Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1986183ybt; Mon, 15 Jun 2020 15:00:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjxOcsm+1//I9vGI3bJbDAtBE/yC5D0LsSwp9CSSkMqEecw3BuhBahyfpk4va0fXFKh+Es X-Received: by 2002:a05:6402:22b3:: with SMTP id cx19mr25219991edb.329.1592258409568; Mon, 15 Jun 2020 15:00:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592258409; cv=none; d=google.com; s=arc-20160816; b=rul6mTnhjGZEprUddXRnH9IzK0wu0NDu2GCqyoSv3ToMTmDOHEdI8/ggvWJV1SH3kW 7CeFvfT7Ft7ygI/ipeT4g4xxAsN+fsmj5nL7AnZB/w7JP6eIK4zVFS6XNGyGqaEWxfOv WRp5FY62n4D3v1H84mH6Lcj97kNkGADMXAn1dsVuQ5Nq66i/cHMo42JH80eipXDFPCyd V0uS4vxJ9NMiSbZGoaYvVX28wu5I2M8h3XRo9eU/kztDYlrNn+lccvrHHXY9IBH0EUOy PDX6MzKZrgiMLljFevSh91tjQvRtZeJmakq0DRYR8YXqo9wLERhEdGldOpksi/C/GAQ0 YBxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=3+XZNwwgFRWN2YfgBwEC3ayNYLxxibOoTCejm5/GHWY=; b=cgOohe7LzveVDpcsvSUifm8SdOGKHPaaFPpDM+8bV1FQ51ZWpr0lFEDRDrkrv9xkW1 bfp7Bcm8eLZvr39hZDlb1VyC3ZssH2hvGTDk46TwQpgoFQO8fUXaB5uXl/usv+o0+g16 DvaJJ4cHBprw6gmTlCZC61XQ+I+8UjQWkbeb8nji6+2NyPl1QA/ThKpzvCftUpcwbVt9 TlKJAzOuj5TmzCMN5dfAjm3j7IzSBwz/98xponPX/D/N1JEDbBRQQYi+R/eIeYVOHoTF LcJvnG0HSxKa4w2qaD2tNB57m0GaXZD0HnvSN/hNEXW6pVQUbEUcmuC/9xEv4EoDAB93 sOQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=VUaYUxCH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bf15si9653877edb.553.2020.06.15.14.59.46; Mon, 15 Jun 2020 15:00:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=VUaYUxCH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726349AbgFOV5w (ORCPT + 99 others); Mon, 15 Jun 2020 17:57:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50996 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725843AbgFOV5v (ORCPT ); Mon, 15 Jun 2020 17:57:51 -0400 Received: from mail-pg1-x542.google.com (mail-pg1-x542.google.com [IPv6:2607:f8b0:4864:20::542]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A494CC061A0E for ; Mon, 15 Jun 2020 14:57:50 -0700 (PDT) Received: by mail-pg1-x542.google.com with SMTP id u5so8215696pgn.5 for ; Mon, 15 Jun 2020 14:57:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=3+XZNwwgFRWN2YfgBwEC3ayNYLxxibOoTCejm5/GHWY=; b=VUaYUxCHIB99FCGZtex1432WECyI2mAyKaZV0DeKfdICp6jdhd5cGggKM0iy6sTP+S IXIReYqfCqyeiTV36w0eYXRL5sf2Ado4zz6F+qFQr0kavyIc+/xiCKlVv1zAsmyzQBmm U5pNlukcJbhvYokWPIUOm/3p0S+eXzqqMvKLwFSNj9mryLXhJuV/dYVXcOI2KQJDPYmC xWkof1oiLCjHUTJgo7AtxkE8LZbb41uXURN3JiF5lf7/b8C3GXW7HKqVr+TvhtSvKsLR JbUm+Y42Nkwg/DPToj8oT/AqjfnfFjLfPOFiM/O2BdzBVcrNtCGzrE/BlAa6fdyMgzim K2Pw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=3+XZNwwgFRWN2YfgBwEC3ayNYLxxibOoTCejm5/GHWY=; b=QaFcR+kCfa7y3F4csD4vydtLjZrigQLKMZYTs2t2jDyqcIyIcmhOfp3djF+IIYwBqe 2+mD1V7V08iNRYzEnITbX552fkMJbF5xrisvchIVNC0X9FnCfVMLcPdzuVpMaxVFAbBZ +yn+3D0I1YHcXLLevfMvlyMT3OPJzcUO5GOdlAKm+1QOQxD0FYZ0bA5VZ6PN1f6RKZus fHG+xKrcK47oxdXC/n5cWfSquHG5zUFmv//K7ATDQyk9EfQKkKZDc6mKOk8mbXJdMUlW 37vTDUk8vv0zBKS7ArVutP9PdiFF1TTlziF026qqq4nCTl6+1AFt2w0/pq+nx0xiWffe IWTg== X-Gm-Message-State: AOAM531BAMgQ5zd8akfa+OnjNhfJhma4UnVER4SDGYpeM6VvqN3Rptu8 01TpnFQvNhHGOIpFev7n7dM= X-Received: by 2002:aa7:84cf:: with SMTP id x15mr24773327pfn.214.1592258270068; Mon, 15 Jun 2020 14:57:50 -0700 (PDT) Received: from localhost (g228.115-65-196.ppp.wakwak.ne.jp. [115.65.196.228]) by smtp.gmail.com with ESMTPSA id ha16sm405421pjb.40.2020.06.15.14.57.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Jun 2020 14:57:49 -0700 (PDT) Date: Tue, 16 Jun 2020 06:57:47 +0900 From: Stafford Horne To: Atish Patra Cc: linux-riscv , "linux-kernel@vger.kernel.org List" , Palmer Dabbelt , Bjorn Topel Subject: Re: mm lock issue while booting Linux on 5.8-rc1 for RISC-V Message-ID: <20200615215747.GO75760@lianli.shorne-pla.net> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 15, 2020 at 12:28:11AM -0700, Atish Patra wrote: > Hi, > I encountered the following issue while booting 5.8-rc1 on Qemu for RV64. > I added additional dump_stack and observed that it's happening in bpf free path. > It happens always if CONFIG_DEBUG_VM is enabled. VM_BUG_ON_MM is > compiled away without that. > ------------------------------------------------------------------------ > forked to background, child pid 113 > [ 10.328850] CPU: 3 PID: 51 Comm: kworker/3:1 Not tainted > 5.8.0-rc1-dirty #732 > [ 10.331739] Workqueue: events bpf_prog_free_deferred > [ 10.334133] Call Trace: > [ 10.338039] [] walk_stackframe+0x0/0xa4 > [ 10.339988] [] show_stack+0x2e/0x3a > [ 10.340902] [] dump_stack+0x72/0x8c > [ 10.341451] [] mmap_assert_locked.part.13+0x14/0x1c > [ 10.342131] [] walk_page_range_novma+0x0/0x4e > [ 10.342973] [] set_direct_map_invalid_noflush+0x66/0x6e > [ 10.343917] [] __vunmap+0xe8/0x212 > [ 10.344680] [] __vfree+0x22/0x6e > [ 10.345270] [] vfree+0x34/0x56 > [ 10.345834] [] __bpf_prog_free+0x2c/0x36 > [ 10.346529] [] bpf_prog_free_deferred+0x74/0x8a > [ 10.347394] [] process_one_work+0x13a/0x272 > [ 10.348239] [] worker_thread+0x50/0x2e4 > [ 10.348900] [] kthread+0xfc/0x10a > [ 10.349470] [] ret_from_exception+0x0/0xc > [ 10.354405] mm ffffffe001018600 mmap 0000000000000000 seqnum 0 task_size 0 > [ 10.354405] get_unmapped_area 0000000000000000 > [ 10.354405] mmap_base 0 mmap_legacy_base 0 highest_vm_end 0 > [ 10.354405] pgd ffffffe001074000 mm_users 2 mm_count 1 > pgtables_bytes 8192 map_count 0 > [ 10.354405] hiwater_rss 0 hiwater_vm 0 total_vm 0 locked_vm 0 > [ 10.354405] pinned_vm 0 data_vm 0 exec_vm 0 stack_vm 0 > [ 10.354405] start_code ffffffe000200000 end_code ffffffe00084acc2 > start_data 0 end_data ffffffe00106dfe4 > [ 10.354405] start_brk 0 brk ffffffe0010bd6d0 start_stack 0 > [ 10.354405] arg_start 0 arg_end 0 env_start 0 env_end 0 > [ 10.354405] binfmt 0000000000000000 flags 0 core_state 0000000000000000 > [ 10.354405] ioctx_table 0000000000000000 > [ 10.354405] exe_file 0000000000000000 > [ 10.354405] tlb_flush_pending 0 > [ 10.354405] def_flags: 0x0() > [ 10.369325] ------------[ cut here ]------------ > [ 10.370763] kernel BUG at include/linux/mmap_lock.h:81! > [ 10.375235] Kernel BUG [#1] > [ 10.377198] Modules linked in: > [ 10.378931] CPU: 3 PID: 51 Comm: kworker/3:1 Not tainted 5.8.0-rc1-dirty #732 > [ 10.380179] Workqueue: events bpf_prog_free_deferred > [ 10.381270] epc: ffffffe0002db4d4 ra : ffffffe0002db4d4 sp : ffffffe3eaea7c70 > [ 10.382561] gp : ffffffe00106d950 tp : ffffffe3ef752f80 t0 : > ffffffe0010836e8 > [ 10.383996] t1 : 0000000000000064 t2 : 0000000000000000 s0 : > ffffffe3eaea7c90 > [ 10.385119] s1 : ffffffe001018600 a0 : 0000000000000289 a1 : > 0000000000000020 > [ 10.386099] a2 : 0000000000000005 a3 : 0000000000000000 a4 : > ffffffe001012758 > [ 10.387294] a5 : 0000000000000000 a6 : 0000000000000102 a7 : > 0000000000000006 > [ 10.388265] s2 : ffffffe3f00674c0 s3 : ffffffe00106e108 s4 : > ffffffe00106e100 > [ 10.389250] s5 : ffffffe00106e908 s6 : 0000000000000000 s7 : > 6db6db6db6db6db7 > [ 10.390272] s8 : 0000000000000001 s9 : ffffffe00021a4f8 s10: > ffffffffffffffff > [ 10.391293] s11: ffffffe3f0066600 t3 : 000000000001a7a8 t4 : > 000000000001a7a8 > [ 10.392314] t5 : 0000000000000000 t6 : ffffffe00107b76b > [ 10.393096] status: 0000000000000120 badaddr: 0000000000000000 > cause: 0000000000000003 > [ 10.397755] ---[ end trace 861659596ac28841 ]--- > --------------------------------------------------------------------------------------------------- > > I haven't had the chance to bisect to figure out which commit caused > the issue. Just wanted > to check if it is a known issue already. Hi Atish, Note, I am getting the same (just now) when booting v5.8-rc1 on OpenRISC. If you have any updates please post back. I will try to look into this today or tomorrow. -Stafford