Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3299200lfo; Mon, 23 May 2022 01:04:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyK/JQhTCKJVbWy5oW9tHM0wnYN2FuW+xp2CU8QSTkYkPNFUGQrN4uQTi/qeJmQ+pmhx0BS X-Received: by 2002:a63:350c:0:b0:3c6:bf88:1509 with SMTP id c12-20020a63350c000000b003c6bf881509mr18955629pga.144.1653293047680; Mon, 23 May 2022 01:04:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653293047; cv=none; d=google.com; s=arc-20160816; b=ZlOCRRsnnwbDlrcgNxCpjn54ps5EuiI3ujDF0zpM9BtlcXxAWwpliPcbOx3tqnOaW1 sD91XHMKl9n79h6RnpJ87W1HA+buBDMMJcM3SGDEVlqBaWCqgHu3t6SdAxqQUJS1c2u5 EyuPPkVkgQ95aB0RolP8Q6FHq7Lpor+m1ZBNLq5qrWuIrNjdrTBOohxTeq5piGsFLDfZ b7kTujXbeLYz5B8lJlwmoqRXhQGfE8TNP5nQMsJtneg9fMCiDeF7huZGXPQ3wUXyeFiF sKruS82mXe/JOHjRZcJm5Ki6V1Tza3hG136GZ8izGXUMOyjKjDJMlOzioB0vi0g1/VCE nZeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=/vLhOSCP5QNhrXNB+0eP1Vbw79xEqu/cnNqULBdNP0g=; b=GAWu1AYNADzg6T4PPjvFT1QbD/03+K9Ib40cS0HUudtbvcVwE3dcCi6Yse5qo/SFCT qmvqgxRMNurdWrzD4E0HdnIr4wrQK0KU5MHxcfv2mP+v5ccdy/xLONJ71G5nwYeLsFag kkJ/hvVXRLs7L28soGX/qESUtg4eHJOgfAJsTyFYlbbc5HsPPHEoEaLngyWyly+VK6k6 L9Lhh8t7OkIkpt5keA6t3/Y65HLXiexXApAMczWZ0wUK2aTAhDnqYC02c6QXbacVauiD P5hdqWNmQ2Zeuv2uJIHQygvQl8JcwHuEr5fujnVG8fkjx9dyE6t+jez3GLxYvJuyBxT5 74Vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MDN3oAuJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id t62-20020a638141000000b003c653e90213si9594875pgd.16.2022.05.23.01.04.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 01:04:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MDN3oAuJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A3D8B6B7ED; Mon, 23 May 2022 00:07:10 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245511AbiEUOnt (ORCPT + 99 others); Sat, 21 May 2022 10:43:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345845AbiEUOnr (ORCPT ); Sat, 21 May 2022 10:43:47 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 27C9869CEF for ; Sat, 21 May 2022 07:43:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id BCBF1B8068F for ; Sat, 21 May 2022 14:43:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 31233C385B8; Sat, 21 May 2022 14:43:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1653144222; bh=9UIogW/hGkD7UNMXBrouLXfFfzy7yMoOEYum4Eptm84=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MDN3oAuJc7PVV6uvWIxB5eCpmTQySk9esWB7JsMWIYf7VWwUMIcUQq8jVowvBuwuh c4eBMO3BfaJzG0f/RUHSK4gjiKx9PNtmSTKogLE2dQlkF0V+D3cCsCXxClFg1YSK4w LuUH9PgyqVizLC/NpCA09N263APG+OD9yWuyxCpC6BJ4utJ72rtExMSx36A26snJDM Yu6dSd5Z/ism2Knkg533+ELa8sr2OmjPSk4SKBhyB44mRCyOonCfcADlAbH1ZLK6K7 K830RIzh7rcCDUPsoSY5jvLZlf+V3cJKKhq0Nkajrp6WcUZoGeYw1wTpYE7HNV7YCK krcBwFZFGzl/w== From: Jisheng Zhang To: Paul Walmsley , Palmer Dabbelt , Albert Ou , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Alexandre Ghiti , Anup Patel , Atish Patra Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Subject: [PATCH v4 1/2] riscv: move sbi_init() earlier before jump_label_init() Date: Sat, 21 May 2022 22:34:55 +0800 Message-Id: <20220521143456.2759-2-jszhang@kernel.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220521143456.2759-1-jszhang@kernel.org> References: <20220521143456.2759-1-jszhang@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We call jump_label_init() in setup_arch() is to use static key mechanism earlier, but riscv jump label relies on the sbi functions, If we enable static key before sbi_init(), the code path looks like: static_branch_enable() .. arch_jump_label_transform() patch_text_nosync() flush_icache_range() flush_icache_all() sbi_remote_fence_i() for CONFIG_RISCV_SBI case __sbi_rfence() Since sbi isn't initialized, so NULL deference! Here is a typical panic log: [ 0.000000] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 0.000000] Oops [#1] [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.18.0-rc7+ #79 [ 0.000000] Hardware name: riscv-virtio,qemu (DT) [ 0.000000] epc : 0x0 [ 0.000000] ra : sbi_remote_fence_i+0x1e/0x26 [ 0.000000] epc : 0000000000000000 ra : ffffffff80005826 sp : ffffffff80c03d50 [ 0.000000] gp : ffffffff80ca6178 tp : ffffffff80c0ad80 t0 : 6200000000000000 [ 0.000000] t1 : 0000000000000000 t2 : 62203a6b746e6972 s0 : ffffffff80c03d60 [ 0.000000] s1 : ffffffff80001af6 a0 : 0000000000000000 a1 : 0000000000000000 [ 0.000000] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 [ 0.000000] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000000080200 [ 0.000000] s2 : ffffffff808b3e48 s3 : ffffffff808bf698 s4 : ffffffff80cb2818 [ 0.000000] s5 : 0000000000000001 s6 : ffffffff80c9c345 s7 : ffffffff80895aa0 [ 0.000000] s8 : 0000000000000001 s9 : 000000000000007f s10: 0000000000000000 [ 0.000000] s11: 0000000000000000 t3 : ffffffff80824d08 t4 : 0000000000000022 [ 0.000000] t5 : 000000000000003d t6 : 0000000000000000 [ 0.000000] status: 0000000000000100 badaddr: 0000000000000000 cause: 000000000000000c [ 0.000000] ---[ end trace 0000000000000000 ]--- [ 0.000000] Kernel panic - not syncing: Attempted to kill the idle task! [ 0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]--- Fix this issue by moving sbi_init() earlier before jump_label_init() Signed-off-by: Jisheng Zhang --- arch/riscv/kernel/setup.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/riscv/kernel/setup.c b/arch/riscv/kernel/setup.c index 834eb652a7b9..d150cedeb7e0 100644 --- a/arch/riscv/kernel/setup.c +++ b/arch/riscv/kernel/setup.c @@ -268,6 +268,7 @@ void __init setup_arch(char **cmdline_p) *cmdline_p = boot_command_line; early_ioremap_setup(); + sbi_init(); jump_label_init(); parse_early_param(); @@ -284,7 +285,6 @@ void __init setup_arch(char **cmdline_p) misc_mem_init(); init_resources(); - sbi_init(); #ifdef CONFIG_KASAN kasan_init(); -- 2.34.1