Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp153004pxb; Wed, 8 Sep 2021 20:22:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzX4zE7hf6fIlsvJFyjakMe0hCyCIyGS4tSllAkMmvOpxfAcchSh+CoiAa/68WkJBe9jJZa X-Received: by 2002:a05:6402:14c3:: with SMTP id f3mr901486edx.312.1631157735366; Wed, 08 Sep 2021 20:22:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631157735; cv=none; d=google.com; s=arc-20160816; b=IzvZyPGcGblrbZCGzIGnhIY9gL7vQrHiI9bNdqU/K7p8DoGQy3wburs0l/q+bvYywK YyrCkYL826dmOlwKL7XGrzMEWAPJGz1vfKlnkjiyYtGDr4oClLA9F5wnbnxL6SZu6m21 WSROuWACp4V5ll02Nu3xEMHR+djJCev8sFoQP4UFVwJ/4jERtmNlKgs1EkGQ9UM9dj/z HYkI0Fvsdh1JTNNa4s0yTRLp9gwh/UnafkefXRyHgbehxUFYFRrEyNR+ytFJ3O9wAfK3 nvISsOGFgwrZ21pEq6AhgMx/46DxtLO0twF7IwIrGI90eNfEhdY1fddrpiPYeq9eiFbb sk8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :mime-version:user-agent:date:message-id:subject:from:to; bh=ljiDWSXgQNjPrXSpLA6ZTCxhJlj3mgNxUO2ZM0+a4M0=; b=oGUCP5KXRgnMdAprj2tflEOG1HVrMaGzLIWi14J1d2v8ZluIcuLfafHVbkPN9bfTe9 SHodPsll1KAK+T1gcCA+V7HeerlDLPU4S3KrB7HVIHIVLBUow0AgIlNJ1RJ8234FPHUv 8Q1jLVlJFL+9GnGbomldtj0mg2b1+XSl21B2vdV0W5QUJpQ2p863cb6XGotOdTKU5ntI iFv5F/eqC90KWbS8q3i+GSZBsH2Z4ckGCDRFz107cIPYFvj3XeXHB1t4MtDHxsCJf8qL 3SiyPlZoLA4LJKoMc+DujvMWeGMlUBFrkBcm/Z1u9XFmBN0oczEEuSbHZuc8Lsa65yO3 LKTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id co26si650753edb.564.2021.09.08.20.21.51; Wed, 08 Sep 2021 20:22:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349855AbhIIDOg (ORCPT + 99 others); Wed, 8 Sep 2021 23:14:36 -0400 Received: from out30-44.freemail.mail.aliyun.com ([115.124.30.44]:56809 "EHLO out30-44.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349225AbhIIDOd (ORCPT ); Wed, 8 Sep 2021 23:14:33 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R171e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=yun.wang@linux.alibaba.com;NM=1;PH=DS;RN=19;SR=0;TI=SMTPD_---0UnkWDai_1631157201; Received: from testdeMacBook-Pro.local(mailfrom:yun.wang@linux.alibaba.com fp:SMTPD_---0UnkWDai_1631157201) by smtp.aliyun-inc.com(127.0.0.1); Thu, 09 Sep 2021 11:13:22 +0800 To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , "open list:PERFORMANCE EVENTS SUBSYSTEM" , "open list:PERFORMANCE EVENTS SUBSYSTEM" , "open list:BPF (Safe dynamic programs and tools)" , "open list:BPF (Safe dynamic programs and tools)" From: =?UTF-8?B?546L6LSH?= Subject: [RFC PATCH] perf: fix panic by mark recursion inside perf_log_throttle Message-ID: Date: Thu, 9 Sep 2021 11:13:21 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When running with ftrace function enabled, we observed panic as below: traps: PANIC: double fault, error_code: 0x0 [snip] RIP: 0010:perf_swevent_get_recursion_context+0x0/0x70 [snip] Call Trace: perf_trace_buf_alloc+0x26/0xd0 perf_ftrace_function_call+0x18f/0x2e0 kernelmode_fixup_or_oops+0x5/0x120 __bad_area_nosemaphore+0x1b8/0x280 do_user_addr_fault+0x410/0x920 exc_page_fault+0x92/0x300 asm_exc_page_fault+0x1e/0x30 RIP: 0010:__get_user_nocheck_8+0x6/0x13 perf_callchain_user+0x266/0x2f0 get_perf_callchain+0x194/0x210 perf_callchain+0xa3/0xc0 perf_prepare_sample+0xa5/0xa60 perf_event_output_forward+0x7b/0x1b0 __perf_event_overflow+0x67/0x120 perf_swevent_overflow+0xcb/0x110 perf_swevent_event+0xb0/0xf0 perf_tp_event+0x292/0x410 perf_trace_run_bpf_submit+0x87/0xc0 perf_trace_lock_acquire+0x12b/0x170 lock_acquire+0x1bf/0x2e0 perf_output_begin+0x70/0x4b0 perf_log_throttle+0xe2/0x1a0 perf_event_nmi_handler+0x30/0x50 nmi_handle+0xba/0x2a0 default_do_nmi+0x45/0xf0 exc_nmi+0x155/0x170 end_repeat_nmi+0x16/0x55 According to the trace we know the story is like this, the NMI triggered perf IRQ throttling and call perf_log_throttle(), which triggered the swevent overflow, and the overflow process do perf_callchain_user() which triggered a user PF, and the PF process triggered perf ftrace which finally lead into a suspected stack overflow. This patch marking the context as recursion during perf_log_throttle() , so no more swevent during the process and no more panic. Signed-off-by: Michael Wang --- kernel/events/core.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/kernel/events/core.c b/kernel/events/core.c index 744e872..6063443 100644 --- a/kernel/events/core.c +++ b/kernel/events/core.c @@ -8716,6 +8716,7 @@ static void perf_log_throttle(struct perf_event *event, int enable) struct perf_output_handle handle; struct perf_sample_data sample; int ret; + int rctx; struct { struct perf_event_header header; @@ -8738,14 +8739,17 @@ static void perf_log_throttle(struct perf_event *event, int enable) perf_event_header__init_id(&throttle_event.header, &sample, event); + rctx = perf_swevent_get_recursion_context(); ret = perf_output_begin(&handle, &sample, event, throttle_event.header.size); - if (ret) - return; + if (!ret) { + perf_output_put(&handle, throttle_event); + perf_event__output_id_sample(event, &handle, &sample); + perf_output_end(&handle); + } - perf_output_put(&handle, throttle_event); - perf_event__output_id_sample(event, &handle, &sample); - perf_output_end(&handle); + if (rctx >= 0) + perf_swevent_put_recursion_context(rctx); } /* -- 1.8.3.1