Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5088701ybv; Tue, 11 Feb 2020 08:59:48 -0800 (PST) X-Google-Smtp-Source: APXvYqz9vcNrGyeRCHGtucflQYfez18DAGh8rc4GB7rUEvI6lNWMCN9LqPeH78OKmnLxmnzaCzJo X-Received: by 2002:a9d:4c14:: with SMTP id l20mr5906762otf.125.1581440387751; Tue, 11 Feb 2020 08:59:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581440387; cv=none; d=google.com; s=arc-20160816; b=Jw18sb3ZVSHrSFkK297yXI9TcR2KeOqivPnP31ew0hwR3STWoiE2Il3DKrpy/3m5Iv Z1+bl8HqKOIuVJMZXBU2woKU+2caRFbDKrhu2R9zNQX1sA1rCnRx4wxREjRDRps6jwLu doH8nDohhsOpARRl/q3uUqAd3sHMuS+ogNL5KHiIJobvsCYDbRYuPp8rmg5LrNiIXHDZ Z7KaWd9Ygsr4ACTM418w7lkAFpH0x3NHOTsca2cFS9j966ghOOe3K60ZsGAbdFzNgH63 wYdUBb+Poh0CVMp3Jfd8MOHsRs1tnVLEyDBZxNtBkJEhFF7MiHiEri2f4Fv+oB4CfPf2 s0gQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=kOVM19xgvEpzNbdc34dGz9f33pbISrxSA6jBH/Bi6So=; b=H8L1gIgWnnsPMHR2hbEIy0lByqQjImAJeY60ZWMRRTZzTsRnidozYxW1+7YUX5/ebL zGTmmAOcLZXHCYv5+5hIG4SqDpC9UVzfVXOmISq1K/u58FCsA4kfTk/BUVQhNc/GZx01 JtFy55KHDIhAkurUkL5xFecQ2VUBA75GPsTWJCRy1Xnom+9Ss70Ek8fqgH3ENT2Vsc1o 08ApW+WO83sNNDhPM0/qws5+rxy6qxCII3XTiRq85gdjhWtOaOQlvnxd5+dEZPjy0ALu 8ahnw9WADzOwBOVsMdUMR+eLGYCWsaK7DM+jT9uiOOLgQUPAYCPFAbMe8PDjUPaf1iHO t7qA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=merlin.20170209 header.b=aQeCQQp0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w187si2015420oif.94.2020.02.11.08.59.35; Tue, 11 Feb 2020 08:59:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=merlin.20170209 header.b=aQeCQQp0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728544AbgBKPGN (ORCPT + 99 others); Tue, 11 Feb 2020 10:06:13 -0500 Received: from merlin.infradead.org ([205.233.59.134]:43572 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727111AbgBKPGN (ORCPT ); Tue, 11 Feb 2020 10:06:13 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=merlin.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=kOVM19xgvEpzNbdc34dGz9f33pbISrxSA6jBH/Bi6So=; b=aQeCQQp0OxFOcoJ8vnnGz7DEKt oR7osXGRsXoca1k5+TmdiEJvRabVb6ElkP0ZmZrNG2BXx12YaCVHSVPuSPM59TaNmahz3nYnk+G3h bkrs1CrjM4b9Xrp8zOjk9PJZDQv4SGnm+HdsqQRNXl1aiAyCaHiX5GxkYjDN7n5VGAtwR3ZCy3vYN VUnK89EVOl+KiBNcmNZaDt9P+UMam1Tf0sWubBWzmveYa5B1PsT074ln+8T62ZpIMe+TjMR64cDte wMpCjFR1KytcQ3gi3AepbDSQrKrH0NntQdIJli72rwrftYJvCrL7O1ezIwbwZ4gNrIkDTC11uAkGE JrKESysQ==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by merlin.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1j1X6V-0006JB-RU; Tue, 11 Feb 2020 15:05:36 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 5450430066E; Tue, 11 Feb 2020 16:03:44 +0100 (CET) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id F2D092B920EF1; Tue, 11 Feb 2020 16:05:32 +0100 (CET) Date: Tue, 11 Feb 2020 16:05:32 +0100 From: Peter Zijlstra To: Steven Rostedt Cc: LKML , Ingo Molnar , "Joel Fernandes (Google)" , Greg Kroah-Hartman , "Gustavo A. R. Silva" , Thomas Gleixner , "Paul E. McKenney" , Josh Triplett , Mathieu Desnoyers , Lai Jiangshan Subject: Re: [PATCH] tracing/perf: Move rcu_irq_enter/exit_irqson() to perf trace point hook Message-ID: <20200211150532.GU14914@hirez.programming.kicks-ass.net> References: <20200210170643.3544795d@gandalf.local.home> <20200211114954.GK14914@hirez.programming.kicks-ass.net> <20200211090503.68c0d70f@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200211090503.68c0d70f@gandalf.local.home> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 11, 2020 at 09:05:03AM -0500, Steven Rostedt wrote: > On Tue, 11 Feb 2020 12:49:54 +0100 > Peter Zijlstra wrote: > > > On Mon, Feb 10, 2020 at 05:06:43PM -0500, Steven Rostedt wrote: > > > + if (!rcu_watching) { \ > > > + /* Can not use RCU if rcu is not watching and in NMI */ \ > > > + if (in_nmi()) \ > > > + return; \ > > > + rcu_irq_enter_irqson(); \ > > > + } \ > > > > I saw the same weirdness in __trace_stack(), and I'm confused by it. > > > > How can we ever get to: in_nmi() && !rcu_watching() ? That should be a > > BUG. In particular, nmi_enter() has rcu_nmi_enter(). > > > > Paul, can that really happen? > > The stack tracer connects to the function tracer and is called at all > the places that function tracing can be called from. As I like being > able to trace RCU internal functions (especially as they are complex), > I don't want to set them all to notrace. But, for callbacks that > require RCU to be watching, we need this check, because there's some > internal state that we can be in an NMI and RCU is not watching (as > there's some places in nmi_enter that can be traced!). > > And if we are tracing preempt_enable and preempt_disable (as Joel added > trace events there), it may be the case for trace events too. Bloody hell; what a trainwreck. Luckily there's comments around that explain this! So we haz: | #define nmi_enter() \ | do { \ | arch_nmi_enter(); \ arm64 only, lets ignore for now | printk_nmi_enter(); \ notrace | lockdep_off(); \ notrace | ftrace_nmi_enter(); \ !notrace !!! | BUG_ON(in_nmi()); \ | preempt_count_add(NMI_OFFSET + HARDIRQ_OFFSET);\ lets make this __preempt_count_add() ASAP ! | rcu_nmi_enter(); \ are you _really_ sure you want to go trace that ?!? | trace_hardirq_enter(); \ | } while (0)