Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp520193pxx; Thu, 29 Oct 2020 08:05:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWy+KncSVG1+K17SzIw3a1Yq3uCyOaV5xSpgQlHgiuAX3/r3R7RezgPiPs8PkxWyjHGB4K X-Received: by 2002:a17:906:a4b:: with SMTP id x11mr4631613ejf.11.1603983913244; Thu, 29 Oct 2020 08:05:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603983913; cv=none; d=google.com; s=arc-20160816; b=tEkcI6Qp4R6Tio2kcj7PPWJkKnklqwvNjfZNH/Qhb5wl9LwBLjV9rKQDN/REd/bMSP i+PYEcfkjJlA5Dmz7A4wSFCHA4/Q6LiOqC4sVvgNcw4x06Elc614OVautiJAeLRdmU9t ll27d0a3i3oXCa4CZH8iEORvcCzcbCIgpUN/pDUJubsc7zEWuJlUrnwlRuQGYHnnqy/5 uCLRJmLKmfMBopbkZfdyKi/aDkjUBgjjr/JcYJtB7+h/Rk2Cggg2YaejwhKjqMqRjDny UoAqov+SaZjI0kymNKk1wZRaTy9WJ0AwMgLjblgDwJgpSFrP8oTT2LgiCnv0q20lONmI L19Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date; bh=jGdz5TmxapEoEthR9J/5EhGRLyiYw/DmDdH8ykHnI5M=; b=hjVmjyDVmAjBbN0RWQ7/Gc0kKtPRyvO+XzFSdXmTO5KZrVCCKR/I7aF8zaYYno7ToE FsEfzyZCv1aso+BX2ZzQsmMKBaGSo+1jgcjWbOpRj61xfeNITyuWY/1GvrYlNMU8RL37 dNTUIEN2Z/k30AChwCETGIYR9K826eXTH2rnDNrYWqEIbo6Bjjzixhk+QvX5TtEUqUEW QslL4BnOeTYA4VwQS2qH4DkcuLcmZF9xrBgQCNB9oKAB6cdqoBjUYEtAwEvDtbC90DlC Sjfl7sVS5zoAp1V8/waJnG/n+A2wRbHPT/LeRzJ7J3beYDhoQU//rdJCxW8XBoXjJtL/ G24A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ga30si1976682ejc.174.2020.10.29.08.04.43; Thu, 29 Oct 2020 08:05:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727919AbgJ2PDN (ORCPT + 99 others); Thu, 29 Oct 2020 11:03:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:51376 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727836AbgJ2PDN (ORCPT ); Thu, 29 Oct 2020 11:03:13 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id C9D1CAF0C; Thu, 29 Oct 2020 15:03:11 +0000 (UTC) Date: Thu, 29 Oct 2020 16:03:09 +0100 (CET) From: Miroslav Benes To: Petr Mladek cc: Steven Rostedt , linux-kernel@vger.kernel.org, Masami Hiramatsu , Andrew Morton , Josh Poimboeuf , Jiri Kosina , Joe Lawrence , live-patching@vger.kernel.org Subject: Re: [PATCH 6/9] livepatch/ftrace: Add recursion protection to the ftrace callback In-Reply-To: <20201029145709.GD16774@alley> Message-ID: References: <20201028115244.995788961@goodmis.org> <20201028115613.291169246@goodmis.org> <20201029145709.GD16774@alley> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 29 Oct 2020, Petr Mladek wrote: > On Thu 2020-10-29 14:51:06, Miroslav Benes wrote: > > On Wed, 28 Oct 2020, Steven Rostedt wrote: > > > Hm, I've always thought that we did not need any kind of recursion > > protection for our callback. It is marked as notrace and it does not call > > anything traceable. In fact, it does not call anything. I even have a note > > in my todo list to mark the callback as RECURSION_SAFE :) > > Well, it calls WARN_ON_ONCE() ;-) Oh my, I learned to ignore these. Of course there is printk hidden everywhere. > > At the same time, it probably does not hurt and the patch is still better > > than what we have now without RECURSION_SAFE if I understand the patch set > > correctly. > > And better be on the safe side. Agreed. > > > Cc: Josh Poimboeuf > > > Cc: Jiri Kosina > > > Cc: Miroslav Benes > > > Cc: Petr Mladek > > > Cc: Joe Lawrence > > > Cc: live-patching@vger.kernel.org > > > Signed-off-by: Steven Rostedt (VMware) > > > --- > > > kernel/livepatch/patch.c | 5 +++++ > > > 1 file changed, 5 insertions(+) > > > > > > diff --git a/kernel/livepatch/patch.c b/kernel/livepatch/patch.c > > > index b552cf2d85f8..6c0164d24bbd 100644 > > > --- a/kernel/livepatch/patch.c > > > +++ b/kernel/livepatch/patch.c > > > @@ -45,9 +45,13 @@ static void notrace klp_ftrace_handler(unsigned long ip, > > > struct klp_ops *ops; > > > struct klp_func *func; > > > int patch_state; > > > + int bit; > > > > > > ops = container_of(fops, struct klp_ops, fops); > > > > > > + bit = ftrace_test_recursion_trylock(); > > > + if (bit < 0) > > > + return; > > > > This means that the original function will be called in case of recursion. > > That's probably fair, but I'm wondering if we should at least WARN about > > it. > > Yeah, the early return might break the consistency model and > unexpected things might happen. We should be aware of it. > Please use: > > if (WARN_ON_ONCE(bit < 0)) > return; > > WARN_ON_ONCE() might be part of the recursion. But it should happen > only once. IMHO, it is worth the risk. Agreed. Miroslav