175][ C3] Call Trace: > [ 360.157561][ C3] <IRQ> > [ 360.157904][ C3] dump_stack_lvl+0xf6/0x180 > [ 360.158404][ C3] print_report+0xc4/0x610 > [ 360.158853][ C3] ? lock_release+0xba/0x760 > [ 360.159375][ C3] ? __phys_addr+0x5/0x80 > [ 360.159872][ C3] ? __phys_addr+0x33/0x80 > [ 360.161309][ C3] kasan_report+0xbe/0xf0 > [ 360.161940][ C3] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 360.162817][ C3] ? ftrace_push_return_trace.isra.0+0x346/0x370 > [ 360.163518][ C3] ? __pfx_kernel_text_address+0x10/0x10 > [ 360.164152][ C3] ? __kernel_text_address+0xe/0x40 > [ 360.164715][ C3] ftrace_push_return_trace.isra.0+0x346/0x370 > [ 360.165324][ C3] ? __pfx_kernel_text_address+0x10/0x10 > [ 360.165940][ C3] function_graph_enter_ops+0xbb/0x2d0 > [ 360.166555][ C3] ? __kernel_text_address+0xe/0x40 > [ 360.167134][ C3] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 360.167801][ C3] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 360.168454][ C3] ? __pfx___kernel_text_address+0x10/0x10 > [ 360.169086][ C3] ? __pfx_unwind_get_return_address+0x10/0x10 > [ 360.169781][ C3] ftrace_graph_func+0x142/0x270 > [ 360.170341][ C3] ? __pfx_kernel_text_address+0x10/0x10 > [ 360.170960][ C3] ? orc_find.part.0+0x5/0x250 > [ 360.171514][ C3] 0xffffffffa0568097 > [ 360.171990][ C3] ? 0xffffffffa0568097 > [ 360.172463][ C3] ? preempt_count_sub+0x5/0xc0 > [ 360.172948][ C3] ? unwind_get_return_address+0x2a/0x50 > [ 360.173512][ C3] ? unwind_get_return_address+0xf/0x50 > [ 360.174068][ C3] ? orc_find.part.0+0x5/0x250 > [ 360.174535][ C3] ? kernel_text_address+0x5/0x130 > [ 360.175094][ C3] ? __kernel_text_address+0x5/0x40 > [ 360.175623][ C3] kernel_text_address+0x5/0x130 > [ 360.176118][ C3] __kernel_text_address+0xe/0x40 > [ 360.176625][ C3] unwind_get_return_address+0x33/0x50 > [ 360.177160][ C3] ? __pfx_stack_trace_consume_entry+0x10/0x10 > [ 360.177805][ C3] arch_stack_walk+0x9e/0xf0 > [ 360.178319][ C3] ? orc_find.part.0+0x5/0x250 > [ 360.178821][ C3] ? rcu_do_batch+0x396/0xb10 > [ 360.179305][ C3] stack_trace_save+0x91/0xd0 > [ 360.179807][ C3] ? __pfx_stack_trace_save+0x10/0x10 > [ 360.180389][ C3] ? stack_trace_save+0x5/0xd0 > [ 360.180908][ C3] kasan_save_stack+0x1c/0x40 > [ 360.181419][ C3] ? kasan_save_stack+0x1c/0x40 > [ 360.181948][ C3] ? kasan_save_track+0x10/0x30 > [ 360.182531][ C3] ? kasan_save_free_info+0x3b/0x60 > [ 360.183157][ C3] ? __kasan_slab_free+0x122/0x1c0 > [ 360.183713][ C3] ? kmem_cache_free+0x19d/0x460 > [ 360.184241][ C3] ? rcu_do_batch+0x396/0xb10 > [ 360.184781][ C3] ? rcu_core+0x3b2/0x5f0 > [ 360.185289][ C3] ? __do_softirq+0x13b/0x64d > [ 360.185814][ C3] ? __irq_exit_rcu+0xe4/0x190 > [ 360.186366][ C3] ? irq_exit_rcu+0xa/0x30 > [ 360.186869][ C3] ? sysvec_call_function+0x8f/0xb0 > [ 360.187479][ C3] ? asm_sysvec_call_function+0x16/0x20 > [ 360.188098][ C3] ? ftrace_push_return_trace.isra.0+0x12c/0x370 > [ 360.188784][ C3] ? function_graph_enter_ops+0xbb/0x2d0 > [ 360.189413][ C3] ? ftrace_graph_func+0x142/0x270 > [ 360.189985][ C3] ? 0xffffffffa0568097 > [ 360.191352][ C3] ? function_graph_enter_ops+0x2b9/0x2d0 > [ 360.192148][ C3] ? __kasan_slab_free+0x3b/0x1c0 > [ 360.192852][ C3] ? __pfx_function_graph_enter_ops+0x10/0x10 > [ 360.193545][ C3] ? __pfx___phys_addr+0x10/0x10 > [ 360.194115][ C3] ? lockdep_hardirqs_on_prepare+0xe/0x250 > [ 360.194778][ C3] ? preempt_count_sub+0x5/0xc0 > [ 360.195373][ C3] ? ftrace_graph_func+0x173/0x270 > [ 360.195937][ C3] ? __pfx___phys_addr+0x10/0x10 > [ 360.196461][ C3] ? rcu_do_batch+0x396/0xb10 > [ 360.196972][ C3] ? 0xffffffffa0568097 > [ 360.197481][ C3] ? __pfx___debug_check_no_obj_freed+0x10/0x10 > [ 360.198175][ C3] ? 0xffffffffa0568097 > [ 360.198675][ C3] ? lock_acquire+0xc6/0x490 > [ 360.199247][ C3] kasan_save_track+0x10/0x30 > [ 360.199803][ C3] kasan_save_free_info+0x3b/0x60 > [ 360.200474][ C3] __kasan_slab_free+0x122/0x1c0 > [ 360.201078][ C3] ? rcu_do_batch+0x396/0xb10 > [ 360.201567][ C3] kmem_cache_free+0x19d/0x460 > [ 360.202093][ C3] ? __pfx_free_object_rcu+0x10/0x10 > [ 360.202658][ C3] rcu_do_batch+0x396/0xb10 > [ 360.203193][ C3] ? __pfx_rcu_do_batch+0x10/0x10 > [ 360.203765][ C3] ? sched_clock+0xc/0x30 > [ 360.204250][ C3] ? rcu_is_watching+0x34/0x60 > [ 360.204758][ C3] rcu_core+0x3b2/0x5f0 > [ 360.205245][ C3] ? rcu_is_watching+0x34/0x60 > [ 360.205745][ C3] __do_softirq+0x13b/0x64d > [ 360.206260][ C3] __irq_exit_rcu+0xe4/0x190 > [ 360.206802][ C3] irq_exit_rcu+0xa/0x30 > [ 360.207334][ C3] sysvec_call_function+0x8f/0xb0 > [ 360.207929][ C3] </IRQ> > [ 360.208330][ C3] <TASK> > [ 360.208687][ C3] asm_sysvec_call_function+0x16/0x20