Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp1674781ioo; Sun, 22 May 2022 23:58:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyV1+PDz4hVGdExyCPfWFH9o0Mni2EBI6J9j2YsVMjMimZx2edcm7DWhdz31Wy1uXT0ut2l X-Received: by 2002:a17:902:dac6:b0:161:f394:3e7a with SMTP id q6-20020a170902dac600b00161f3943e7amr15097937plx.19.1653289085784; Sun, 22 May 2022 23:58:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653289085; cv=none; d=google.com; s=arc-20160816; b=Fn7xFwChuCp9WuSuMBXLfq1tfMnrFTDCvFBup9Wd1zeVDT1r6VaEePVdSMP0zUF91a +uZOgzzazFDemu946QD1N+5bRQglfRwI6QdIu74yHoKmDL5fw68qGsHJEtAN+IzbuJ6k POt0esf/48K08Y+RsaDHucpbj2mTljyEVeSi/vNbKc9psgzYhXdg15J44i+fBFCFdfOG 26pgDvrBE1ZWzdYH4Jdg1quDT3zU3lsSO8L4ULOSItvget98zZfZyvwloTaLhYWGh80L KOB0hC5Wi0kWS8bRiIjCL53N79QIVj3pRwnR3BJ17p+jKsEe/EURag/iN0mmqtM+eEIZ S0wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:cc:to:from; bh=AgZjS4OIM1XwbC3zMYkq5o2fkPa+EvaLtocQpamN5rs=; b=yJ6gjlmPC8anHaXEA1xYQne+iaxhmQWAy8t2oei6sK5BWssHt8jaSnoq1ETTaPqAAt tF4Jc1AvxYp9Q84vjGyqCTMZNrcb6S7kKYi4v/mG0+OtBYLKRxsJ52A3OnfmhY1m2r2A x2suMo8xbyIyZFsjnqeGS9kn6BgLTJ3O7NwJQrzYwS/VLOm3KxUQWJmPu7iPCYl6z7Fm iV+zBOwAMn72h/a+BD98Ji0tOQnW+zPlmxwJHMy5UWSHlpqOtlJsK4J2wmB+5Gk7QyFo qaobe3vILX/MBhnqySgLtfpKKFibQEtDPB+27kKOUjEPalIAdcdPGVrPrI40iuKfZSuK TMdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id r137-20020a632b8f000000b003fa4919179fsi3941049pgr.121.2022.05.22.23.58.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 May 2022 23:58:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6BE625A151; Sun, 22 May 2022 23:23:19 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353268AbiETTct convert rfc822-to-8bit (ORCPT + 99 others); Fri, 20 May 2022 15:32:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43352 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353236AbiETTcr (ORCPT ); Fri, 20 May 2022 15:32:47 -0400 Received: from out02.mta.xmission.com (out02.mta.xmission.com [166.70.13.232]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2BBE719579A; Fri, 20 May 2022 12:32:46 -0700 (PDT) Received: from in02.mta.xmission.com ([166.70.13.52]:37830) by out02.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1ns8MT-007S8z-KA; Fri, 20 May 2022 13:32:33 -0600 Received: from ip68-227-174-4.om.om.cox.net ([68.227.174.4]:38910 helo=email.froward.int.ebiederm.org.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1ns8MS-00BQ97-Jb; Fri, 20 May 2022 13:32:33 -0600 From: "Eric W. Biederman" To: Sebastian Andrzej Siewior Cc: linux-kernel@vger.kernel.org, rjw@rjwysocki.net, oleg@redhat.com, mingo@kernel.org, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, mgorman@suse.de, Will Deacon , tj@kernel.org, linux-pm@vger.kernel.org, Peter Zijlstra , Richard Weinberger , Anton Ivanov , Johannes Berg , linux-um@lists.infradead.org, Chris Zankel , Max Filippov , linux-xtensa@linux-xtensa.org, Jann Horn , Kees Cook , linux-ia64@vger.kernel.org, Robert O'Callahan , Kyle Huey , Richard Henderson , Ivan Kokshaysky , Matt Turner , Jason Wessel , Daniel Thompson , Douglas Anderson , Douglas Miller , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras References: <20220421150248.667412396@infradead.org> <20220421150654.817117821@infradead.org> <87czhap9dy.fsf@email.froward.int.ebiederm.org> <878rrrh32q.fsf_-_@email.froward.int.ebiederm.org> <87k0b7v9yk.fsf_-_@email.froward.int.ebiederm.org> <87k0b0apne.fsf_-_@email.froward.int.ebiederm.org> <87a6bv6dl6.fsf_-_@email.froward.int.ebiederm.org> <871qwq5ucx.fsf_-_@email.froward.int.ebiederm.org> Date: Fri, 20 May 2022 14:32:24 -0500 In-Reply-To: (Sebastian Andrzej Siewior's message of "Fri, 20 May 2022 09:33:46 +0200") Message-ID: <87wnegyp87.fsf@email.froward.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-XM-SPF: eid=1ns8MS-00BQ97-Jb;;;mid=<87wnegyp87.fsf@email.froward.int.ebiederm.org>;;;hst=in02.mta.xmission.com;;;ip=68.227.174.4;;;frm=ebiederm@xmission.com;;;spf=softfail X-XM-AID: U2FsdGVkX18cQrXh+UQWoHE6LCH3Iga9qNv05JRvfdM= X-SA-Exim-Connect-IP: 68.227.174.4 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-DCC: XMission; sa04 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ******;Sebastian Andrzej Siewior X-Spam-Relay-Country: X-Spam-Timing: total 420 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 12 (2.9%), b_tie_ro: 10 (2.4%), parse: 1.71 (0.4%), extract_message_metadata: 17 (4.1%), get_uri_detail_list: 2.1 (0.5%), tests_pri_-1000: 17 (4.1%), tests_pri_-950: 1.73 (0.4%), tests_pri_-900: 1.39 (0.3%), tests_pri_-90: 79 (18.7%), check_bayes: 77 (18.3%), b_tokenize: 12 (2.9%), b_tok_get_all: 10 (2.5%), b_comp_prob: 3.5 (0.8%), b_tok_touch_all: 47 (11.2%), b_finish: 0.95 (0.2%), tests_pri_0: 269 (64.1%), check_dkim_signature: 0.74 (0.2%), check_dkim_adsp: 2.5 (0.6%), poll_dns_idle: 0.73 (0.2%), tests_pri_10: 4.0 (0.9%), tests_pri_500: 12 (2.9%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH 00/16] ptrace: cleanups and calling do_cldstop with only siglock X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sebastian Andrzej Siewior writes: > On 2022-05-18 17:49:50 [-0500], Eric W. Biederman wrote: >> >> For ptrace_stop to work on PREEMT_RT no spinlocks can be taken once >> ptrace_freeze_traced has completed successfully. Which fundamentally >> means the lock dance of dropping siglock and grabbing tasklist_lock does >> not work on PREEMPT_RT. So I have worked through what is necessary so >> that tasklist_lock does not need to be grabbed in ptrace_stop after >> siglock is dropped. > … > It took me a while to realise that this is a follow-up I somehow assumed > that you added a few patches on top. Might have been the yesterday's > heat. b4 also refused to download this series because the v4 in this > thread looked newer… Anyway. Both series applied: > > | ============================= > | WARNING: suspicious RCU usage > | 5.18.0-rc7+ #16 Not tainted > | ----------------------------- > | include/linux/ptrace.h:120 suspicious rcu_dereference_check() usage! > | > | other info that might help us debug this: > | > | rcu_scheduler_active = 2, debug_locks = 1 > | 2 locks held by ssdd/1734: > | #0: ffff88800eaa6918 (&sighand->siglock){....}-{2:2}, at: lock_parents_siglocks+0xf0/0x3b0 > | #1: ffff88800eaa71d8 (&sighand->siglock/2){....}-{2:2}, at: lock_parents_siglocks+0x115/0x3b0 > | > | stack backtrace: > | CPU: 2 PID: 1734 Comm: ssdd Not tainted 5.18.0-rc7+ #16 > | Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-debian-1.16.0-4 04/01/2014 > | Call Trace: > | > | dump_stack_lvl+0x45/0x5a > | unlock_parents_siglocks+0xb6/0xc0 > | ptrace_stop+0xb9/0x390 > | get_signal+0x51c/0x8d0 > | arch_do_signal_or_restart+0x31/0x750 > | exit_to_user_mode_prepare+0x157/0x220 > | irqentry_exit_to_user_mode+0x5/0x50 > | asm_sysvec_apic_timer_interrupt+0x12/0x20 > > That is ptrace_parent() in unlock_parents_siglocks(). How odd. I thought I had the appropriate lockdep config options enabled in my test build to catch things like this. I guess not. Now I am trying to think how to tell it that holding the appropriate iglock makes this ok. Eric