Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp416140pxb; Wed, 11 Nov 2020 06:58:02 -0800 (PST) X-Google-Smtp-Source: ABdhPJzzC/WbjHkToO2YwUh58hcBvQGY2GynOHfO1ZLWaS0zaVrVA0KiyN2mqfoCk4CNjbBIhwWU X-Received: by 2002:a05:6402:783:: with SMTP id d3mr27625590edy.168.1605106682179; Wed, 11 Nov 2020 06:58:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605106682; cv=none; d=google.com; s=arc-20160816; b=B55hgoIJBspATokDQ7Xxr5i5cwaC2YhupHEjP9CEnO9PVD8i9eg9+ZTBEa10dBlUdq 02NSMTB8oEsQy5VFvLCdhr9tijYUCoHRbXBQC5iCIuTYpUMkCqRyzsG37O69oHNPngnl bSsv4m3K5itP/h97b7ES8krp2U0WjvivXdlLE+ugOtrai+dSTVXm+VkwnpNdDP/lhaXI jFykvhrMKwGcAOYm8iiqaG04AftH8vJWChbx3AEp9G4SWgQyNMqairyguH88p4axR8M1 Z6in8CLJjalFXjP+1bFzA7XRh7Y+uJ0ijE8vPyuRziQ71bX1EXOqZ3fxPcgzdksAb/vq Wm0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=HauqxgXColeqjprPbUc0JmWW3cRk97A/ix3dTNECW2k=; b=gOSTtoDi4ZkIbGpn78aTGNbAP5d2nHI5rip25xjXFrW6GNWbQlJcYJ9QcHNTL/4XzQ XPYZNotbd+WFRPbiRl5LAbUaI/3DRItB1R2+0TGKGFkULWUfo3Ify62H7D6M6wCa2P2z 7x9TQIlJmtEJw72l8i/vp7hCJP/hLdfrd4qGZOIdDs0B1DXaZarVxNthp4bdqo1lbpVg 0DLXE+79gwAih5PjTwAXPPZXGs/yq8Rv65/lbIgP7u+snj4EhlkLemVnxHdaais8HUGG arDUmbc4nQIMA7rqxt5xJ+1R9KdnoYJC+Q89vP0uH7saBdtq/I8Ol+ZfZZI0dPzXdrjD gDtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SfFgZmdp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h13si1480685ejy.499.2020.11.11.06.57.38; Wed, 11 Nov 2020 06:58:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SfFgZmdp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727255AbgKKOxm (ORCPT + 99 others); Wed, 11 Nov 2020 09:53:42 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:44905 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727232AbgKKOxk (ORCPT ); Wed, 11 Nov 2020 09:53:40 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1605106419; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=HauqxgXColeqjprPbUc0JmWW3cRk97A/ix3dTNECW2k=; b=SfFgZmdpqKzjyXH1f5fXyvnz0e6lCUc01B686dkiOtR58HOenqlLi0sFzvNUd83TpxV0B+ YxWof0tGFe4Wp38rIqCRDqN5pS/0p5UH4cPsstHrsWLEA7x+xquLHCaQSYiX8B2jJWbbUU 5Q9VD9NuDas4UGhrWY+nBINEXzbroCQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-548-lQFt9juWPYGtGkNOXol1zQ-1; Wed, 11 Nov 2020 09:53:37 -0500 X-MC-Unique: lQFt9juWPYGtGkNOXol1zQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C6B0B879539; Wed, 11 Nov 2020 14:53:35 +0000 (UTC) Received: from t480s.redhat.com (ovpn-114-151.ams2.redhat.com [10.36.114.151]) by smtp.corp.redhat.com (Postfix) with ESMTP id D95D1380; Wed, 11 Nov 2020 14:53:33 +0000 (UTC) From: David Hildenbrand To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, linuxppc-dev@lists.ozlabs.org, David Hildenbrand , stable@vger.kernel.org, Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Rashmica Gupta Subject: [PATCH v2 2/8] powernv/memtrace: fix crashing the kernel when enabling concurrently Date: Wed, 11 Nov 2020 15:53:16 +0100 Message-Id: <20201111145322.15793-3-david@redhat.com> In-Reply-To: <20201111145322.15793-1-david@redhat.com> References: <20201111145322.15793-1-david@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It's very easy to crash the kernel right now by simply trying to enable memtrace concurrently, hammering on the "enable" interface loop.sh: #!/bin/bash dmesg --console-off while true; do echo 0x40000000 > /sys/kernel/debug/powerpc/memtrace/enable done [root@localhost ~]# loop.sh & [root@localhost ~]# loop.sh & Resulting quickly in a kernel crash. Let's properly protect using a mutex. Fixes: 9d5171a8f248 ("powerpc/powernv: Enable removal of memory for in memory tracing") Cc: stable@vger.kernel.org# v4.14+ Cc: Michael Ellerman Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Rashmica Gupta Signed-off-by: David Hildenbrand --- arch/powerpc/platforms/powernv/memtrace.c | 22 +++++++++++++++------- 1 file changed, 15 insertions(+), 7 deletions(-) diff --git a/arch/powerpc/platforms/powernv/memtrace.c b/arch/powerpc/platforms/powernv/memtrace.c index eea1f94482ff..0e42fe2d7b6a 100644 --- a/arch/powerpc/platforms/powernv/memtrace.c +++ b/arch/powerpc/platforms/powernv/memtrace.c @@ -30,6 +30,7 @@ struct memtrace_entry { char name[16]; }; +static DEFINE_MUTEX(memtrace_mutex); static u64 memtrace_size; static struct memtrace_entry *memtrace_array; @@ -279,6 +280,7 @@ static int memtrace_online(void) static int memtrace_enable_set(void *data, u64 val) { + int rc = -EAGAIN; u64 bytes; /* @@ -291,25 +293,31 @@ static int memtrace_enable_set(void *data, u64 val) return -EINVAL; } + mutex_lock(&memtrace_mutex); + /* Re-add/online previously removed/offlined memory */ if (memtrace_size) { if (memtrace_online()) - return -EAGAIN; + goto out_unlock; } - if (!val) - return 0; + if (!val) { + rc = 0; + goto out_unlock; + } /* Offline and remove memory */ if (memtrace_init_regions_runtime(val)) - return -EINVAL; + goto out_unlock; if (memtrace_init_debugfs()) - return -EINVAL; + goto out_unlock; memtrace_size = val; - - return 0; + rc = 0; +out_unlock: + mutex_unlock(&memtrace_mutex); + return rc; } static int memtrace_enable_get(void *data, u64 *val) -- 2.26.2