Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp465167pxx; Thu, 29 Oct 2020 06:52:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyruH1vA9ESxj6cnVrzTNZwHAvL+1bQxtwun5axl6qfufQXbXFgchIcQqJC7+SGL9ixF06h X-Received: by 2002:a05:6402:141:: with SMTP id s1mr3941935edu.87.1603979577712; Thu, 29 Oct 2020 06:52:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603979577; cv=none; d=google.com; s=arc-20160816; b=tkrz9s+k/oHxWe53pKtbnfMmqT4/NxOmXhaHwiYQRaHuVImrpSzv2extXeGmRGB1kU oWY2SS+Q/c/+PfG72kwQBlPaM4/qlb/+RnUCSmfjTCsKT3uFapeqDJtyCA4KDzzCHvad b5t/u+wawWahF14nMeDJvslQSHE9wh959pseWS9tdWBPNkcMbRON8Z7MA7IJV8jITPsE iqoJlOKKacS3ZTQwdjdEinabVnQBcrROw87tjIsxSjBWvo75JgiergW/KUU1oEhO0Owq LFS9eScGVf5npuGQL/xyhPKDCRSa65TiRjLT0x9qCn1Z+fANFVprnT3CkOyS2bFouM54 mxxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date; bh=qrLeQ0PqThMMcMCvFJovfHJUmqHmYsmyvuBkM8Z+l4I=; b=KTqhpKIMOO18l3iq66qFNKVdvLQ3wvybMMur2FCHPzRinAVRnOOHEAQ2gLUP2Mzwvs 8VPuk6x5j1y/oxErugnsbt5qbNL8Hn72YLgfu+nA0jpeLQmyFusJhxUv8JdtOJXJ1sab 9bnK5kTQdSHZFUbOG6coD8HUdlUbxVcTFcihXfuIhsfD2w0iMO8X6BPyxchF/ibi2Bc8 epraGibY/QjGdrHnZ0x1FOGz9+1r7Urv+lDDoo6tGErbonEEGYmCCkP3cImavI7KbLdW 0/PZiOXSDakPTl5HZ7eT5RMR98s/SakkdiULvafRnwPvkne+d/+VKxRJFEVfPmYx5hay 9vHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r14si1226931ejx.734.2020.10.29.06.52.34; Thu, 29 Oct 2020 06:52:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727529AbgJ2NvO (ORCPT + 99 others); Thu, 29 Oct 2020 09:51:14 -0400 Received: from mx2.suse.de ([195.135.220.15]:42434 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726729AbgJ2NvO (ORCPT ); Thu, 29 Oct 2020 09:51:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 08F11B921; Thu, 29 Oct 2020 13:51:12 +0000 (UTC) Date: Thu, 29 Oct 2020 14:51:06 +0100 (CET) From: Miroslav Benes To: Steven Rostedt cc: linux-kernel@vger.kernel.org, Masami Hiramatsu , Andrew Morton , Josh Poimboeuf , Jiri Kosina , Petr Mladek , Joe Lawrence , live-patching@vger.kernel.org Subject: Re: [PATCH 6/9] livepatch/ftrace: Add recursion protection to the ftrace callback In-Reply-To: <20201028115613.291169246@goodmis.org> Message-ID: References: <20201028115244.995788961@goodmis.org> <20201028115613.291169246@goodmis.org> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 28 Oct 2020, Steven Rostedt wrote: > From: "Steven Rostedt (VMware)" > > If a ftrace callback does not supply its own recursion protection and > does not set the RECURSION_SAFE flag in its ftrace_ops, then ftrace will > make a helper trampoline to do so before calling the callback instead of > just calling the callback directly. > > The default for ftrace_ops is going to assume recursion protection unless > otherwise specified. Hm, I've always thought that we did not need any kind of recursion protection for our callback. It is marked as notrace and it does not call anything traceable. In fact, it does not call anything. I even have a note in my todo list to mark the callback as RECURSION_SAFE :) At the same time, it probably does not hurt and the patch is still better than what we have now without RECURSION_SAFE if I understand the patch set correctly. > Cc: Josh Poimboeuf > Cc: Jiri Kosina > Cc: Miroslav Benes > Cc: Petr Mladek > Cc: Joe Lawrence > Cc: live-patching@vger.kernel.org > Signed-off-by: Steven Rostedt (VMware) > --- > kernel/livepatch/patch.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/kernel/livepatch/patch.c b/kernel/livepatch/patch.c > index b552cf2d85f8..6c0164d24bbd 100644 > --- a/kernel/livepatch/patch.c > +++ b/kernel/livepatch/patch.c > @@ -45,9 +45,13 @@ static void notrace klp_ftrace_handler(unsigned long ip, > struct klp_ops *ops; > struct klp_func *func; > int patch_state; > + int bit; > > ops = container_of(fops, struct klp_ops, fops); > > + bit = ftrace_test_recursion_trylock(); > + if (bit < 0) > + return; This means that the original function will be called in case of recursion. That's probably fair, but I'm wondering if we should at least WARN about it. Thanks Miroslav