Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp514517pxx; Thu, 29 Oct 2020 07:58:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx53wPGIrNK9xnUkFNK2tfNOH9JDp5jVwjZgJTRdKm7lvuC+O75rNlXkF/yZLi3YNHZOexp X-Received: by 2002:aa7:d6da:: with SMTP id x26mr4366050edr.238.1603983539172; Thu, 29 Oct 2020 07:58:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603983539; cv=none; d=google.com; s=arc-20160816; b=V2y7eS/ROBqIBnN6g8gbPEWCr34A2BGFN5q6/3spk8lNZHrX3beZ73IU81zgxc0jb0 Q6jRlGA0aSLXQVxkiXfLzC9Bl/TyyndkY4t7ewOR8UPnhopKzmcME52GZsNJVcDVI8xZ 8JrV44e4JiQfy776sSaTSwcMKGmBy8u9GoC88EUfJ66KBm4VVIkTToZIEPjHv4NDeKNu Vqk+SWELpMOjpkX6GCl7FfCG4KTH5ewFhDJenkZr969wgEJeSon2yaNKzZwL+XjCqJZ6 9mOeFLTEaJUDYSgh0YYS0upciKkPYAt4bqmIhA7m9GSc+AsqNOE+iJI6yA28GeLBlJe2 MRdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Lwjs+ocL4Ev242Vvws/Q1Lnz8655ApXTA1gsWoI4YJY=; b=bxBvNGlUBqP2XO5fsI8ewfMy9ulSekLMWtWqmGaNI6tqK19IVmGNnClJSiLeMCsFVp 0lhvB4tziiTMDFdPfZMEj1k2lsylajCbwdAFA2Y27fSr/FJ/UT9hSaiHVLlJ+3wzpaNd bIDHLiK2gx20GKAaFoXxJzu8oN8U8eoIqopz38+qn+I4Bwb+d4NFr5DT1E6iuK5ZJGvf 89LRpCoYcIpXOB9Hal8NqehBnYbimxzohnOeNh+Z077SYLOI7yKWrlh+cEqEI3U97X2w NZ5sUiXrcpeKBkXAIccG+R/8ZBfSnbY67bZIB2ob+Tb8l1NvK9aIgR8T2PJrjXLGW8er jtbQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=V3xKyyWg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y1si2076906edp.57.2020.10.29.07.58.36; Thu, 29 Oct 2020 07:58:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=V3xKyyWg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727856AbgJ2O5M (ORCPT + 99 others); Thu, 29 Oct 2020 10:57:12 -0400 Received: from mx2.suse.de ([195.135.220.15]:45938 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725782AbgJ2O5M (ORCPT ); Thu, 29 Oct 2020 10:57:12 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1603983429; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Lwjs+ocL4Ev242Vvws/Q1Lnz8655ApXTA1gsWoI4YJY=; b=V3xKyyWgg0uKVMNoMnGoHO+FB1D0oVoAOzPEvn9xNzc7sksJnJQ16zE2g7lKf/djmPB/b1 phRKkQLz6r2pzOQaNK6dRqEvs7u6GCggNE8FiggTkLfTTj22NrwGPoQ7CtW+hzOBDQA/x6 kScYj+i4F/AY62eEVpkNjoDsyDpQ8U8= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id C12EBB117; Thu, 29 Oct 2020 14:57:09 +0000 (UTC) Date: Thu, 29 Oct 2020 15:57:09 +0100 From: Petr Mladek To: Miroslav Benes Cc: Steven Rostedt , linux-kernel@vger.kernel.org, Masami Hiramatsu , Andrew Morton , Josh Poimboeuf , Jiri Kosina , Joe Lawrence , live-patching@vger.kernel.org Subject: Re: [PATCH 6/9] livepatch/ftrace: Add recursion protection to the ftrace callback Message-ID: <20201029145709.GD16774@alley> References: <20201028115244.995788961@goodmis.org> <20201028115613.291169246@goodmis.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 2020-10-29 14:51:06, Miroslav Benes wrote: > On Wed, 28 Oct 2020, Steven Rostedt wrote: > > > From: "Steven Rostedt (VMware)" > > > > If a ftrace callback does not supply its own recursion protection and > > does not set the RECURSION_SAFE flag in its ftrace_ops, then ftrace will > > make a helper trampoline to do so before calling the callback instead of > > just calling the callback directly. > > > > The default for ftrace_ops is going to assume recursion protection unless > > otherwise specified. It might be my lack skills to read English. But the above sentence sounds ambiguous to me. It is not clear to me who provides the recursion protection by default. Could you please make it more explicit, for example by: "The default for ftrace_ops is going to change. It will expect that handlers provide their own recursion protection." > Hm, I've always thought that we did not need any kind of recursion > protection for our callback. It is marked as notrace and it does not call > anything traceable. In fact, it does not call anything. I even have a note > in my todo list to mark the callback as RECURSION_SAFE :) Well, it calls WARN_ON_ONCE() ;-) > At the same time, it probably does not hurt and the patch is still better > than what we have now without RECURSION_SAFE if I understand the patch set > correctly. And better be on the safe side. > > Cc: Josh Poimboeuf > > Cc: Jiri Kosina > > Cc: Miroslav Benes > > Cc: Petr Mladek > > Cc: Joe Lawrence > > Cc: live-patching@vger.kernel.org > > Signed-off-by: Steven Rostedt (VMware) > > --- > > kernel/livepatch/patch.c | 5 +++++ > > 1 file changed, 5 insertions(+) > > > > diff --git a/kernel/livepatch/patch.c b/kernel/livepatch/patch.c > > index b552cf2d85f8..6c0164d24bbd 100644 > > --- a/kernel/livepatch/patch.c > > +++ b/kernel/livepatch/patch.c > > @@ -45,9 +45,13 @@ static void notrace klp_ftrace_handler(unsigned long ip, > > struct klp_ops *ops; > > struct klp_func *func; > > int patch_state; > > + int bit; > > > > ops = container_of(fops, struct klp_ops, fops); > > > > + bit = ftrace_test_recursion_trylock(); > > + if (bit < 0) > > + return; > > This means that the original function will be called in case of recursion. > That's probably fair, but I'm wondering if we should at least WARN about > it. Yeah, the early return might break the consistency model and unexpected things might happen. We should be aware of it. Please use: if (WARN_ON_ONCE(bit < 0)) return; WARN_ON_ONCE() might be part of the recursion. But it should happen only once. IMHO, it is worth the risk. Otherwise it looks good. Best Regards, Petr