Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp224079pxa; Tue, 11 Aug 2020 00:59:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJ3gDbmAGn+ylOvkOkc/ijvouagBJN0DMs8X31AGXeBlmzhOGXwJ2xaRsZzDQx9TgMTdSG X-Received: by 2002:a50:e0cf:: with SMTP id j15mr9898067edl.285.1597132754887; Tue, 11 Aug 2020 00:59:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597132754; cv=none; d=google.com; s=arc-20160816; b=rhp0ZKDjD21MKZ/JqhLUMh2Npc8nzUjtDiY1H77q0r9B95iaUPF6WqPjVs9S1nOcC9 eg3A87pBwtnN3QEAfCN6LkNAiGuhQS+qXDZ6Bjg+W58Pu+QDLlbJiKhbYM0XYvCxLxhK VMxSxnAh5lhhuVLK9EXRUJ4JWbQjmK/XyBJYNNJ1poSF0OFqu+l4WQAO6eKzrynmNtza VuIM1a6V8JdcRYpxs3DJybkhdSo7SBpb4A9NmDSrd9nuf/+P0n2loHjQaZ9Vhvor3BHj 0DjgqcITWbivvpBeBKiNZ0ynOqp+z2LDLUciZV6xgsRNT7OjaTwQiwO7l5a8p9avkMd+ J+mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=5sX/HjEDp2d9Meg+CTnFToKT/7T2d0OShMy8iRaooHY=; b=Wa9vcI4bMykXSw7dEJrZ6OZSvayk3adOpX2H7Jv9jz/To13yHH64abFhty8lD5tMKS 1OUZ/Cs7xsP+pTUqw4gaxS8AO6HnHafZX8ddLYvoGudt/onrGggQu7TzloRK4MlUdHzD Oy6QxEOyIGMT2l5QXb+DRdGndSD8TNL5p2Rr9a/8NLc2AnjOugLjb9QE5wd8Nq8fCK1S u/wkWB/JF+7MdGlSynKS/SFijJoUOsHviOySHZ497J2g1ChxYgScxB14YYQkaWvXPAUc GFsmCrIuxSjGGYwNWI0JDWCyb9x181GuOA08ix3jXPIw9hglhTPNpQg0gOuJy2DjJ+Xf lpLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b23si12584484ejv.299.2020.08.11.00.58.51; Tue, 11 Aug 2020 00:59:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728204AbgHKH56 (ORCPT + 99 others); Tue, 11 Aug 2020 03:57:58 -0400 Received: from mx2.suse.de ([195.135.220.15]:59600 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726397AbgHKH56 (ORCPT ); Tue, 11 Aug 2020 03:57:58 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 66B9BAB9F; Tue, 11 Aug 2020 07:58:17 +0000 (UTC) Subject: Re: [PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers To: Peter Zijlstra , Marco Elver Cc: Borislav Petkov , Dave Hansen , fenghua.yu@intel.com, "H. Peter Anvin" , LKML , Ingo Molnar , syzkaller-bugs , Thomas Gleixner , "Luck, Tony" , the arch/x86 maintainers , yu-cheng.yu@intel.com, sdeep@vmware.com, virtualization@lists.linux-foundation.org, kasan-dev , syzbot , "Paul E. McKenney" , Wei Liu References: <20200806131702.GA3029162@elver.google.com> <20200807095032.GA3528289@elver.google.com> <16671cf3-3885-eb06-79ff-4cbfaeeaea79@suse.com> <20200807113838.GA3547125@elver.google.com> <20200807151903.GA1263469@elver.google.com> <20200811074127.GR3982@worktop.programming.kicks-ass.net> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: Date: Tue, 11 Aug 2020 09:57:55 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200811074127.GR3982@worktop.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11.08.20 09:41, Peter Zijlstra wrote: > On Fri, Aug 07, 2020 at 05:19:03PM +0200, Marco Elver wrote: > >> My hypothesis here is simply that kvm_wait() may be called in a place >> where we get the same case I mentioned to Peter, >> >> raw_local_irq_save(); /* or other IRQs off without tracing */ >> ... >> kvm_wait() /* IRQ state tracing gets confused */ >> ... >> raw_local_irq_restore(); >> >> and therefore, using raw variants in kvm_wait() works. It's also safe >> because it doesn't call any other libraries that would result in corrupt > > Yes, this is definitely an issue. > > Tracing, we also musn't call into tracing when using raw_local_irq_*(). > Because then we re-intoduce this same issue all over again. > > Both halt() and safe_halt() are more paravirt calls, but given we're in > a KVM paravirt call already, I suppose we can directly use native_*() > here. > > Something like so then... I suppose, but then the Xen variants need TLC > too. Just to be sure I understand you correct: You mean that xen_qlock_kick() and xen_qlock_wait() and all functions called by those should gain the "notrace" attribute, right? I am not sure why the kick variants need it, though. IMO those are called only after the lock has been released, so they should be fine without notrace. And again: we shouldn't forget the Hyper-V variants. Juergen