Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3404650pxb; Fri, 4 Feb 2022 07:55:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJyZByDoatCyAwoc8xjhxkDGAlK4zy2K4BHvDU/DF6EkySVdvsPGCZZo619IJKkrOy+bHl7x X-Received: by 2002:a17:902:70ca:: with SMTP id l10mr3654542plt.174.1643990109094; Fri, 04 Feb 2022 07:55:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643990109; cv=none; d=google.com; s=arc-20160816; b=P/NqTDzrOm1Rfe/Wuf7Zyfv7klBLPjsISNFtcMJ5H+vtIm8bdKZzb5aZRALFy9VKLO lV4kwUfxytkqF+xIXWNB6qTcSl2czTw/a18ZAUb3+Y9Ih4TgL/H7E4vCUL8qhDYcHkZD 553RDjRQlYbqeLjBUDqQZKjDrHacK5Eg9C4br5ftjge/R0IlQ6/tfo62UTgtnVEtFQZ4 73XHX0/nUoTbF45CYHv+Fe5liT8RiXQwbrVWPaknwEqxFBgUm0IyTyt7cCJzAdKVbcat I74w+E9Fer0cWToaSfRe4SmapJre+13DHRqR9ESgMFNTkZ9hZlCUXj1/cHYdP+w0j8HX hksw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=2E4xUFQrWOe0jxtk8ROX/f6AtDcw1BfrEytF4W98SKQ=; b=dDRpDRxmIVBBxhf1pzOr3NtuXnJzVkkOz1uEpJG2iVJcQjpaevyz/0SYGU2uSwxT1i UFrCd11afW5qRGGQLpmf+ov3wAhBR5T0ctf/RMxVDDMOUEAqVQDQ9p0h5nw24LnCfni1 4kFjl/H3c1geIvKtZQY4NEVpp0STf8eOwvlMbyNPqEF18fbVsHGTCiPNTdTBT7zS7bxK wf1ztuuCegt753JXCdNeVuvQSrEZcvlok/8cV4LcSZ3CbhqFk9+Wi8nZBiu6caNvJQO/ ISYlGDEjdCMYTZbJFLd/9ESToBMIPeblcfAENMxdBuN5M2IPU0XI6grBAxg0vCGCiA/r DiKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a190si2150660pge.165.2022.02.04.07.54.57; Fri, 04 Feb 2022 07:55:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356270AbiBDAlR convert rfc822-to-8bit (ORCPT + 99 others); Thu, 3 Feb 2022 19:41:17 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:60292 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236660AbiBDAlQ (ORCPT ); Thu, 3 Feb 2022 19:41:16 -0500 Received: from pps.filterd (m0109334.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 213NnqhP018720 for ; Thu, 3 Feb 2022 16:41:16 -0800 Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3e05snf850-7 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Thu, 03 Feb 2022 16:41:16 -0800 Received: from twshared9880.08.ash8.facebook.com (2620:10d:c0a8:1b::d) by mail.thefacebook.com (2620:10d:c0a8:82::c) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Thu, 3 Feb 2022 16:41:13 -0800 Received: by devbig006.ftw2.facebook.com (Postfix, from userid 4523) id 16922295C7F35; Thu, 3 Feb 2022 16:41:09 -0800 (PST) From: Song Liu To: CC: , , Song Liu , Yonghong Song , Rik van Riel Subject: [PATCH] perf: fix GPF in perf_cgroup_switch() Date: Thu, 3 Feb 2022 16:40:57 -0800 Message-ID: <20220204004057.2961252-1-song@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT X-FB-Internal: Safe Content-Type: text/plain X-Proofpoint-ORIG-GUID: YT3ZI8ePkyEZ3NslsHI_OXBwq9sQAwQR X-Proofpoint-GUID: YT3ZI8ePkyEZ3NslsHI_OXBwq9sQAwQR X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-03_07,2022-02-03_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=fb_outbound_notspam policy=fb_outbound score=0 clxscore=1015 impostorscore=0 malwarescore=0 lowpriorityscore=0 bulkscore=0 mlxlogscore=999 priorityscore=1501 suspectscore=0 mlxscore=0 spamscore=0 adultscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202040001 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org GPF is observed in perf_cgroup_switch(): [ 2683.232477] general protection fault, probably for non-canonical address 0xdeacffffffffff90: 0000 [#1] SMP [ 2683.251802] CPU: 30 PID: 0 Comm: swapper/30 Kdump: loaded Tainted: G S [ 2683.273726] Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, [ 2683.291129] RIP: 0010:perf_cgroup_switch+0xc0/0x170 [ 2683.300889] Code: 85 ff ff 48 8b 83 00 01 00 00 48 85 c0 74 04 c6 40 08 \ 00 c6 43 08 00 48 8b 83 70 01 00 00 48 8d 98 90 fe ff ff 48 39 c5 \ 74 7d <8b> 83 e4 00 00 00 85 c0 0f 84 89 00 00 00 4c 8b bb 00 01 00 00 48 [ 2683.338455] RSP: 0018:ffffc9000021fdb0 EFLAGS: 00010002 [ 2683.348904] RAX: dead000000000100 RBX: deacffffffffff90 RCX: 000000000000038f [ 2683.363176] RDX: 0000000000000007 RSI: 0000000000000400 RDI: 0000000000000000 [ 2683.377447] RBP: ffff88903ffa77b0 R08: 0000000300000003 R09: 0000000000000004 [ 2683.391718] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000002 [ 2683.405989] R13: 0000000000000000 R14: ffff8881013fdc00 R15: 0000000000000000 [ 2683.420261] FS: 0000000000000000(0000) GS:ffff88903ff80000(0000) knlGS:0000000000000000 [ 2683.436446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2683.447937] CR2: 00007ffafb956020 CR3: 0000000141cd7005 CR4: 00000000007706e0 [ 2683.462209] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2683.476481] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2683.490752] PKRU: 55555554 [ 2683.496160] Call Trace: [ 2683.501048] __perf_event_task_sched_in+0xb3/0x200 [ 2683.510632] finish_task_switch+0x186/0x270 [ 2683.518999] __schedule+0x3b1/0x850 [ 2683.525973] ? cpuidle_enter_state+0xa7/0x340 [ 2683.534687] ? update_ts_time_stats+0x51/0x70 [ 2683.543399] schedule_idle+0x1e/0x40 [ 2683.550548] do_idle+0x148/0x200 [ 2683.557001] cpu_startup_entry+0x19/0x20 [ 2683.564843] start_secondary+0x104/0x140 [ 2683.572688] secondary_startup_64_no_verify+0xb0/0xbb which indicates list corruption on cgrp_cpuctx_list. This happens on the following path: perf_cgroup_switch: list_for_each_entry(cgrp_cpuctx_list) cpu_ctx_sched_in ctx_sched_in ctx_pinned_sched_in merge_sched_in perf_cgroup_event_disable: remove the event from the list To repro this on Intel CPUs: /* occupy all counters with pinned events (watchdog uses another) */ perf stat -e cycles:D,cycles:D,cycles:D,cycles:D,cycles:D -a & /* add a pinned cgroup event */ perf stat -e cycles:D -G my-cgroup /* GPF immediately */ Fix this with list_for_each_entry_safe(). Cc: Yonghong Song Cc: Rik van Riel Signed-off-by: Song Liu --- kernel/events/core.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/events/core.c b/kernel/events/core.c index afbf388a5176..46babdf76d8f 100644 --- a/kernel/events/core.c +++ b/kernel/events/core.c @@ -839,7 +839,7 @@ static DEFINE_PER_CPU(struct list_head, cgrp_cpuctx_list); */ static void perf_cgroup_switch(struct task_struct *task, int mode) { - struct perf_cpu_context *cpuctx; + struct perf_cpu_context *cpuctx, *tmp; struct list_head *list; unsigned long flags; @@ -850,7 +850,7 @@ static void perf_cgroup_switch(struct task_struct *task, int mode) local_irq_save(flags); list = this_cpu_ptr(&cgrp_cpuctx_list); - list_for_each_entry(cpuctx, list, cgrp_cpuctx_entry) { + list_for_each_entry_safe(cpuctx, tmp, list, cgrp_cpuctx_entry) { WARN_ON_ONCE(cpuctx->ctx.nr_cgroups == 0); perf_ctx_lock(cpuctx, cpuctx->task_ctx); -- 2.30.2