Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1514868pxb; Mon, 22 Feb 2021 04:08:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJzdCvEcytZUgXeXsPPChKOCecsIR9KrN0PTm0bfEw5+G2cb6aqL9+8ohskyiseLJRxg5vqd X-Received: by 2002:a17:907:5088:: with SMTP id fv8mr9426097ejc.9.1613995694124; Mon, 22 Feb 2021 04:08:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613995694; cv=none; d=google.com; s=arc-20160816; b=wXdoxVhk5l1QwZ5f/Wh5u48fauOurDIX2F2hGegWO4PlN3C5KcBRaAOJGUxKJykh1z U6YcK1cZRzAaGN9kjSbDUfESzvgrq7NKvHQmWCreRvtQ3Zi+iuRvLe8+xYl4dvLcTXb0 3LTKO4s/pikrAAWo1ceaIZQzgvWnj1SB4ao/dvpIlGx5ggn/gzewIJiyIYo3c0Jt8j0L 5JApYEX//alWMWJXu8N5b1PJT2Iy5nBzD3Fs/PIkpGNTlT5Yf1WrY/lrd7cFiFxp9Tz7 IVsN82ZNnmBYOSVCbJa2CIhiWV9pha7wy8QA/pl9H1TovDbq1rTIwauoDfi9DiDnjHN0 LyJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=6I8dmAvwfywsSuR2OL49RQgP9MGNLljDub8LfbFUEk0=; b=C6RtnTlGLGl16Kc+xOUQQ5YlOLCBlbWxoNdoZBpC/t+tjJtnbbpnyO/YwwnyZpfqz1 lnEK4ojGT/jGXjPM/jwtKQYRB7NdYHKrdmHmUVARlNL1egcNBoih1Q7EY8SQS5DKMCrX Nt0ZQ2AKLsIpbTD/7XZ680NLj/hcgGLZLSY/jEFd10urc39pjLHEeK2HK5VgHnDOO2Yg LIs95R7Zzo113n/j4W2e/1EaYT0gKfcPZuNrVy2D1RoY+bIEOvDLKNqdO5OBYXKUwdUx pdqpL0Rs4TfdY76V1IqOt5VDgTKpOw8TrO2rS2XZMRFAE/WaQhphx1KCMhJjp/b8bw1h MeHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 26si8534458ejy.13.2021.02.22.04.07.51; Mon, 22 Feb 2021 04:08:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230135AbhBVMFE (ORCPT + 99 others); Mon, 22 Feb 2021 07:05:04 -0500 Received: from foss.arm.com ([217.140.110.172]:43800 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230087AbhBVMEn (ORCPT ); Mon, 22 Feb 2021 07:04:43 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 699E71FB; Mon, 22 Feb 2021 04:03:55 -0800 (PST) Received: from [10.37.8.9] (unknown [10.37.8.9]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6D31F3F70D; Mon, 22 Feb 2021 04:03:53 -0800 (PST) Subject: Re: [PATCH v13 4/7] arm64: mte: Enable TCO in functions that can read beyond buffer limits To: Catalin Marinas Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, Andrew Morton , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi References: <20210211153353.29094-1-vincenzo.frascino@arm.com> <20210211153353.29094-5-vincenzo.frascino@arm.com> <20210212172128.GE7718@arm.com> From: Vincenzo Frascino Message-ID: Date: Mon, 22 Feb 2021 12:08:07 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210212172128.GE7718@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/12/21 5:21 PM, Catalin Marinas wrote: >> + >> + /* >> + * This function is called on each active smp core at boot >> + * time, hence we do not need to take cpu_hotplug_lock again. >> + */ >> + static_branch_enable_cpuslocked(&mte_async_mode); >> } > Sorry, I missed the cpuslocked aspect before. Is there any reason you > need to use this API here? I suggested to add it to the > mte_enable_kernel_sync() because kasan may at some point do this > dynamically at run-time, so the boot-time argument doesn't hold. But > it's also incorrect as this function will be called for hot-plugged > CPUs as well after boot. > > The only reason for static_branch_*_cpuslocked() is if it's called from > a region that already invoked cpus_read_lock() which I don't think is > the case here. I agree with your analysis on why static_branch_*_cpuslocked() is needed, in fact cpus_read_lock() takes cpu_hotplug_lock as per comment on top of the line of code. If I try to take that lock when enabling the secondary cores I end up in the situation below: [ 0.283402] smp: Bringing up secondary CPUs ... .... [ 5.890963] Call trace: [ 5.891050] dump_backtrace+0x0/0x19c [ 5.891212] show_stack+0x18/0x70 [ 5.891373] dump_stack+0xd0/0x12c [ 5.891531] dequeue_task_idle+0x28/0x40 [ 5.891686] __schedule+0x45c/0x6c0 [ 5.891851] schedule+0x70/0x104 [ 5.892010] percpu_rwsem_wait+0xe8/0x104 [ 5.892174] __percpu_down_read+0x5c/0x90 [ 5.892332] percpu_down_read.constprop.0+0xbc/0xd4 [ 5.892497] cpus_read_lock+0x10/0x1c [ 5.892660] static_key_enable+0x18/0x3c [ 5.892823] mte_enable_kernel_async+0x40/0x70 [ 5.892988] kasan_init_hw_tags_cpu+0x50/0x60 [ 5.893144] cpu_enable_mte+0x24/0x70 [ 5.893304] verify_local_cpu_caps+0x58/0x120 [ 5.893465] check_local_cpu_capabilities+0x18/0x1f0 [ 5.893626] secondary_start_kernel+0xe0/0x190 [ 5.893790] 0x0 [ 5.893975] bad: scheduling from the idle thread! [ 5.894065] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G W 5.11.0-rc7-10587-g22cd50bcfcf-dirty #6 and the kernel panics. Note: there is a look of msg drop in between enabling the secondary and the first clean stack trace. -- Regards, Vincenzo