Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp235794pxa; Tue, 11 Aug 2020 01:20:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy1Hn6aGJr7xrq7RaP4zyR5zTiT+HKnFOjaErMXtb9VuV7KwKkSmhKKLx01CS0HM6edfeLz X-Received: by 2002:a17:906:16c8:: with SMTP id t8mr24789383ejd.484.1597134010053; Tue, 11 Aug 2020 01:20:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597134010; cv=none; d=google.com; s=arc-20160816; b=B8czqFyivAsqLIHLZQveyJaYaB6FlbSloieLJYY3USm86EV9bm04vIDrx4vzgOSZ2C +A7yOoSqtM0THIz2iboYon3ajeBp8AWos/xgQFqmTVaJG+KFgsO6R0n/BWaecAziqa9f JZ/ioNuwOWLEtrRJOVr0DQ0tZcqbSm95U4wUkmIbA0s62BNV1z6N2E3E4uTvUZsysq9O 7TLW6JM/K5IxN+JjVj5UWZiDwpmpHb8B80LgAlBpqjHv92jTt75d7cOC0q3ijlnz+DTM x8TcBRBFrPGUBg0uwW07HXUl886iCX7pW6OWVOK/JppbFZMhYoKNqBIT0T7Wg8s/7n7b 0pcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=RScswWnw/qNlvSa8Xz67HdiMzgQxG00qnyCN/ffkGEo=; b=a/cJwOosN7T1aMaJ1FsPZiy70mYW933S2U6EILuPVMkzXZno6xV62uL01arGObPKj/ Vit6RYHCopmOyYI5DO70nMYpx7tuBGFHFA/fr7EURw7B2Zmq9CDggKDie6ihg49JBbK7 YXCTDIoa4G68O7KvoZ0nRMiQ9Zt3HwVog7nAdGJZ/4jx6vo5Krsm3VVym0i0uZL5HzHV PHmjdPUDyRohC5ncMvCCvUg9yDT1vNL6PeM679rxlE1obIv/8g3NZz6ewgOn+XlEBGlg rOgXTYdYr1WLUTTQski1bA8KMAZJNY3Ddqxsn0v/zPxCODL0lcMaMUv+MPtcgBialdDa ddqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lh27si12659309ejb.545.2020.08.11.01.19.45; Tue, 11 Aug 2020 01:20:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728254AbgHKISx (ORCPT + 99 others); Tue, 11 Aug 2020 04:18:53 -0400 Received: from mx2.suse.de ([195.135.220.15]:48810 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728000AbgHKISx (ORCPT ); Tue, 11 Aug 2020 04:18:53 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id A84E9AB8B; Tue, 11 Aug 2020 08:19:12 +0000 (UTC) Subject: Re: [PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers To: Peter Zijlstra Cc: Marco Elver , Borislav Petkov , Dave Hansen , fenghua.yu@intel.com, "H. Peter Anvin" , LKML , Ingo Molnar , syzkaller-bugs , Thomas Gleixner , "Luck, Tony" , the arch/x86 maintainers , yu-cheng.yu@intel.com, sdeep@vmware.com, virtualization@lists.linux-foundation.org, kasan-dev , syzbot , "Paul E. McKenney" , Wei Liu References: <20200807095032.GA3528289@elver.google.com> <16671cf3-3885-eb06-79ff-4cbfaeeaea79@suse.com> <20200807113838.GA3547125@elver.google.com> <20200807151903.GA1263469@elver.google.com> <20200811074127.GR3982@worktop.programming.kicks-ass.net> <20200811081205.GV3982@worktop.programming.kicks-ass.net> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: Date: Tue, 11 Aug 2020 10:18:51 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200811081205.GV3982@worktop.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11.08.20 10:12, Peter Zijlstra wrote: > On Tue, Aug 11, 2020 at 09:57:55AM +0200, Jürgen Groß wrote: >> On 11.08.20 09:41, Peter Zijlstra wrote: >>> On Fri, Aug 07, 2020 at 05:19:03PM +0200, Marco Elver wrote: >>> >>>> My hypothesis here is simply that kvm_wait() may be called in a place >>>> where we get the same case I mentioned to Peter, >>>> >>>> raw_local_irq_save(); /* or other IRQs off without tracing */ >>>> ... >>>> kvm_wait() /* IRQ state tracing gets confused */ >>>> ... >>>> raw_local_irq_restore(); >>>> >>>> and therefore, using raw variants in kvm_wait() works. It's also safe >>>> because it doesn't call any other libraries that would result in corrupt >>> >>> Yes, this is definitely an issue. >>> >>> Tracing, we also musn't call into tracing when using raw_local_irq_*(). >>> Because then we re-intoduce this same issue all over again. >>> >>> Both halt() and safe_halt() are more paravirt calls, but given we're in >>> a KVM paravirt call already, I suppose we can directly use native_*() >>> here. >>> >>> Something like so then... I suppose, but then the Xen variants need TLC >>> too. >> >> Just to be sure I understand you correct: >> >> You mean that xen_qlock_kick() and xen_qlock_wait() and all functions >> called by those should gain the "notrace" attribute, right? >> >> I am not sure why the kick variants need it, though. IMO those are >> called only after the lock has been released, so they should be fine >> without notrace. > > The issue happens when someone uses arch_spinlock_t under > raw_local_irq_*(). Ah, okay. > >> And again: we shouldn't forget the Hyper-V variants. > > Bah, my grep failed :/ Also *groan*, that's calling apic->send_IPI(). I've seen that, too. :-( Juergen