Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5587759rwb; Mon, 14 Nov 2022 06:51:05 -0800 (PST) X-Google-Smtp-Source: AA0mqf5tvK4WUWjL0iXIUnAYWKiG1ntM5SzHpuyZJZtPpN3dYOmg7oJz1HlXW7QEsjXCrPIKfpng X-Received: by 2002:a17:906:4d13:b0:78d:dddb:3974 with SMTP id r19-20020a1709064d1300b0078ddddb3974mr10168149eju.411.1668437465560; Mon, 14 Nov 2022 06:51:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668437465; cv=none; d=google.com; s=arc-20160816; b=ARLyK8odYo9QQJHfm8NjsdjUZbLmbuXS2R2cVIJaNkLXfHUuKce0XqaugIDvK8AWvs QStWSnHKn8Sc7gFT2OV6jJrCx49oxvtybyRn/wO5uqNnJLSvB9gfIFkY28PMGtUrRWdF LWuaKvHtOU3oN8NUt2s4NBVPmb4+vAc+GsPQwfjrGff0Cr5OYeWXsVFKB1gZbrc2Ick+ kGi0oaNXyMhIsGtJ/2pKnhQpM224yajZdjksL7HBWBVomla6vfPrM3iMpKfFUNnNWMpe 4Nv4Me4SqJlXF0HPCK7ueOD6YHqYCcDPR+DezDJaWGouk7KVz1LMJiPy8J3sFd38rnWJ UMsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=5VajTsHD9oyhO5tGi6PPSAr4gmDDb+glVQgAK7u8Kgg=; b=fAfwCIDOhrYvMO9tBQtQiTVjrlzJqcWelgaCi5L2uBPdLq8UjPmo+tlc64R93Pryvi joUoJZZjwyWPfDHP/UeugzDHnWcou8g0gVqvMTuEoqsnzD1SMU/DHoUNAVAlD8RtTOpF MmpfzPhO9dQMGCiI5rAm7rb70i/0UfafsnuZhm7mpfdCYvynyV42RMZpM0BM2aQyaD8n bk3UduIVV83qoIM5QKuWSceRooFHqog4XWGDW3GOjIPuFXWurGWkoneTZ+AwVN/G6YZv xH9F4Q35ELH6wByU7q08yCDojIkDrEjvvpOc1rbA22F8dk3SopjBNdI1p4zItYd+dMrB xdzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CaOv4GmA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z2-20020a056402274200b004617e8811c4si10591910edd.28.2022.11.14.06.50.42; Mon, 14 Nov 2022 06:51:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CaOv4GmA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236982AbiKNOoe (ORCPT + 87 others); Mon, 14 Nov 2022 09:44:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53540 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236897AbiKNOoO (ORCPT ); Mon, 14 Nov 2022 09:44:14 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84E9F2EF33 for ; Mon, 14 Nov 2022 06:43:12 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 03ED2B80F98 for ; Mon, 14 Nov 2022 14:43:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9BF9FC433D6 for ; Mon, 14 Nov 2022 14:43:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1668436989; bh=6nNWR5NerXSxecL8VdhiVVdD5zAsF47xRXXFuRVi82g=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=CaOv4GmA9WThiNQoxaRmtOKZjKJO/NJ3eJDkLr9+ZmtiMwayh6JaiW/TeKI7N8ikE P2YAUxXu7XEavF78nPnKqj5Qo+VWnmoz7M8D9CvP2vKO+gSEnF8/SEss2vyV79JaNc 2UHX0p9dUJqtOVwbJSeC6l8QZgd98hwyPYpqaSkx1yAppcSDwjmW06r99AFxKJSFSX aWc2edzJ93jICFmlW0nsJfo2vDUa3Ju/rfi7hEjqaoyTtNYSaUe1yPyfaPTK3J/TJC 3MHPJ1HoomaksKIAQURt5uENBDheRWFr+eeSVE7frITI2afmIDVvSyFb0OdsE4Cq2G ytjnrF6LksfrQ== Received: by mail-ed1-f49.google.com with SMTP id u24so17586454edd.13 for ; Mon, 14 Nov 2022 06:43:09 -0800 (PST) X-Gm-Message-State: ANoB5pn1xwyFuo1ZrN6GXWJc6o4f1gjjKhxzOA1qYV7BFQaL2Z0Hru2w PxbUT4YrNPR6cZL8UMnexBTWypepTAstnkLAz/Y= X-Received: by 2002:a05:6402:414e:b0:463:1a0c:4dd1 with SMTP id x14-20020a056402414e00b004631a0c4dd1mr11646984eda.137.1668436987703; Mon, 14 Nov 2022 06:43:07 -0800 (PST) MIME-Version: 1.0 References: <20221111223108.1976562-1-abrestic@rivosinc.com> In-Reply-To: <20221111223108.1976562-1-abrestic@rivosinc.com> From: Guo Ren Date: Mon, 14 Nov 2022 22:42:56 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] RISC-V: Fix unannoted hardirqs-on in return to userspace slow-path To: Andrew Bresticker Cc: Palmer Dabbelt , Paul Walmsley , Albert Ou , Atish Patra , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Nov 12, 2022 at 6:31 AM Andrew Bresticker wrote: > > The return to userspace path in entry.S may enable interrupts without the > corresponding lockdep annotation, producing a splat[0] when DEBUG_LOCKDEP > is enabled. Simply calling __trace_hardirqs_on() here gets a bit messy > due to the use of RA to point back to ret_from_exception, so just move > the whole slow-path loop into C. It's more readable and it lets us use > local_irq_{enable,disable}(), avoiding the need for manual annotations > altogether. Could generic_entry solve your problem? please try: https://lore.kernel.org/linux-riscv/20221103075047.1634923-1-guoren@kernel.org/ > > [0]: > ------------[ cut here ]------------ > DEBUG_LOCKS_WARN_ON(!lockdep_hardirqs_enabled()) > WARNING: CPU: 2 PID: 1 at kernel/locking/lockdep.c:5512 check_flags+0x10a/0x1e0 > Modules linked in: > CPU: 2 PID: 1 Comm: init Not tainted 6.1.0-rc4-00160-gb56b6e2b4f31 #53 > Hardware name: riscv-virtio,qemu (DT) > epc : check_flags+0x10a/0x1e0 > ra : check_flags+0x10a/0x1e0 > > status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003 > [] lock_is_held_type+0x78/0x14e > [] __might_resched+0x26/0x22c > [] __might_sleep+0x3c/0x66 > [] get_signal+0x9e/0xa70 > [] do_notify_resume+0x6e/0x422 > [] ret_from_exception+0x0/0x10 > irq event stamp: 44512 > hardirqs last enabled at (44511): [] _raw_spin_unlock_irqrestore+0x54/0x62 > hardirqs last disabled at (44512): [] __trace_hardirqs_off+0xc/0x14 > softirqs last enabled at (44472): [] __do_softirq+0x3de/0x51e > softirqs last disabled at (44467): [] irq_exit+0xd6/0x104 > ---[ end trace 0000000000000000 ]--- > possible reason: unannotated irqs-on. > > Signed-off-by: Andrew Bresticker > --- > This should also theoretically be fixed by the conversion to generic entry, > but it's not clear how far away that series is from landing. > --- > arch/riscv/kernel/entry.S | 18 +++++------------- > arch/riscv/kernel/signal.c | 34 +++++++++++++++++++++------------- > 2 files changed, 26 insertions(+), 26 deletions(-) > > diff --git a/arch/riscv/kernel/entry.S b/arch/riscv/kernel/entry.S > index b9eda3fcbd6d..58dfa8595e19 100644 > --- a/arch/riscv/kernel/entry.S > +++ b/arch/riscv/kernel/entry.S > @@ -263,12 +263,11 @@ ret_from_exception: > #endif > bnez s0, resume_kernel > > -resume_userspace: > /* Interrupts must be disabled here so flags are checked atomically */ > REG_L s0, TASK_TI_FLAGS(tp) /* current_thread_info->flags */ > andi s1, s0, _TIF_WORK_MASK > - bnez s1, work_pending > - > + bnez s1, resume_userspace_slow > +resume_userspace: > #ifdef CONFIG_CONTEXT_TRACKING_USER > call user_enter_callable > #endif > @@ -368,19 +367,12 @@ resume_kernel: > j restore_all > #endif > > -work_pending: > +resume_userspace_slow: > /* Enter slow path for supplementary processing */ > - la ra, ret_from_exception > - andi s1, s0, _TIF_NEED_RESCHED > - bnez s1, work_resched > -work_notifysig: > - /* Handle pending signals and notify-resume requests */ > - csrs CSR_STATUS, SR_IE /* Enable interrupts for do_notify_resume() */ > move a0, sp /* pt_regs */ > move a1, s0 /* current_thread_info->flags */ > - tail do_notify_resume > -work_resched: > - tail schedule > + call do_work_pending > + j resume_userspace > > /* Slow paths for ptrace. */ > handle_syscall_trace_enter: > diff --git a/arch/riscv/kernel/signal.c b/arch/riscv/kernel/signal.c > index 5c591123c440..bfb2afa4135f 100644 > --- a/arch/riscv/kernel/signal.c > +++ b/arch/riscv/kernel/signal.c > @@ -313,19 +313,27 @@ static void do_signal(struct pt_regs *regs) > } > > /* > - * notification of userspace execution resumption > - * - triggered by the _TIF_WORK_MASK flags > + * Handle any pending work on the resume-to-userspace path, as indicated by > + * _TIF_WORK_MASK. Entered from assembly with IRQs off. > */ > -asmlinkage __visible void do_notify_resume(struct pt_regs *regs, > - unsigned long thread_info_flags) > +asmlinkage __visible void do_work_pending(struct pt_regs *regs, > + unsigned long thread_info_flags) > { > - if (thread_info_flags & _TIF_UPROBE) > - uprobe_notify_resume(regs); > - > - /* Handle pending signal delivery */ > - if (thread_info_flags & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL)) > - do_signal(regs); > - > - if (thread_info_flags & _TIF_NOTIFY_RESUME) > - resume_user_mode_work(regs); > + do { > + if (thread_info_flags & _TIF_NEED_RESCHED) { > + schedule(); > + } else { > + local_irq_enable(); > + if (thread_info_flags & _TIF_UPROBE) > + uprobe_notify_resume(regs); > + /* Handle pending signal delivery */ > + if (thread_info_flags & (_TIF_SIGPENDING | > + _TIF_NOTIFY_SIGNAL)) > + do_signal(regs); > + if (thread_info_flags & _TIF_NOTIFY_RESUME) > + resume_user_mode_work(regs); > + } > + local_irq_disable(); > + thread_info_flags = read_thread_flags(); > + } while (thread_info_flags & _TIF_WORK_MASK); > } The more graceful code has been written in kernel/entry/common.c. Let's base it on that: static unsigned long exit_to_user_mode_loop(struct pt_regs *regs, unsigned long ti_work) { /* * Before returning to user space ensure that all pending work * items have been completed. */ while (ti_work & EXIT_TO_USER_MODE_WORK) { local_irq_enable_exit_to_user(ti_work); if (ti_work & _TIF_NEED_RESCHED) schedule(); if (ti_work & _TIF_UPROBE) uprobe_notify_resume(regs); if (ti_work & _TIF_PATCH_PENDING) klp_update_patch_state(current); if (ti_work & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL)) arch_do_signal_or_restart(regs); if (ti_work & _TIF_NOTIFY_RESUME) resume_user_mode_work(regs); /* Architecture specific TIF work */ arch_exit_to_user_mode_work(regs, ti_work); /* * Disable interrupts and reevaluate the work flags as they * might have changed while interrupts and preemption was * enabled above. */ local_irq_disable_exit_to_user(); /* Check if any of the above work has queued a deferred wakeup */ tick_nohz_user_enter_prepare(); ti_work = read_thread_flags(); } /* Return the latest work state for arch_exit_to_user_mode() */ return ti_work; } > -- > 2.25.1 > -- Best Regards Guo Ren