Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1083699ybt; Wed, 1 Jul 2020 18:27:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxDKOYkzl2Ijhc94dMsswaAXEyj+daYdTXZSSAwYHwqDOG4sfWoUWQGqne3hQy6GyVn9D9P X-Received: by 2002:a17:906:3c42:: with SMTP id i2mr26955597ejg.14.1593653246850; Wed, 01 Jul 2020 18:27:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593653246; cv=none; d=google.com; s=arc-20160816; b=QrJCh7gpnq6PTbm5zFbiBguqHYBT+7KiCNAsUxj5kTNPssqxvC4SruyguJlF+gdWcG Na1aSUuApS1jItnCx4elrwBHWVjs+jlunfLkcXRqoz6mCPxxwL2HbmbQWgokqH/2nXaw VL0kd875hH5U3Umagh/cSsGB7Hctu8hEC9gP+y9WFvDSBQ7mnKmUxvW+g3Ie+EvRlsZx QsZ8MsqENyq5aEu3lfyE0d4GDYhIp6KlKBvOx+WeExqAjRgRtdCYvfvMS5iFLjvrArOq kUxDjtFJZ06MwFhtAA1AEVW9hblHSA0DB+lQX9ZdU7tCUFNENwlYdpmAcDCKQX9A05Gi XI9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9XoGRu80Zb0hFpvoUvCmFwlDWjrNNplFpde3ea20LCU=; b=OkZ2ecUqUBa1dBi43JIMBYiGB47vOZz+J0rLFebhsZ8R4TtsHYkt7m+/AYeXCbVh6M xFr6ERdqR7l7YS5woENQ3QFymOJNwMHcEpIbSdQCd1Ezs7YGsc/a8wb0EhUGcSDCREMS IhfOekfSNgBhNAegBhk4DL+luMByHZijsuqQn4e9KAIv8r5lavQU0wBllftn9JI0Wovl bL51VEsfUkuNtK5lh9EVR3up/eJjlda0syvSVXRtoDaHwGCDYqeMDCRRGUOngaHuL6Y+ 2R1ICUTKefl0V5Wk12WWwnA3kAgHPuFRqHNuXwX9WlIUalYujxQDXWpCW2KN1gaWTEGK y1Ow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Y7PXVZDf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j12si4916114ejy.723.2020.07.01.18.27.03; Wed, 01 Jul 2020 18:27:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Y7PXVZDf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728632AbgGBBYT (ORCPT + 99 others); Wed, 1 Jul 2020 21:24:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:54832 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728565AbgGBBYA (ORCPT ); Wed, 1 Jul 2020 21:24:00 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E748C214DB; Thu, 2 Jul 2020 01:23:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593653039; bh=zOZ6lH5p09jU21P1oIZq4jgmdfMdbT1aJhPRKUjjJvk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y7PXVZDf0xcxOJHwX+HvD06d+mphCnVHlDGPpbqTagb7NVn3z5Q6ToDYkXBl4GqDO y/B5xpRS+cuzZCepeFUEfQdBokuUODnOmGiyGZBFoKDczRjmS9sa1q65BjoMBeChS5 aB718nJN9iblO2577MTGJI8GxGEh10D6PJ2ShFyI= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Douglas Anderson , Daniel Thompson , Sasha Levin , kgdb-bugreport@lists.sourceforge.net Subject: [PATCH AUTOSEL 5.7 52/53] kgdb: Avoid suspicious RCU usage warning Date: Wed, 1 Jul 2020 21:22:01 -0400 Message-Id: <20200702012202.2700645-52-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200702012202.2700645-1-sashal@kernel.org> References: <20200702012202.2700645-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Douglas Anderson [ Upstream commit 440ab9e10e2e6e5fd677473ee6f9e3af0f6904d6 ] At times when I'm using kgdb I see a splat on my console about suspicious RCU usage. I managed to come up with a case that could reproduce this that looked like this: WARNING: suspicious RCU usage 5.7.0-rc4+ #609 Not tainted ----------------------------- kernel/pid.c:395 find_task_by_pid_ns() needs rcu_read_lock() protection! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by swapper/0/1: #0: ffffff81b6b8e988 (&dev->mutex){....}-{3:3}, at: __device_attach+0x40/0x13c #1: ffffffd01109e9e8 (dbg_master_lock){....}-{2:2}, at: kgdb_cpu_enter+0x20c/0x7ac #2: ffffffd01109ea90 (dbg_slave_lock){....}-{2:2}, at: kgdb_cpu_enter+0x3ec/0x7ac stack backtrace: CPU: 7 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc4+ #609 Hardware name: Google Cheza (rev3+) (DT) Call trace: dump_backtrace+0x0/0x1b8 show_stack+0x1c/0x24 dump_stack+0xd4/0x134 lockdep_rcu_suspicious+0xf0/0x100 find_task_by_pid_ns+0x5c/0x80 getthread+0x8c/0xb0 gdb_serial_stub+0x9d4/0xd04 kgdb_cpu_enter+0x284/0x7ac kgdb_handle_exception+0x174/0x20c kgdb_brk_fn+0x24/0x30 call_break_hook+0x6c/0x7c brk_handler+0x20/0x5c do_debug_exception+0x1c8/0x22c el1_sync_handler+0x3c/0xe4 el1_sync+0x7c/0x100 rpmh_rsc_probe+0x38/0x420 platform_drv_probe+0x94/0xb4 really_probe+0x134/0x300 driver_probe_device+0x68/0x100 __device_attach_driver+0x90/0xa8 bus_for_each_drv+0x84/0xcc __device_attach+0xb4/0x13c device_initial_probe+0x18/0x20 bus_probe_device+0x38/0x98 device_add+0x38c/0x420 If I understand properly we should just be able to blanket kgdb under one big RCU read lock and the problem should go away. We'll add it to the beast-of-a-function known as kgdb_cpu_enter(). With this I no longer get any splats and things seem to work fine. Signed-off-by: Douglas Anderson Link: https://lore.kernel.org/r/20200602154729.v2.1.I70e0d4fd46d5ed2aaf0c98a355e8e1b7a5bb7e4e@changeid Signed-off-by: Daniel Thompson Signed-off-by: Sasha Levin --- kernel/debug/debug_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c index d47c7d6656cd3..9be6accf8fe3d 100644 --- a/kernel/debug/debug_core.c +++ b/kernel/debug/debug_core.c @@ -577,6 +577,7 @@ static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, arch_kgdb_ops.disable_hw_break(regs); acquirelock: + rcu_read_lock(); /* * Interrupts will be restored by the 'trap return' code, except when * single stepping. @@ -636,6 +637,7 @@ static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, atomic_dec(&slaves_in_kgdb); dbg_touch_watchdogs(); local_irq_restore(flags); + rcu_read_unlock(); return 0; } cpu_relax(); @@ -654,6 +656,7 @@ static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, raw_spin_unlock(&dbg_master_lock); dbg_touch_watchdogs(); local_irq_restore(flags); + rcu_read_unlock(); goto acquirelock; } @@ -777,6 +780,7 @@ static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, raw_spin_unlock(&dbg_master_lock); dbg_touch_watchdogs(); local_irq_restore(flags); + rcu_read_unlock(); return kgdb_info[cpu].ret_state; } -- 2.25.1