Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2875249rwb; Sun, 20 Nov 2022 03:23:32 -0800 (PST) X-Google-Smtp-Source: AA0mqf6X7uwj0ryiIeeC+k+fvtVp9EyCmdTWm83Zz7n4GoKwkyDSJ9wq6M60G/ApNblhYJMWOrQQ X-Received: by 2002:a05:6402:5406:b0:467:4b3d:f2ed with SMTP id ev6-20020a056402540600b004674b3df2edmr12465915edb.101.1668943412388; Sun, 20 Nov 2022 03:23:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668943412; cv=none; d=google.com; s=arc-20160816; b=NBoVCCpO7GzxnbWUMjTPFGfu4nU5likHmjpwl5w4Zdwf/JiV19Ysbf7ufs0J0lTh7+ +r2Vz4pNPVSt2Ly8hFZSna46lXeXS9Zf68IWd0CKDOGWf8l+mgaiq68bdkuKUBPpmXqp vwWhDSkFyGfk5EaXMUD8Ou+7ixvH0dLMFQH0A9leEE9rr7RJmwf9p13/2UC7YdiiZy7u nJrGgA7P6/vFULa6xQjK7Zn9CAG1RIwW4n1yzlEL264cuLaauwIJ6X0NVYKPN7OKv+0V Hhn//p4rlBP2znLhi8aBk5GYbzWSOBGbeYskWJYUbO3NHSducLgA1Mvp+j0S8wfcW36H Lpww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=w4VIly0xn6krryNQDeB8pahUzNB8LZsxeShEiH8iosY=; b=wpAa2nLTtnUdLO186moyVoJgxuKzGdvRMozghcNb/Cyv/TXQ8gcu/RJ8b0YJOxB6c6 p0uipks6+UmWawUf9AfkVz0JG+w+r9E54L76z7PnWCNr7YZ62oQ5axBB+QndoIsP8mUK dDFlRf3rw0lNjNC8d1dbPW1y0cQEhWP0+IUmDIuFtySV46E6bd9bl2y5JY7KrxfjaSQq syJROvAfi1ntFUjrCpYntLo8S4GAGax1oNtrrs8utHQdLlcdN4tm75yef3uJyhCRMaXy JtIjqk5UTaOPaFIEQ5lSXJ+B6tZ+c/OHW6wVZCoxSEbTFsl14cNb7s9r/wC4g643VO0Y 56+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="U/BTk09X"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qa17-20020a170907869100b0078239e3f846si8175155ejc.1.2022.11.20.03.23.06; Sun, 20 Nov 2022 03:23:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="U/BTk09X"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229647AbiKTKLV (ORCPT + 91 others); Sun, 20 Nov 2022 05:11:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60150 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229462AbiKTKLU (ORCPT ); Sun, 20 Nov 2022 05:11:20 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B25AF78D67 for ; Sun, 20 Nov 2022 02:11:18 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 4911AB80123 for ; Sun, 20 Nov 2022 10:11:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 387A7C433C1; Sun, 20 Nov 2022 10:11:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1668939075; bh=QTDu4fLb9twOkqLiSjSp5OTaro/DCdN7tjTIlLKBosc=; h=From:To:Cc:Subject:Date:From; b=U/BTk09XUWCG08xPAg3hhWPph8uBDYe7Nf/RcI1+eSb0IPp6BEYD4b8bc6HIyco/M rZL6D8ewyJqOER+zjXn7RrsFeBKyWUErX9eeUWIWqWjN0PkhvS60fAHSDoyktbY2PD PuaFvIa33GFjkuEXojsVugjQKbNUz9yQbJM56kUhHLfDb8U3Qe/l3420lEbqOatZUN 9kCKfbb1BihoPLcS/26PQyWYcfkKi+/FC3EJmiz75njyr08Ekf4d7dVU1j1rkg3O9B 8CJjSkLId3xqActWV2EK+QEJ63f/volwbvjhYOP+uBsdTMXGcm55wL0S0pMi8O8q2m 2cKbOLyhrAppA== From: guoren@kernel.org To: palmer@dabbelt.com, paul.walmsley@sifive.com, aou@eecs.berkeley.edu, mhiramat@kernel.org, changbin.du@intel.com, zong.li@sifive.com, rostedt@goodmis.org, boqun.feng@gmail.com Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Changbin Du , Guo Ren Subject: [PATCH V2] riscv: patch: Fixup lockdep warning in stop_machine Date: Sun, 20 Nov 2022 05:10:49 -0500 Message-Id: <20221120101049.2078117-1-guoren@kernel.org> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Changbin Du The task of ftrace_arch_code_modify(_post)_prepare() caller is stop_machine, whose caller and work thread are different tasks. The lockdep checker needs the same task context, or it's wrong. That means it's a bug here to use lockdep_assert_held because we don't guarantee the same task context. kernel/locking/lockdep.c: int __lock_is_held(const struct lockdep_map *lock, int read) { struct task_struct *curr = current; int i; for (i = 0; i < curr->lockdep_depth; i++) { ^^^^^^^^^^^^^^^^^^^ struct held_lock *hlock = curr->held_locks + i; ^^^^^^^^^^^^^^^^ if (match_held_lock(hlock, lock)) { if (read == -1 || !!hlock->read == read) return LOCK_STATE_HELD; The __lock_is_held depends on current held_locks records; if stop_machine makes the checker runing on another task, that's wrong. Here is the log: [ 15.761523] ------------[ cut here ]------------ [ 15.762125] WARNING: CPU: 0 PID: 15 at arch/riscv/kernel/patch.c:63 patch_insn_write+0x72/0x364 [ 15.763258] Modules linked in: [ 15.764154] CPU: 0 PID: 15 Comm: migration/0 Not tainted 6.1.0-rc1-00014-g66924be85884-dirty #377 [ 15.765339] Hardware name: riscv-virtio,qemu (DT) [ 15.765985] Stopper: multi_cpu_stop+0x0/0x192 <- stop_cpus.constprop.0+0x90/0xe2 [ 15.766711] epc : patch_insn_write+0x72/0x364 [ 15.767011] ra : patch_insn_write+0x70/0x364 [ 15.767276] epc : ffffffff8000721e ra : ffffffff8000721c sp : ff2000000067bca0 [ 15.767622] gp : ffffffff81603f90 tp : ff60000002432a00 t0 : 7300000000000000 [ 15.767919] t1 : 0000000000000000 t2 : 73695f6b636f6c5f s0 : ff2000000067bcf0 [ 15.768238] s1 : 0000000000000008 a0 : 0000000000000000 a1 : 0000000000000000 [ 15.768537] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000 [ 15.768837] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000000000000 [ 15.769139] s2 : ffffffff80009faa s3 : ff2000000067bd10 s4 : ffffffffffffffff [ 15.769447] s5 : 0000000000000001 s6 : 0000000000000001 s7 : 0000000000000003 [ 15.769740] s8 : 0000000000000002 s9 : 0000000000000004 s10: 0000000000000003 [ 15.770027] s11: 0000000000000002 t3 : 0000000000000000 t4 : ffffffff819af097 [ 15.770323] t5 : ffffffff819af098 t6 : ff2000000067ba28 [ 15.770574] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003 [ 15.771102] [] patch_text_nosync+0x10/0x3a [ 15.771421] [] ftrace_update_ftrace_func+0x74/0x10a [ 15.771704] [] ftrace_modify_all_code+0xb0/0x16c [ 15.771958] [] __ftrace_modify_code+0x12/0x1c [ 15.772196] [] multi_cpu_stop+0x14a/0x192 [ 15.772454] [] cpu_stopper_thread+0x96/0x14c [ 15.772699] [] smpboot_thread_fn+0xf8/0x1cc [ 15.772945] [] kthread+0xe2/0xf8 [ 15.773160] [] ret_from_exception+0x0/0x14 [ 15.773471] ---[ end trace 0000000000000000 ]--- Fixes: 0ff7c3b33127 ("riscv: Use text_mutex instead of patch_lock") Cc: Changbin Du Co-developed-by: Guo Ren Signed-off-by: Guo Ren Cc: Zong Li Cc: Palmer Dabbelt --- Changes in v2: - Rewrite commit log with lockdep explanation [Guo Ren] - Rebase on v6.1 [Guo Ren] v1: https://lore.kernel.org/linux-riscv/20210417023532.354714-1-changbin.du@gmail.com/ --- arch/riscv/kernel/patch.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/arch/riscv/kernel/patch.c b/arch/riscv/kernel/patch.c index 765004b60513..8619706f8dfd 100644 --- a/arch/riscv/kernel/patch.c +++ b/arch/riscv/kernel/patch.c @@ -55,13 +55,6 @@ static int patch_insn_write(void *addr, const void *insn, size_t len) bool across_pages = (((uintptr_t) addr & ~PAGE_MASK) + len) > PAGE_SIZE; int ret; - /* - * Before reaching here, it was expected to lock the text_mutex - * already, so we don't need to give another lock here and could - * ensure that it was safe between each cores. - */ - lockdep_assert_held(&text_mutex); - if (across_pages) patch_map(addr + len, FIX_TEXT_POKE1); -- 2.36.1