From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0B38EC169C4 for ; Mon, 11 Feb 2019 15:39:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id CC0B2222A7 for ; Mon, 11 Feb 2019 15:39:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388322AbfBKPj4 (ORCPT ); Mon, 11 Feb 2019 10:39:56 -0500 Received: from www62.your-server.de ([213.133.104.62]:42314 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732391AbfBKPjz (ORCPT ); Mon, 11 Feb 2019 10:39:55 -0500 Received: from [78.46.172.2] (helo=sslproxy05.your-server.de) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1gtDgR-0007iI-E1; Mon, 11 Feb 2019 16:39:47 +0100 Received: from [2a02:1203:ecb1:b710:c81f:d2d6:50a9:c2d] (helo=linux.home) by sslproxy05.your-server.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1gtDgR-000E8m-6O; Mon, 11 Feb 2019 16:39:47 +0100 Subject: Re: [PATCH v2 bpf] bpf: fix lockdep false positive in stackmap To: Alexei Starovoitov , davem@davemloft.net Cc: peterz@infradead.org, edumazet@google.com, longman@redhat.com, jannh@google.com, netdev@vger.kernel.org, kernel-team@fb.com References: <20190210205235.392478-1-ast@kernel.org> From: Daniel Borkmann Message-ID: Date: Mon, 11 Feb 2019 16:39:46 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20190210205235.392478-1-ast@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.100.2/25357/Mon Feb 11 11:38:50 2019) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On 02/10/2019 09:52 PM, Alexei Starovoitov wrote: > Lockdep warns about false positive: > [ 11.211460] ------------[ cut here ]------------ > [ 11.211936] DEBUG_LOCKS_WARN_ON(depth <= 0) > [ 11.211985] WARNING: CPU: 0 PID: 141 at ../kernel/locking/lockdep.c:3592 lock_release+0x1ad/0x280 > [ 11.213134] Modules linked in: > [ 11.214954] RIP: 0010:lock_release+0x1ad/0x280 > [ 11.223508] Call Trace: > [ 11.223705] > [ 11.223874] ? __local_bh_enable+0x7a/0x80 > [ 11.224199] up_read+0x1c/0xa0 > [ 11.224446] do_up_read+0x12/0x20 > [ 11.224713] irq_work_run_list+0x43/0x70 > [ 11.225030] irq_work_run+0x26/0x50 > [ 11.225310] smp_irq_work_interrupt+0x57/0x1f0 > [ 11.225662] irq_work_interrupt+0xf/0x20 > > since rw_semaphore is released in a different task vs task that locked the sema. > It is expected behavior. > Fix the warning with up_read_non_owner() and rwsem_release() annotation. > > Fixes: bae77c5eb5b2 ("bpf: enable stackmap with build_id in nmi context") > Signed-off-by: Alexei Starovoitov Applied, thanks!