Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp347414pxb; Fri, 15 Oct 2021 06:45:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJybn0xRxPnLUNSNX1oSgbXoZIUY/IrI7O+DNVeCoatIJ1uk4Eq3pEldnU5jTY0q+VDpgQPW X-Received: by 2002:a17:906:ae54:: with SMTP id lf20mr6832531ejb.195.1634305513009; Fri, 15 Oct 2021 06:45:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634305513; cv=none; d=google.com; s=arc-20160816; b=kgL5dHjX8ozcT1BjM+7a8ewN2zvKemGeGJNfuyZaxLZFppJCjcYvcP+HNnNg53HZIy AwmpUOORO8G6tajTGJCWz9nYTpTrOgerJKaFqttkrnUM1sjLNEHorXY5T4ym9WQP5bEK 0WGyWVOz4XRG7fL0z3QUsTOP6tQlPXxhJMXc/6mX1b62T2R5zzwmte6DgyRl018bl1ch GjwgeiwYNdIjTlLRu17JPa1+44JNCHL4z8iSGtNVRiAlbBbqetP1Rbw3FZ3ZOh02iqe7 RBPmQPd7j2mSJOUWKeHyjRRiY3J6HFFwmJPUmidaZCLJSI6i9szv0829j0U96ROEGPaY eDOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=ajbOHu+rClKJMCVN9IOrg9A779y/UiP4OhkzJFOjSQ0=; b=N+bcHyg3rpwHvYP2opV7BOFs8aFOOPAP5D27T/6mVCu9XVnEJIpxJmknylI9mpytRn zfKyDfsQAetCbDHdcxbbbtZwYyxzqBIfvJKuwHkG237fL7IKNb7IoxGahouUh1nVbWDy 8Lw8InNn7YnaSowzLqPFRS8gpSW6/RfaW3jdyImgIHp7Pfv9xE8R7/cUIfW/96V/8Ck/ 2q4lYlQPrV9KsWMK3kVwUiZQZMBYN8Mg2Vt5UsKjpOCngv/7UrAIqO8JWqvkzwMoyj+4 spIMDitebGQXEKDqVnjkIBKedG0LbRDiiJSUV+79l8FYyhvRD4bUqwGm8XaEjv6lQPz8 +sjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=Kgq5rJkd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j19si7060807edp.498.2021.10.15.06.44.27; Fri, 15 Oct 2021 06:45:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=Kgq5rJkd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236085AbhJOHbN (ORCPT + 99 others); Fri, 15 Oct 2021 03:31:13 -0400 Received: from smtp-out1.suse.de ([195.135.220.28]:35324 "EHLO smtp-out1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234654AbhJOHbK (ORCPT ); Fri, 15 Oct 2021 03:31:10 -0400 Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 8F2FE21A5F; Fri, 15 Oct 2021 07:29:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1634282942; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ajbOHu+rClKJMCVN9IOrg9A779y/UiP4OhkzJFOjSQ0=; b=Kgq5rJkdVrVP4IDhfsKBOlKRbJj/ElwH9MtJu3TB/6DSQyKaBrnGTAZEUIHTm9Wg9/R9yP gS+2GjVcOOgJ8gcQFMUqXpN0t0LxD5W1VSXuJRJZSg5ELwNykVEIFOvyYognnuQg7wAlZK xUQAgCSdgE9t8+fHmbr613MI5spEt8o= Received: from suse.cz (unknown [10.100.224.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id 7FDD2A3B84; Fri, 15 Oct 2021 07:29:01 +0000 (UTC) Date: Fri, 15 Oct 2021 09:28:58 +0200 From: Petr Mladek To: =?utf-8?B?546L6LSH?= Cc: Guo Ren , Steven Rostedt , Ingo Molnar , "James E.J. Bottomley" , Helge Deller , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Paul Walmsley , Palmer Dabbelt , Albert Ou , Thomas Gleixner , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , Josh Poimboeuf , Jiri Kosina , Miroslav Benes , Joe Lawrence , Colin Ian King , Masami Hiramatsu , "Peter Zijlstra (Intel)" , Nicholas Piggin , Jisheng Zhang , linux-csky@vger.kernel.org, linux-kernel@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, live-patching@vger.kernel.org Subject: Re: [PATCH v3 1/2] ftrace: disable preemption between ftrace_test_recursion_trylock/unlock() Message-ID: References: <609b565a-ed6e-a1da-f025-166691b5d994@linux.alibaba.com> <7e4738b5-21d4-c4d0-3136-a096bbb5cd2c@linux.alibaba.com> <5e907ed3-806b-b0e5-518d-d2f3b265377f@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <5e907ed3-806b-b0e5-518d-d2f3b265377f@linux.alibaba.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 2021-10-15 11:13:08, ηŽ‹θ΄‡ wrote: > > > On 2021/10/14 δΈ‹εˆ11:14, Petr Mladek wrote: > [snip] > >> - return trace_test_and_set_recursion(ip, parent_ip, TRACE_FTRACE_START, TRACE_FTRACE_MAX); > >> + int bit; > >> + > >> + bit = trace_test_and_set_recursion(ip, parent_ip, TRACE_FTRACE_START, TRACE_FTRACE_MAX); > >> + /* > >> + * The zero bit indicate we are nested > >> + * in another trylock(), which means the > >> + * preemption already disabled. > >> + */ > >> + if (bit > 0) > >> + preempt_disable_notrace(); > > > > Is this safe? The preemption is disabled only when > > trace_test_and_set_recursion() was called by ftrace_test_recursion_trylock(). > > > > We must either always disable the preemtion when bit >= 0. > > Or we have to disable the preemtion already in > > trace_test_and_set_recursion(). > > Internal calling of trace_test_and_set_recursion() will disable preemption > on succeed, it should be safe. trace_test_and_set_recursion() does _not_ disable preemtion! It works only because all callers disable the preemption. It means that the comment is wrong. It is not guarantted that the preemption will be disabled. It works only by chance. > We can also consider move the logical into trace_test_and_set_recursion() > and trace_clear_recursion(), but I'm not very sure about that... ftrace > internally already make sure preemption disabled How? Because it calls trace_test_and_set_recursion() via the trylock() API? > , what uncovered is those users who call API trylock/unlock, isn't > it? And this is exactly the problem. trace_test_and_set_recursion() is in a public header. Anyone could use it. And if anyone uses it in the future without the trylock() and does not disable the preemtion explicitely then we are lost again. And it is even more dangerous. The original code disabled the preemtion on various layers. As a result, the preemtion was disabled several times for sure. It means that the deeper layers were always on the safe side. With this patch, if the first trace_test_and_set_recursion() caller does not disable preemtion then trylock() will not disable it either and the entire code is procceed with preemtion enabled. > > Finally, the comment confused me a lot. The difference between nesting and > > recursion is far from clear. And the code is tricky liky like hell :-) > > I propose to add some comments, see below for a proposal. > The comments do confusing, I'll make it something like: > > The zero bit indicate trace recursion happened, whatever > the recursively call was made by ftrace handler or ftrace > itself, the preemption already disabled. I am sorry but it is still confusing. We need to find a better way how to clearly explain the difference between the safe and unsafe recursion. My understanding is that the recursion is: + "unsafe" when the trace code recursively enters the same trace point. + "safe" when ftrace_test_recursion_trylock() is called recursivelly while still processing the same trace entry. > >> + > >> + return bit; > >> } > >> /** > >> @@ -222,9 +233,13 @@ static __always_inline int ftrace_test_recursion_trylock(unsigned long ip, > >> * @bit: The return of a successful ftrace_test_recursion_trylock() > >> * > >> * This is used at the end of a ftrace callback. > >> + * > >> + * Preemption will be enabled (if it was previously enabled). > >> */ > >> static __always_inline void ftrace_test_recursion_unlock(int bit) > >> { > >> + if (bit) > > > > This is not symetric with trylock(). It should be: > > > > if (bit > 0) > > > > Anyway, trace_clear_recursion() quiently ignores bit != 0 > > Yes, bit == 0 should not happen in here. Yes, it "should" not happen. My point is that we could make the API more safe. We could do the right thing when ftrace_test_recursion_unlock() is called with negative @bit. Ideally, we should also warn about the mis-use. Anyway, let's wait for Steven. It seems that he found another problem with the API that should be solved first. The fix will probably also help to better understand the "safe" vs "unsafe" recursion. Best Regards, Petr