Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp7133pxb; Mon, 31 Jan 2022 03:55:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyIR6rQ+zd9xa3Chvv8vsY4RsgnAZeEPL9o+ya8LzaK2G+QnJIj2WOxviIEC9U9/LHfnlYw X-Received: by 2002:a17:907:9495:: with SMTP id dm21mr16629840ejc.87.1643630158012; Mon, 31 Jan 2022 03:55:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643630158; cv=none; d=google.com; s=arc-20160816; b=xP/9AlDsopvTcYrjjEvHaLi4RFzEiTKG5TkaRCKwAGtOX3EDdipoTYXPfWp0ztOcuK 0az6e4js9IVs7yQmoicqlwVixtjxLGKK6fA9SIgDxQzEIcAE337TwpG7xxcn/7bbnnOf J+vBB0jPiw6fCXF1yLZFUroBWAutN1Gs2JF0DlNrvIgNTwBnKJz2eXis7lxz8MHESSMI +WzTXLOhSB9gHVe3dSx6LX4ycvGIcw4EGLKMnwCkhnnjv6XY7AHRL31IQmF49S4p31U7 LOei778VDKHga+ch2DzhQrB2p6u3qG3Tv4badfbLnuDrwvEYCqOpe5NmzmjXRqj4qUzp qV0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/3uwQP8SHhp1Z798VpavV4kzs0Y+7l84uUhq28tLIeE=; b=LV7QHQB02Qira9CP97IY7j72dRxp5+Con0Gr/MtZoLd2oBheTrd1SfsTpbTUWPNnJU Sx+WJ91pGVoaa1ASzIxMjJekC9XrZAsy0gM9krwA8IIsq7kwmlYYOuVeWM57XYHOzARX k6NXys2mmr/nI96UFMcHiITMlrOfF3swmx3Jp1ytJ84/uXwOwx5MnZvEzZlNmf/dH3sc mz8JI4vDP5WhQ8wUGh92dIGM+mjANjMWo1nrt47tJLmWyuqoPXmqtjGNgqh1eXouEgoN CrR3nPwhlN/QLwjBU9fL3PlQY+HrX4Tqvm0uKOLB7Tpn2PyYiMPeSnncH6OKVPoxQNZb 0uDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=FRTrfCUN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b8si7545235edd.580.2022.01.31.03.55.33; Mon, 31 Jan 2022 03:55:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=FRTrfCUN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240128AbiA2Aml (ORCPT + 99 others); Fri, 28 Jan 2022 19:42:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41680 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233942AbiA2Amj (ORCPT ); Fri, 28 Jan 2022 19:42:39 -0500 Received: from mail-qt1-x82c.google.com (mail-qt1-x82c.google.com [IPv6:2607:f8b0:4864:20::82c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65F5FC061714 for ; Fri, 28 Jan 2022 16:42:39 -0800 (PST) Received: by mail-qt1-x82c.google.com with SMTP id e16so6673697qtq.6 for ; Fri, 28 Jan 2022 16:42:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=/3uwQP8SHhp1Z798VpavV4kzs0Y+7l84uUhq28tLIeE=; b=FRTrfCUNI8my/uWB6yKWKFyVGWhZ43aDLzQzSfVa9S/x7cPeNAYceT3sDrLlipz638 fcWwBbgYR0cGA7EHq/1bkap2iVdOYkx9XR5Co7S+J8XM1qVcFU3bzTkjjx5e2Gx+6qeR 4EwPg+gBHeha7odXHDQUBP9Fu/xagjIDosx5IYOK+Quv7bSVrwqfPUSzm4anBJD6L2PL rE9LIA6bHokEAGRXpUHNUceMs72FLZGPX0zTQj0Sgf0kKLC+xCqkLr/BQsFGJ43Hm2ob SAfwqgXY4wrNVtUDM3WMSoOMJgsYlg/n2rL1PUxGwrQOKM6iJxW2hnFo4Fb/ydcpkGM2 aOPg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=/3uwQP8SHhp1Z798VpavV4kzs0Y+7l84uUhq28tLIeE=; b=wi3hMiOPZpmzPZHsEoiKazvzrNpzLsAp4M9qwuzdGAEUtXqb+HIpkHcnLuLPlIBOrZ zVqI2O1uVqJPUYHN8RnXhis6UUqd9I41rKJLgw13Hpm6d6HiN5fXB2+dSj0EPv6ZjB7+ PUNxY92dRMirOPj8eUV3muqQWm0h4wM/cSOxexn5/NHnOtrUruu5B599VHCxRGTHfe1O dpyhir+vX8Ec48wNd+iZbgfXbmXi53vEFKQpRMqF3IeaO1j83Rp10WlRbZSEJJIXYHsv 1aXwadnrRQ3EM9xogavdvkxNhOqguCODLab+i6Ufmc9CYh2nRnMrO5twfB5lKP86aOqO LLvA== X-Gm-Message-State: AOAM532h/AXvI2q0sYi42efbouSsZWPsa6K1L7+7LMrOSTGCNbJJrRiI BiR4LpeouuCzUN4q0DaZzDE= X-Received: by 2002:a05:622a:5ce:: with SMTP id d14mr8215060qtb.642.1643416957534; Fri, 28 Jan 2022 16:42:37 -0800 (PST) Received: from WRT-WX9.. ([207.246.89.135]) by smtp.gmail.com with ESMTPSA id 66sm3731055qte.42.2022.01.28.16.42.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 28 Jan 2022 16:42:37 -0800 (PST) From: Changbin Du To: Paul Walmsley , Palmer Dabbelt , Albert Ou Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Changbin Du Subject: [PATCH v2] riscv: fix oops caused by irq on/off tracer Date: Sat, 29 Jan 2022 08:42:26 +0800 Message-Id: <20220129004226.32868-1-changbin.du@gmail.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The trace_hardirqs_on/off requires at least two parent call frames. If not, the code generated by CALLER_ADDR1 (aka. ftrace_return_address(1)) could trigger memory access fault. [ 0.039615][ T0] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8 [ 0.041925][ T0] Oops [#1] [ 0.042063][ T0] Modules linked in: [ 0.042864][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.0-rc1-00233-g9a20c48d1ed2 #29 [ 0.043568][ T0] Hardware name: riscv-virtio,qemu (DT) [ 0.044343][ T0] epc : trace_hardirqs_on+0x56/0xe2 [ 0.044601][ T0] ra : restore_all+0x12/0x6e [ 0.044721][ T0] epc : ffffffff80126a5c ra : ffffffff80003b94 sp : ffffffff81403db0 [ 0.044801][ T0] gp : ffffffff8163acd8 tp : ffffffff81414880 t0 : 0000000000000020 [ 0.044882][ T0] t1 : 0098968000000000 t2 : 0000000000000000 s0 : ffffffff81403de0 [ 0.044967][ T0] s1 : 0000000000000000 a0 : 0000000000000001 a1 : 0000000000000100 [ 0.045046][ T0] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 [ 0.045124][ T0] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000054494d45 [ 0.045210][ T0] s2 : ffffffff80003b94 s3 : ffffffff81a8f1b0 s4 : ffffffff80e27b50 [ 0.045289][ T0] s5 : ffffffff81414880 s6 : ffffffff8160fa00 s7 : 00000000800120e8 [ 0.045389][ T0] s8 : 0000000080013100 s9 : 000000000000007f s10: 0000000000000000 [ 0.045474][ T0] s11: 0000000000000000 t3 : 7fffffffffffffff t4 : 0000000000000000 [ 0.045548][ T0] t5 : 0000000000000000 t6 : ffffffff814aa368 [ 0.045620][ T0] status: 0000000200000100 badaddr: 00000000000000f8 cause: 000000000000000d [ 0.046402][ T0] [] restore_all+0x12/0x6e To fix above issue, here we add one extra level wrapper so they can be safely called by low level entry code. Signed-off-by: Changbin Du --- v2: fix compile warning. --- arch/riscv/kernel/Makefile | 2 ++ arch/riscv/kernel/entry.S | 10 +++++----- arch/riscv/kernel/trace_irq.c | 26 ++++++++++++++++++++++++++ arch/riscv/kernel/trace_irq.h | 11 +++++++++++ 4 files changed, 44 insertions(+), 5 deletions(-) create mode 100644 arch/riscv/kernel/trace_irq.c create mode 100644 arch/riscv/kernel/trace_irq.h diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile index 612556faa527..ffc87e76b1dd 100644 --- a/arch/riscv/kernel/Makefile +++ b/arch/riscv/kernel/Makefile @@ -51,6 +51,8 @@ obj-$(CONFIG_MODULE_SECTIONS) += module-sections.o obj-$(CONFIG_FUNCTION_TRACER) += mcount.o ftrace.o obj-$(CONFIG_DYNAMIC_FTRACE) += mcount-dyn.o +obj-$(CONFIG_TRACE_IRQFLAGS) += trace_irq.o + obj-$(CONFIG_RISCV_BASE_PMU) += perf_event.o obj-$(CONFIG_PERF_EVENTS) += perf_callchain.o obj-$(CONFIG_HAVE_PERF_REGS) += perf_regs.o diff --git a/arch/riscv/kernel/entry.S b/arch/riscv/kernel/entry.S index ed29e9c8f660..d6a46ed0bf05 100644 --- a/arch/riscv/kernel/entry.S +++ b/arch/riscv/kernel/entry.S @@ -108,7 +108,7 @@ _save_context: .option pop #ifdef CONFIG_TRACE_IRQFLAGS - call trace_hardirqs_off + call __trace_hardirqs_off #endif #ifdef CONFIG_CONTEXT_TRACKING @@ -143,7 +143,7 @@ skip_context_tracking: li t0, EXC_BREAKPOINT beq s4, t0, 1f #ifdef CONFIG_TRACE_IRQFLAGS - call trace_hardirqs_on + call __trace_hardirqs_on #endif csrs CSR_STATUS, SR_IE @@ -234,7 +234,7 @@ ret_from_exception: REG_L s0, PT_STATUS(sp) csrc CSR_STATUS, SR_IE #ifdef CONFIG_TRACE_IRQFLAGS - call trace_hardirqs_off + call __trace_hardirqs_off #endif #ifdef CONFIG_RISCV_M_MODE /* the MPP value is too large to be used as an immediate arg for addi */ @@ -270,10 +270,10 @@ restore_all: REG_L s1, PT_STATUS(sp) andi t0, s1, SR_PIE beqz t0, 1f - call trace_hardirqs_on + call __trace_hardirqs_on j 2f 1: - call trace_hardirqs_off + call __trace_hardirqs_off 2: #endif REG_L a0, PT_STATUS(sp) diff --git a/arch/riscv/kernel/trace_irq.c b/arch/riscv/kernel/trace_irq.c new file mode 100644 index 000000000000..fc194c56a35d --- /dev/null +++ b/arch/riscv/kernel/trace_irq.c @@ -0,0 +1,26 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2022 Changbin Du + */ + +#include +#include +#include "trace_irq.h" + +/** + * trace_hardirqs_on/off requires at least two parent call frames. + * Here we add one extra level so they can be safely called by low + * level entry code. + */ + +void __trace_hardirqs_on(void) +{ + trace_hardirqs_on(); +} +NOKPROBE_SYMBOL(__trace_hardirqs_on); + +void __trace_hardirqs_off(void) +{ + trace_hardirqs_off(); +} +NOKPROBE_SYMBOL(__trace_hardirqs_off); diff --git a/arch/riscv/kernel/trace_irq.h b/arch/riscv/kernel/trace_irq.h new file mode 100644 index 000000000000..99fe67377e5e --- /dev/null +++ b/arch/riscv/kernel/trace_irq.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * Copyright (C) 2022 Changbin Du + */ +#ifndef __TRACE_IRQ_H +#define __TRACE_IRQ_H + +void __trace_hardirqs_on(void); +void __trace_hardirqs_off(void); + +#endif /* __TRACE_IRQ_H */ -- 2.32.0