From patchwork Tue Sep 12 18:22:14 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Rostedt X-Patchwork-Id: 138367 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9ecd:0:b0:3f2:4152:657d with SMTP id t13csp601688vqx; Tue, 12 Sep 2023 11:30:36 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEgnO8GUcEwF8b4DeLUYADw9WGyTvdwrCvFH9maQvSwDTRGg0Zef0c53ycdoHXgzj78W45c X-Received: by 2002:a05:6a20:8f2a:b0:14c:a2e1:65ec with SMTP id b42-20020a056a208f2a00b0014ca2e165ecmr240837pzk.38.1694543436247; Tue, 12 Sep 2023 11:30:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694543436; cv=none; d=google.com; s=arc-20160816; b=1ERVjmhxVX91HZ1jmwHj7zXuZ7nLqIdZsM8y61VbW8cGg4lNtfV3m+/5BDSIcl0nTP xQde0z6nx+Z+y/P6lzvKGloJkBtQtUE/MpodVODoaXyjA08CIwsxyxDq0EpNZIys66m5 hFaTlUivJ+FXOw+t2TLCAheOpm0sU+T/tCaC8uyRJ/4vprGcxSdcwZLwwDHdSOMed5Oc HrjQandZkVEkQxxpeqQgchkTOPWGIzsWG3V0zJc/v48vQEeRZVXj48P8XXmVo6IV0EZF KQ0YskcSNWMT0f0ltS3RyEyLNAnuo81X7APakT7RzNZZcokWhiNGReEEhwe8CPQZYFvM YdTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:subject:cc:to:from:date :user-agent:message-id; bh=Pnzy4+7Heb5hCZOZeVLT5CsDr8/8INFqo+IZoAa3ASY=; fh=+TLGgU8p1ZLn0EkVGuAxO6nyt1mPp1f8nk1Y8831aus=; b=LcEo1Cv3sEg19Md8X9xmxSWRzdnn/VK7sS0x+KqGuO0orSw/qeyr7Xv8tzFvFEZ6MR OtEjP0ZWx+xgc0wMQX9/2cg5ysRda2DJUSnF/jTh+ZowmCsb7AZeKyni1fB0Nke/ezaR jsdqnvYv75Ir2iPXTOOyRMYDndFdamYM1hsjPFmRpD57UpX8vve1a8KTVBBA3bWEkdFs wFA16l5Jn98OC38JCYKeiPWqNy/34KInupbkiuuPGhoyme5Qx/SnJroLKCkayo1P+BJk MvieugiRLFmT3uGwY8sIbjtjKRti3H//hmT2DoofyND2ROhbdKaY0jv2NVnwVq2Szu5E S3bQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id ce11-20020a056a002a0b00b0068e3e4f5b90si8478534pfb.10.2023.09.12.11.30.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 11:30:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 7438E81BD3FE; Tue, 12 Sep 2023 11:22:38 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237349AbjILSW2 (ORCPT + 36 others); Tue, 12 Sep 2023 14:22:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58174 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233007AbjILSWZ (ORCPT ); Tue, 12 Sep 2023 14:22:25 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3051510D8; Tue, 12 Sep 2023 11:22:22 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D5B27C433C7; Tue, 12 Sep 2023 18:22:21 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.96) (envelope-from ) id 1qg824-000JRV-16; Tue, 12 Sep 2023 14:22:40 -0400 Message-ID: <20230912182240.156094298@goodmis.org> User-Agent: quilt/0.66 Date: Tue, 12 Sep 2023 14:22:14 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Andrew Morton , stable@vger.kernel.org, Tero Kristo Subject: [for-linus][PATCH 1/3] tracing/synthetic: Print out u64 values properly References: <20230912182213.795801173@goodmis.org> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 12 Sep 2023 11:22:38 -0700 (PDT) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1776857578080969457 X-GMAIL-MSGID: 1776857578080969457 From: Tero Kristo The synth traces incorrectly print pointer to the synthetic event values instead of the actual value when using u64 type. Fix by addressing the contents of the union properly. Link: https://lore.kernel.org/linux-trace-kernel/20230911141704.3585965-1-tero.kristo@linux.intel.com Fixes: ddeea494a16f ("tracing/synthetic: Use union instead of casts") Cc: stable@vger.kernel.org Signed-off-by: Tero Kristo Signed-off-by: Steven Rostedt (Google) --- kernel/trace/trace_events_synth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/trace/trace_events_synth.c b/kernel/trace/trace_events_synth.c index 9897d0bfcab7..14cb275a0bab 100644 --- a/kernel/trace/trace_events_synth.c +++ b/kernel/trace/trace_events_synth.c @@ -337,7 +337,7 @@ static void print_synth_event_num_val(struct trace_seq *s, break; default: - trace_seq_printf(s, print_fmt, name, val, space); + trace_seq_printf(s, print_fmt, name, val->as_u64, space); break; } } From patchwork Tue Sep 12 18:22:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Rostedt X-Patchwork-Id: 138364 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9ecd:0:b0:3f2:4152:657d with SMTP id t13csp599671vqx; Tue, 12 Sep 2023 11:26:35 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFEZLlHojn39tSucA+ml0CtC3YvJlqI24XY2+LgOPNwRf8uStjZ77W2IhhyPVauPRpC99NE X-Received: by 2002:a17:903:234f:b0:1bc:8c6c:217d with SMTP id c15-20020a170903234f00b001bc8c6c217dmr535367plh.61.1694543195741; Tue, 12 Sep 2023 11:26:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694543195; cv=none; d=google.com; s=arc-20160816; b=FMgydyFbvcRz2HLzbbYgBsIJUxNL317w+5L+9GMsW/u+d+jsHiPdsVsY3gjzdRNuwD AhnLjt7HZex/2BGWuKyQ29KkSibewd5qic/MP6LOApzoVAD+/z3aXri2V+3Oay4T7VWj 4SpVcf2sDoi6CEzz5lo5MRNhSctu/xax0dyjrItLZsRswl7PeGM04x5jowvDSwzWS0sO 3+VOEvxrUqRSW0aqm40U8qS5vnSWnI+sqT0LJgn1/nrkTft1vxq78g7EHiNzDuqp+Mn7 UVScODfqtL4qvFN/ucF1JMH50B7criirVikeIklGsjrOG9N/qLnYXIMbzqShfnS6Ie36 qXCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:subject:cc:to:from:date :user-agent:message-id; bh=BZYZJ3qyy0NKGtiCZhV0U8O1j3tbn8OT8azHpyW01kY=; fh=MiYVVAY/fEeYgEsvEhvUQZLwHrXLpo+xVaIO8ONh2qE=; b=Mz5yJs3vfBMkIVdf7jcdwT/5QSw8grun/YbuRMG530oq3HCsZjZJaisMwkXeYXLmwz Zh6hi6k+Sl+sjGsGxAmV/+iF9ZvHIPCHOAH4D1jm1aQf+MQi0PRw6/q8ypcy/AZV3Inf uE5hMqHZmW+/sq/9QwJEkkySvg47encq1iRweX0Ubwv0gPN7hi/PPWLm+9gQjtBVuc3S YSTpxNDJ4+JY3AgqXrtwlKX7Qgb7kuW3ek1KXtT+5yzbK4RqkXeaW9l9308BQ5bBFF1x uVALroHuLzXWiAuqqB/VsZaiiXR+0SBI49CxITaSa/Hrr/M7VCMPBlEF6NQn5qSyRCD9 mJNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id lh16-20020a170903291000b001c33d7759c8si8249604plb.47.2023.09.12.11.26.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 11:26:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 7F919807245B; Tue, 12 Sep 2023 11:22:46 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237372AbjILSWa (ORCPT + 36 others); Tue, 12 Sep 2023 14:22:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58182 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237214AbjILSW0 (ORCPT ); Tue, 12 Sep 2023 14:22:26 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 54AE210DF for ; Tue, 12 Sep 2023 11:22:22 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 02DEEC433CA; Tue, 12 Sep 2023 18:22:22 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.96) (envelope-from ) id 1qg824-000JS3-1l; Tue, 12 Sep 2023 14:22:40 -0400 Message-ID: <20230912182240.361479245@goodmis.org> User-Agent: quilt/0.66 Date: Tue, 12 Sep 2023 14:22:15 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Andrew Morton , Ajay Kaher , "Paul E. McKenney" Subject: [for-linus][PATCH 2/3] tracefs/eventfs: Use list_for_each_srcu() in dcache_dir_open_wrapper() References: <20230912182213.795801173@goodmis.org> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 12 Sep 2023 11:22:46 -0700 (PDT) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1776857326221490466 X-GMAIL-MSGID: 1776857326221490466 From: "Steven Rostedt (Google)" The eventfs files list is protected by SRCU. In earlier iterations it was protected with just RCU, but because it needed to also call sleepable code, it had to be switch to SRCU. The dcache_dir_open_wrapper() list_for_each_rcu() was missed and did not get converted over to list_for_each_srcu(). That needs to be fixed. Link: https://lore.kernel.org/linux-trace-kernel/20230911120053.ca82f545e7f46ea753deda18@kernel.org/ Link: https://lore.kernel.org/linux-trace-kernel/20230911200654.71ce927c@gandalf.local.home Cc: Mark Rutland Cc: Ajay Kaher Cc: "Paul E. McKenney" Reported-by: Masami Hiramatsu (Google) Fixes: 63940449555e7 ("eventfs: Implement eventfs lookup, read, open functions") Signed-off-by: Steven Rostedt (Google) --- fs/tracefs/event_inode.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/fs/tracefs/event_inode.c b/fs/tracefs/event_inode.c index f168aca45458..9f64e7332796 100644 --- a/fs/tracefs/event_inode.c +++ b/fs/tracefs/event_inode.c @@ -452,7 +452,8 @@ static int dcache_dir_open_wrapper(struct inode *inode, struct file *file) ei = ti->private; idx = srcu_read_lock(&eventfs_srcu); - list_for_each_entry_rcu(ef, &ei->e_top_files, list) { + list_for_each_entry_srcu(ef, &ei->e_top_files, list, + srcu_read_lock_held(&eventfs_srcu)) { create_dentry(ef, dentry, false); } srcu_read_unlock(&eventfs_srcu, idx); From patchwork Tue Sep 12 18:22:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Rostedt X-Patchwork-Id: 138366 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9ecd:0:b0:3f2:4152:657d with SMTP id t13csp601681vqx; Tue, 12 Sep 2023 11:30:36 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFCyN9rTYUwaWDQiU6rE/ZNt1woY52KZ6fEZGfrFaMctSfNUxWhyOIVw43n1vGU8atxubLW X-Received: by 2002:a05:6871:150:b0:1b7:8836:95c9 with SMTP id z16-20020a056871015000b001b7883695c9mr374368oab.42.1694543435872; Tue, 12 Sep 2023 11:30:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694543435; cv=none; d=google.com; s=arc-20160816; b=xfXPZOVK936ErAwjq4UZBTj2virfNz/wXCCCf2RpWRI5ZhGq0v4SfICPbJ9px5Caww wIQtTDsomEbPv7W/pukduEHHuQCoPMY58y9+XbUUGquNQcg24t/9+QiBGcADCkxuFukE +GQRzlW5KKov3L1RcMsBxlSaTJ/zoUiSw1noIvSzH207qPVwzIgL+kE3MSMXxLOGnV2t mIvPcURdML27Y5KC+cmvPziedZfX+HDElIFtjV10z9n4K6ZWUGCFuYYks8VxKMlpVe72 JkFR8V2/vJVNBSBEbR6Hyw9b/UapolKss44/aZ8BBxZOVF1jVjlWPZ5VtrDA+AgMJ/3P QQiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:subject:cc:to:from:date :user-agent:message-id; bh=1qIEtEH0EolZL1gGbC+CqLHL2eSZcU7srES6xVHSMrk=; fh=w8ma6nf3nuSprQ+/YePOcbcVKMNi6u37SGCg5kP3WrA=; b=q0LsmQZRprprSHHjeNqHcLrsS0OKPJPYMkGP+f5uemK3QkZqR5oAxZJ7qhPsP52rpY aZAOMl/ISw8nMMSGweAhnYn3tBXa+DOG7ZMw0W/oPwpaB5h8uEq9XQufCvZCGcNCKWYl h7rWaxq9xIB6W96cUJ1lNRYwbF79mczhJhiCfrsfzkcoNttMucKnWKZJ1nq6RWII2MaS 0U8Rbc28MowvJ32ZrUHzm93QkkGdoX1SRTAMZRXAokmMfzz3GN/nbcub0OsYZMBxFYeh ZK341W5LSvb4P4FyUN3h7doTDPDIaZiZHKVBGH8ucFaohzHkEMtgT9ZmBWnkldRo/tKV oewQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id 2-20020a631742000000b00566058702e8si8326766pgx.236.2023.09.12.11.30.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 11:30:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 121F98211F7A; Tue, 12 Sep 2023 11:22:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237383AbjILSWb (ORCPT + 36 others); Tue, 12 Sep 2023 14:22:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237235AbjILSW0 (ORCPT ); Tue, 12 Sep 2023 14:22:26 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 861F5115 for ; Tue, 12 Sep 2023 11:22:22 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2FAA6C433CD; Tue, 12 Sep 2023 18:22:22 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.96) (envelope-from ) id 1qg824-000JSb-2P; Tue, 12 Sep 2023 14:22:40 -0400 Message-ID: <20230912182240.567949500@goodmis.org> User-Agent: quilt/0.66 Date: Tue, 12 Sep 2023 14:22:16 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Andrew Morton , Ajay Kaher , Jinjie Ruan Subject: [for-linus][PATCH 3/3] eventfs: Fix the NULL pointer dereference bug in eventfs_remove_rec() References: <20230912182213.795801173@goodmis.org> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 12 Sep 2023 11:22:59 -0700 (PDT) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1776857577816200686 X-GMAIL-MSGID: 1776857577816200686 From: Jinjie Ruan Inject fault while probing btrfs.ko, if kstrdup() fails in eventfs_prepare_ef() in eventfs_add_dir(), it will return ERR_PTR to assign file->ef. But the eventfs_remove() check NULL in trace_module_remove_events(), which causes the below NULL pointer dereference. As both Masami and Steven suggest, allocater side should handle the error carefully and remove it, so fix the places where it failed. Could not create tracefs 'raid56_write' directory Btrfs loaded, zoned=no, fsverity=no Unable to handle kernel NULL pointer dereference at virtual address 000000000000001c Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000102544000 [000000000000001c] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: btrfs(-) libcrc32c xor xor_neon raid6_pq cfg80211 rfkill 8021q garp mrp stp llc ipv6 [last unloaded: btrfs] CPU: 15 PID: 1343 Comm: rmmod Tainted: G N 6.5.0+ #40 Hardware name: linux,dummy-virt (DT) pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : eventfs_remove_rec+0x24/0xc0 lr : eventfs_remove+0x68/0x1d8 sp : ffff800082d63b60 x29: ffff800082d63b60 x28: ffffb84b80ddd00c x27: ffffb84b3054ba40 x26: 0000000000000002 x25: ffff800082d63bf8 x24: ffffb84b8398e440 x23: ffffb84b82af3000 x22: dead000000000100 x21: dead000000000122 x20: ffff800082d63bf8 x19: fffffffffffffff4 x18: ffffb84b82508820 x17: 0000000000000000 x16: 0000000000000000 x15: 000083bc876a3166 x14: 000000000000006d x13: 000000000000006d x12: 0000000000000000 x11: 0000000000000001 x10: 00000000000017e0 x9 : 0000000000000001 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffb84b84289804 x5 : 0000000000000000 x4 : 9696969696969697 x3 : ffff33a5b7601f38 x2 : 0000000000000000 x1 : ffff800082d63bf8 x0 : fffffffffffffff4 Call trace: eventfs_remove_rec+0x24/0xc0 eventfs_remove+0x68/0x1d8 remove_event_file_dir+0x88/0x100 event_remove+0x140/0x15c trace_module_notify+0x1fc/0x230 notifier_call_chain+0x98/0x17c blocking_notifier_call_chain+0x4c/0x74 __arm64_sys_delete_module+0x1a4/0x298 invoke_syscall+0x44/0x100 el0_svc_common.constprop.1+0x68/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x3c/0xc4 el0t_64_sync_handler+0xa0/0xc4 el0t_64_sync+0x174/0x178 Code: 5400052c a90153b3 aa0003f3 aa0103f4 (f9401400) ---[ end trace 0000000000000000 ]--- Kernel panic - not syncing: Oops: Fatal exception SMP: stopping secondary CPUs Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: 0x384b00c00000 from 0xffff800080000000 PHYS_OFFSET: 0xffffcc5b80000000 CPU features: 0x88000203,3c020000,1000421b Memory Limit: none Rebooting in 1 seconds.. Link: https://lore.kernel.org/linux-trace-kernel/20230912134752.1838524-1-ruanjinjie@huawei.com Link: https://lore.kernel.org/all/20230912025808.668187-1-ruanjinjie@huawei.com/ Link: https://lore.kernel.org/all/20230911052818.1020547-1-ruanjinjie@huawei.com/ Link: https://lore.kernel.org/all/20230909072817.182846-1-ruanjinjie@huawei.com/ Link: https://lore.kernel.org/all/20230908074816.3724716-1-ruanjinjie@huawei.com/ Cc: Ajay Kaher Fixes: 5bdcd5f5331a ("eventfs: Implement removal of meta data from eventfs") Signed-off-by: Jinjie Ruan Suggested-by: Masami Hiramatsu (Google) Suggested-by: Steven Rostedt Signed-off-by: Steven Rostedt (Google) --- kernel/trace/trace_events.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/kernel/trace/trace_events.c b/kernel/trace/trace_events.c index 065c63991858..91951d038ba4 100644 --- a/kernel/trace/trace_events.c +++ b/kernel/trace/trace_events.c @@ -2286,6 +2286,7 @@ event_subsystem_dir(struct trace_array *tr, const char *name, { struct event_subsystem *system, *iter; struct trace_subsystem_dir *dir; + struct eventfs_file *ef; int res; /* First see if we did not already create this dir */ @@ -2318,13 +2319,14 @@ event_subsystem_dir(struct trace_array *tr, const char *name, } else __get_system(system); - dir->ef = eventfs_add_subsystem_dir(name, parent); - if (IS_ERR(dir->ef)) { + ef = eventfs_add_subsystem_dir(name, parent); + if (IS_ERR(ef)) { pr_warn("Failed to create system directory %s\n", name); __put_system(system); goto out_free; } + dir->ef = ef; dir->tr = tr; dir->ref_count = 1; dir->nr_events = 1; @@ -2404,6 +2406,7 @@ event_create_dir(struct dentry *parent, struct trace_event_file *file) struct trace_event_call *call = file->event_call; struct eventfs_file *ef_subsystem = NULL; struct trace_array *tr = file->tr; + struct eventfs_file *ef; const char *name; int ret; @@ -2420,12 +2423,14 @@ event_create_dir(struct dentry *parent, struct trace_event_file *file) return -ENOMEM; name = trace_event_name(call); - file->ef = eventfs_add_dir(name, ef_subsystem); - if (IS_ERR(file->ef)) { + ef = eventfs_add_dir(name, ef_subsystem); + if (IS_ERR(ef)) { pr_warn("Could not create tracefs '%s' directory\n", name); return -1; } + file->ef = ef; + if (call->class->reg && !(call->flags & TRACE_EVENT_FL_IGNORE_ENABLE)) eventfs_add_file("enable", TRACE_MODE_WRITE, file->ef, file, &ftrace_enable_fops);