From nobody Fri Dec 26 17:24:17 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 99DB8136B for ; Wed, 3 Jan 2024 02:06:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 891A0C433C9; Wed, 3 Jan 2024 02:06:30 +0000 (UTC) Date: Tue, 2 Jan 2024 21:07:31 -0500 From: Steven Rostedt To: Linus Torvalds Cc: LKML , Masami Hiramatsu , Mathieu Desnoyers Subject: [GIT PULL] tracing: Final fixes for v6.7 Message-ID: <20240102210731.1f1c5bf5@gandalf.local.home> X-Mailer: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Linus, tracing fixes for v6.7-rc8: - Fix a NULL kernel dereference in set_gid() on tracefs mounting. When tracefs is mounted with "gid=3D1000", it will update the existing dentries to have the new gid. The tracefs_inode which is retrieved by a container_of(dentry->d_inode) has flags to see if the inode belongs to the eventfs system. The issue that was fixed was if getdents() was called on tracefs that was previously mounted, and was not closed. It will leave a "cursor dentry" in the subdirs list of the current dentries that set_gid() walks. On a remount of tracefs, the container_of(dentry->d_inod= e) will dereference a NULL pointer and cause a crash when referenced. Simply have a check for dentry->d_inode to see if it is NULL and if so, skip that entry. - Fix the bits of the eventfs_inode structure. The "is_events" bit was taken from the nr_entries field, but the nr_entries field wasn't updated to be 30 bits and was still 31. Including the "is_freed" bit this would use 33 bits which would make the structure use another integer for just one bit. Please pull the latest trace-v6.7-rc8 tree, which can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git trace-v6.7-rc8 Tag SHA1: 268dc78680a450c2207c0af35e0e367ff07b25eb Head SHA1: fd56cd5f6d76e93356d9520cf9dabffe1e3d1aa0 Steven Rostedt (Google) (2): tracefs: Check for dentry->d_inode exists in set_gid() eventfs: Fix bitwise fields for "is_events" ---- fs/tracefs/inode.c | 4 ++++ fs/tracefs/internal.h | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) --------------------------- diff --git a/fs/tracefs/inode.c b/fs/tracefs/inode.c index 62524b20964e..bc86ffdb103b 100644 --- a/fs/tracefs/inode.c +++ b/fs/tracefs/inode.c @@ -215,6 +215,10 @@ static void set_gid(struct dentry *parent, kgid_t gid) struct dentry *dentry =3D list_entry(tmp, struct dentry, d_child); next =3D tmp->next; =20 + /* Note, getdents() can add a cursor dentry with no inode */ + if (!dentry->d_inode) + continue; + spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED); =20 change_gid(dentry, gid); diff --git a/fs/tracefs/internal.h b/fs/tracefs/internal.h index 899e447778ac..42bdeb471a07 100644 --- a/fs/tracefs/internal.h +++ b/fs/tracefs/internal.h @@ -63,7 +63,7 @@ struct eventfs_inode { }; unsigned int is_freed:1; unsigned int is_events:1; - unsigned int nr_entries:31; + unsigned int nr_entries:30; }; =20 static inline struct tracefs_inode *get_tracefs(const struct inode *inode)