Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp7017546rwi; Mon, 24 Oct 2022 08:50:13 -0700 (PDT) X-Google-Smtp-Source: AMsMyM75hxXUfLcmEe7+/GTislx2VaSGrEvdbBxH+nt3M5UcbqcejyPmDG3rjP4DYcqWvuYQUNW5 X-Received: by 2002:a05:6402:847:b0:45b:d50c:b9aa with SMTP id b7-20020a056402084700b0045bd50cb9aamr31058870edz.289.1666626602632; Mon, 24 Oct 2022 08:50:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666626602; cv=none; d=google.com; s=arc-20160816; b=lW49O4Xw11mSPeIb8Rj/jhE28blKPXIYOQMFkPJcOEm3KgY1Phqyzk25hGlZirigND suUvwEYuOOmtdTM/dPtGgtADgDKdWwY3N8iTDvMJlSoTESiDF9jhGD6ZFb0eamEIoTbP uLMXKe1l1eD5LN4fLu2wc3eKFwDF1U6XhdXrNuMbnTkj723R3x+P29L93eFuD4pD8CEQ EwFqUIcrUMYyTw8yd4KKW5GAEnMEGYKGXrWz56LhP5mKJmHNPmj0wWX4RHaz4jBBFxa+ kErz1sb4Fe5BjVXmI99omCXgLeC2I2s7JlRXoa/hpT0Oi4Yx03Eu3x8FBoayQveii8jO arOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=9TPbsg3xs6JuXXXhmuJC4I5zGSg5YCafgNelBtIzR78=; b=m3NgQSD9xl8VKYAN8sc98959xD35UFuADzSU/kmu5IfmSY7TaL0DnxCSN1rDWLwAUO KXoJjdnV4kjk0wW7ajYz3I6qud2DC06JgqkCCpCtI9vmIo8rj/HKyW3gbsjbnW3Rps6T NsNylyaKfOklaeHzW3xZM0y+OesiSD1B+iounn8pvluKj+H9wDXbyETxKaISfcAHO2ye OEURPvh09lH9Tb2iaz//y1S/c+aW3B1tRBMh/QqUHC3r2pXZAfLC1aQZT/pN3UV83Hem gLdtJVDarfCwv1e9l/uVMlhE67Qgbum8K6og1o6KfNUyAbFj/Hd/9yO32LdXGgYzbrIP 0QNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i2-20020a170906250200b00783160b16a1si76790ejb.397.2022.10.24.08.49.37; Mon, 24 Oct 2022 08:50:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229779AbiJXOL5 (ORCPT + 99 others); Mon, 24 Oct 2022 10:11:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235131AbiJXOJE (ORCPT ); Mon, 24 Oct 2022 10:09:04 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7B5B2C4D90; Mon, 24 Oct 2022 05:51:14 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1C6D3ED1; Mon, 24 Oct 2022 05:21:07 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.7.186]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D2D8A3F7B4; Mon, 24 Oct 2022 05:20:59 -0700 (PDT) Date: Mon, 24 Oct 2022 13:20:57 +0100 From: Mark Rutland To: Yu Liao Cc: "Paul E. McKenney" , "liwei (GF)" , linux-kernel@vger.kernel.org, rcu@vger.kernel.org Subject: Re: [BUG] possible deadlock in __rcu_irq_enter_check_tick Message-ID: References: <20221012064911.GN4221@paulmck-ThinkPad-P17-Gen-1> <97cfec0d-a24b-9917-2bd1-404e344eaa36@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <97cfec0d-a24b-9917-2bd1-404e344eaa36@huawei.com> X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 20, 2022 at 09:32:35PM +0800, Yu Liao wrote: > On 2022/10/19 22:14, Mark Rutland wrote: > > On Tue, Oct 18, 2022 at 03:24:48PM +0100, Mark Rutland wrote: > > Having a go with v6.1-rc1, placing a kprobe on __rcu_irq_enter_check_tick() > > causes a recursive exception which triggers the stack overflow detection, so > > there are bigger problems here, and we'll need to do some further rework of the > > arm64 entry code. FWIW, x86-64 seems fine. > > > > I have a vague recollection that that there was something (some part kprobes, > > perhaps) that didn't like being called in NMI context, which is why debug > > exceptions aren't accounted as true NMIs (but get most of the same treatment). > > > > I'll have to dig into this a bit more; there are a bunch of subtle interactions > > in this area, and I don't want to put a band-aid over this without fully > > understanding the implications. > > > > Once we've figured that out for mainline, we can figure out what needs to go to > > stable. > > > > Yu, were you particularly interested in tracing __rcu_irq_enter_check_tick(), > > or did you stumble upon this by other means? > Oh,This was found with the help of the kernel fuzzer syzkaller. Thanks for confirming! I've also been testing with Syzkaller, but it looks like I haven't had KPROBES enabled due to deselecting MODULE support, which explains how I've missed this until now. :/ I'll go fiddle with moy configs. Thanks, Mark.