From: Conor Dooley <conor.dooley@microchip.com>
To: Changbin Du <changbin.du@huawei.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>,
Palmer Dabbelt <palmer@dabbelt.com>,
Albert Ou <aou@eecs.berkeley.edu>,
Hui Wang <hw.huiwang@huawei.com>,
<linux-riscv@lists.infradead.org>, <linux-kernel@vger.kernel.org>,
Changbin Du <changbin.du@gmail.com>, Guo Ren <guoren@kernel.org>,
Zong Li <zong.li@sifive.com>
Subject: Re: [PATCH v3] riscv: patch: Fixup lockdep warning in stop_machine
Date: Mon, 30 Jan 2023 15:09:41 +0000 [thread overview]
Message-ID: <Y9fdtcoh8POLZ6CD@wendy> (raw)
In-Reply-To: <20230130232659.3374212-1-changbin.du@huawei.com>
[-- Attachment #1: Type: text/plain, Size: 5549 bytes --]
Hey Changbin,
On Tue, Jan 31, 2023 at 07:26:59AM +0800, Changbin Du wrote:
> From: Changbin Du <changbin.du@gmail.com>
>
> The task of ftrace_arch_code_modify(_post)_prepare() caller is
> stop_machine, whose caller and work thread are of different tasks. The
> lockdep checker needs the same task context, or it's wrong. That means
> it's a bug here to use lockdep_assert_held because we don't guarantee
> the same task context.
>
> kernel/locking/lockdep.c:
> int __lock_is_held(const struct lockdep_map *lock, int read)
> {
> struct task_struct *curr = current;
> int i;
>
> for (i = 0; i < curr->lockdep_depth; i++) {
> ^^^^^^^^^^^^^^^^^^^
> struct held_lock *hlock = curr->held_locks + i;
> ^^^^^^^^^^^^^^^^
> if (match_held_lock(hlock, lock)) {
> if (read == -1 || !!hlock->read == read)
> return LOCK_STATE_HELD;
>
> The __lock_is_held depends on current held_locks records; if
> stop_machine makes the checker runing on another task, that's wrong.
>
> Here is the log:
> [ 15.761523] ------------[ cut here ]------------
> [ 15.762125] WARNING: CPU: 0 PID: 15 at arch/riscv/kernel/patch.c:63 patch_insn_write+0x72/0x364
> [ 15.763258] Modules linked in:
> [ 15.764154] CPU: 0 PID: 15 Comm: migration/0 Not tainted 6.1.0-rc1-00014-g66924be85884-dirty #377
> [ 15.765339] Hardware name: riscv-virtio,qemu (DT)
> [ 15.765985] Stopper: multi_cpu_stop+0x0/0x192 <- stop_cpus.constprop.0+0x90/0xe2
> [ 15.766711] epc : patch_insn_write+0x72/0x364
> [ 15.767011] ra : patch_insn_write+0x70/0x364
> [ 15.767276] epc : ffffffff8000721e ra : ffffffff8000721c sp : ff2000000067bca0
> [ 15.767622] gp : ffffffff81603f90 tp : ff60000002432a00 t0 : 7300000000000000
> [ 15.767919] t1 : 0000000000000000 t2 : 73695f6b636f6c5f s0 : ff2000000067bcf0
> [ 15.768238] s1 : 0000000000000008 a0 : 0000000000000000 a1 : 0000000000000000
> [ 15.768537] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
> [ 15.768837] a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000000000000
> [ 15.769139] s2 : ffffffff80009faa s3 : ff2000000067bd10 s4 : ffffffffffffffff
> [ 15.769447] s5 : 0000000000000001 s6 : 0000000000000001 s7 : 0000000000000003
> [ 15.769740] s8 : 0000000000000002 s9 : 0000000000000004 s10: 0000000000000003
> [ 15.770027] s11: 0000000000000002 t3 : 0000000000000000 t4 : ffffffff819af097
> [ 15.770323] t5 : ffffffff819af098 t6 : ff2000000067ba28
> [ 15.770574] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003
> [ 15.771102] [<ffffffff80007520>] patch_text_nosync+0x10/0x3a
> [ 15.771421] [<ffffffff80009c66>] ftrace_update_ftrace_func+0x74/0x10a
> [ 15.771704] [<ffffffff800fa17e>] ftrace_modify_all_code+0xb0/0x16c
> [ 15.771958] [<ffffffff800fa24c>] __ftrace_modify_code+0x12/0x1c
> [ 15.772196] [<ffffffff800e110e>] multi_cpu_stop+0x14a/0x192
> [ 15.772454] [<ffffffff800e0a34>] cpu_stopper_thread+0x96/0x14c
> [ 15.772699] [<ffffffff8003f4ea>] smpboot_thread_fn+0xf8/0x1cc
> [ 15.772945] [<ffffffff8003ac9c>] kthread+0xe2/0xf8
> [ 15.773160] [<ffffffff80003e98>] ret_from_exception+0x0/0x14
> [ 15.773471] ---[ end trace 0000000000000000 ]---
FWIW, you can always crop the [15.192321] stuff out of commit messages,
as it just adds noise.
> By the way, this also fixes the same issue for patch_text().
>
> Fixes: 0ff7c3b33127 ("riscv: Use text_mutex instead of patch_lock")
> Co-developed-by: Guo Ren <guoren@kernel.org>
> Signed-off-by: Guo Ren <guoren@kernel.org>
> Cc: Zong Li <zong.li@sifive.com>
> Cc: Palmer Dabbelt <palmer@dabbelt.com>
> Signed-off-by: Changbin Du <changbin.du@huawei.com>
> ---
> Changes in v3:
> - denote this also fixes function patch_text().
>
> Changes in v2:
> - Rewrite commit log with lockdep explanation [Guo Ren]
> - Rebase on v6.1 [Guo Ren]
>
> v1:
> https://lore.kernel.org/linux-riscv/20210417023532.354714-1-changbin.du@gmail.com/
> ---
> arch/riscv/kernel/patch.c | 7 -------
> 1 file changed, 7 deletions(-)
>
> diff --git a/arch/riscv/kernel/patch.c b/arch/riscv/kernel/patch.c
> index 765004b60513..8619706f8dfd 100644
> --- a/arch/riscv/kernel/patch.c
> +++ b/arch/riscv/kernel/patch.c
> @@ -55,13 +55,6 @@ static int patch_insn_write(void *addr, const void *insn, size_t len)
> bool across_pages = (((uintptr_t) addr & ~PAGE_MASK) + len) > PAGE_SIZE;
> int ret;
>
> - /*
> - * Before reaching here, it was expected to lock the text_mutex
> - * already, so we don't need to give another lock here and could
> - * ensure that it was safe between each cores.
> - */
> - lockdep_assert_held(&text_mutex);
I must admit, patches like this do concern me a little, as a someone
unfamiliar with the world of probing and tracing.
Seeing an explicit check that the lock was held, leads me to believe
that the original author (Zong Li I think) thought that the text_mutex
lock was insufficient.
Do you think that their fear is unfounded? Explaining why it is safe to
remove this assertion in the commit message would go a long way towards
easing my anxiety!
Also, why delete the comment altogether? The comment provides some
information that doesn't appear to become invalid, even with the
assertion removed?
Thanks,
Conor.
> -
> if (across_pages)
> patch_map(addr + len, FIX_TEXT_POKE1);
>
> --
> 2.25.1
>
>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 228 bytes --]
next prev parent reply other threads:[~2023-01-30 15:10 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-30 23:26 [PATCH v3] riscv: patch: Fixup lockdep warning in stop_machine Changbin Du
2023-01-30 15:09 ` Conor Dooley [this message]
2023-01-31 7:26 ` Guo Ren
2023-01-31 7:50 ` Conor Dooley
2023-02-01 21:00 ` Changbin Du
2023-02-01 14:01 ` Conor Dooley
2023-02-02 23:00 ` Changbin Du
2023-02-02 8:01 ` Conor Dooley
2023-02-02 11:39 ` Changbin Du
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y9fdtcoh8POLZ6CD@wendy \
--to=conor.dooley@microchip.com \
--cc=aou@eecs.berkeley.edu \
--cc=changbin.du@gmail.com \
--cc=changbin.du@huawei.com \
--cc=guoren@kernel.org \
--cc=hw.huiwang@huawei.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-riscv@lists.infradead.org \
--cc=palmer@dabbelt.com \
--cc=paul.walmsley@sifive.com \
--cc=zong.li@sifive.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox