Received: by 10.192.165.148 with SMTP id m20csp4955363imm; Tue, 1 May 2018 06:50:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq4hi8pkmFNxhtqrl/22+xSI48pqfNszJLbwZfvE2ahIfGWNGvu04uknBwkEKwRKwKD7ya8 X-Received: by 2002:a63:5f82:: with SMTP id t124-v6mr13232094pgb.150.1525182633372; Tue, 01 May 2018 06:50:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525182633; cv=none; d=google.com; s=arc-20160816; b=z+ErW+eiAVs1NOGs/S94MmQs+DzGBjDH15a7Lcg8yGaRI9wBaOSdZU99GxnB1mVCLv rpqKtdDjqN3LY+NogGkXiAqo/ssHsduSM10BolGnzowOsggqzdoMGH+QBGld3pAdsgT3 bkkgFzoV1/okVOg8MG5yiN5xS8YvHdjLRJWMyatDYzVWms/RY2h5wI1L7iMpuWwc0lwL QXmvPnaX3yUbgEzoU/2pqdt/acMDAe9Buxn4a4WIu3CQOvlZTnPrYD0lCfIZt3On7iQg rZc8HpV0WSONmZ3zTJP15FfU1MnQXeRTAj7nlMKGX7TTYfvOXTwpFF17w4/+k6KxBoaX KNEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dmarc-filter:arc-authentication-results; bh=kts+78mEYr2eKEHNwtKIDBiyY2y7D0weWH/c1TTI3yU=; b=xfH8uKsfdusCvXaHi7Jsjv6suWzkrWY1vKs8qFyBgnACLWiw97d1vgqPAj/8Y8PM4D 8+F+wHebIS67H720gXzRalW5Q2Yik/FhAZkRUVeMDA5D3OWYFlAbNOhbFhceoI4+0Xkm neLM90OXJCWZkbZ7emZla0ZHB6BxLB2kWZ6aYKa+uR7c1oQxWNO9cUiNPKJAB9J3ddJP VMIVi5xGIGB5IYJBM/sfHMBx4g4kOdoTwe+rStOst818KcZIyL4DC9VgkmWvNOx8yL+6 8KJw3bHk29ajE0UW9bvYbuh/S5Q8OZ5OK+6T+KqK+eoU5P0d/QQ42jDVsxZPHcPiUm9G byeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w13-v6si7806485pgm.91.2018.05.01.06.50.18; Tue, 01 May 2018 06:50:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755945AbeEANto (ORCPT + 99 others); Tue, 1 May 2018 09:49:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:52000 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755899AbeEANtd (ORCPT ); Tue, 1 May 2018 09:49:33 -0400 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 56FB122DC2; Tue, 1 May 2018 13:49:31 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 56FB122DC2 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=goodmis.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=rostedt@goodmis.org Date: Tue, 1 May 2018 09:49:29 -0400 From: Steven Rostedt To: Joel Fernandes , Thomas Glexiner Cc: linux-kernel@vger.kernel.org, Peter Zilstra , Ingo Molnar , Mathieu Desnoyers , Tom Zanussi , Namhyung Kim , Boqun Feng , Paul McKenney , Frederic Weisbecker , Randy Dunlap , Masami Hiramatsu , Fenguang Wu , Baohong Liu , Vedang Patel , kernel-team@android.com Subject: Re: [PATCH] softirq: reorder trace_softirqs_on to prevent lockdep splat Message-ID: <20180501094929.0c594a76@gandalf.local.home> In-Reply-To: <20180427041100.133772-1-joelaf@google.com> References: <20180427041100.133772-1-joelaf@google.com> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 26 Apr 2018 21:11:00 -0700 Joel Fernandes wrote: > I'm able to reproduce a lockdep splat when CONFIG_PROVE_LOCKING=y and > CONFIG_PREEMPTIRQ_EVENTS=y. > > $ echo 1 > /d/tracing/events/preemptirq/preempt_enable/enable > --- > [ 26.112609] DEBUG_LOCKS_WARN_ON(current->softirqs_enabled) > [ 26.112636] WARNING: CPU: 0 PID: 118 at kernel/locking/lockdep.c:3854 > [...] > [ 26.144229] Call Trace: > [ 26.144926] > [ 26.145506] lock_acquire+0x55/0x1b0 > [ 26.146499] ? __do_softirq+0x46f/0x4d9 > [ 26.147571] ? __do_softirq+0x46f/0x4d9 > [ 26.148646] trace_preempt_on+0x8f/0x240 > [ 26.149744] ? trace_preempt_on+0x4d/0x240 > [ 26.150862] ? __do_softirq+0x46f/0x4d9 > [ 26.151930] preempt_count_sub+0x18a/0x1a0 > [ 26.152985] __do_softirq+0x46f/0x4d9 > [ 26.153937] irq_exit+0x68/0xe0 > [ 26.154755] smp_apic_timer_interrupt+0x271/0x280 > [ 26.156056] apic_timer_interrupt+0xf/0x20 > [ 26.157105] > > The problem is the softirqs annotation in lockdep goes out of sync with > the reality of the world that softirq is still off. This causes a > lockdep splat because the preempt_count_sub can call into a preemptoff > tracer or the trace events code, which inturn can call into lockdep > *before* softirqs are really turned back on, which can cause a softirqs > invalid annotation splat in lockdep. > OK, so the issue was this: preempt_count = 1 << SOFTIRQ_SHIFT __local_bh_enable(cnt = 1 << SOFTIRQ_SHIFT) { if (softirq_count() == (cnt && SOFTIRQ_MASK)) { trace_softirqs_on() { current->softirqs_enabled = 1; } } preempt_count_sub(cnt) { trace_preempt_on() { tracepoint() { rcu_read_lock_sched() { // jumps into lockdep Where preempt_count still has softirqs disabled, but current->softirqs_enabled is true, and we get a splat. Your patch makes the tracing happen before we monkey with softirqs. Yeah, looks good to me. Reviewed-by: Steven Rostedt (VMware) Thomas, you want to take this? -- Steve > The same issue was fixed in local_bh_disable_ip which has a comment so: > /* > * The preempt tracer hooks into preempt_count_add and will break > * lockdep because it calls back into lockdep after SOFTIRQ_OFFSET > * is set and before current->softirq_enabled is cleared. > * We must manually increment preempt_count here and manually > * call the trace_preempt_off later. > */ > > I have done a similar change to the local_bh_enable path to fix it. > > Cc: Steven Rostedt > Cc: Peter Zilstra > Cc: Ingo Molnar > Cc: Mathieu Desnoyers > Cc: Tom Zanussi > Cc: Namhyung Kim > Cc: Thomas Glexiner > Cc: Boqun Feng > Cc: Paul McKenney > Cc: Frederic Weisbecker > Cc: Randy Dunlap > Cc: Masami Hiramatsu > Cc: Fenguang Wu > Cc: Baohong Liu > Cc: Vedang Patel > Cc: kernel-team@android.com > Signed-off-by: Joel Fernandes > --- > kernel/softirq.c | 6 +++++- > 1 file changed, 5 insertions(+), 1 deletion(-) > > diff --git a/kernel/softirq.c b/kernel/softirq.c > index 177de3640c78..8a040bcaa033 100644 > --- a/kernel/softirq.c > +++ b/kernel/softirq.c > @@ -139,9 +139,13 @@ static void __local_bh_enable(unsigned int cnt) > { > lockdep_assert_irqs_disabled(); > > + if (preempt_count() == cnt) > + trace_preempt_on(CALLER_ADDR0, get_lock_parent_ip()); > + > if (softirq_count() == (cnt & SOFTIRQ_MASK)) > trace_softirqs_on(_RET_IP_); > - preempt_count_sub(cnt); > + > + __preempt_count_sub(cnt); > } > > /*