Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp49190iob; Tue, 3 May 2022 11:22:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQQphteMiaMtBdg5WSITm3gRwWT/i734F2wcLUTaQxxLprKDKLWhSFJAvRkS9gQbv68dz2 X-Received: by 2002:a05:6402:2706:b0:426:389b:a8e3 with SMTP id y6-20020a056402270600b00426389ba8e3mr19167028edd.413.1651602142166; Tue, 03 May 2022 11:22:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651602142; cv=none; d=google.com; s=arc-20160816; b=VI2lvm+7lPxU90BIZKUEabj/skEY7O79otFpiu4/+0k4md9WD5SigUNry6TDc4xhc+ RQxNfVODZGDkv3Egh7Py+XcIXkihR912ZaKQtIIJYTeneKiUCBtUl6ar+gloSKLpzi9C qJqZ8HMTApP9xgRoaNXFdsCPij5ZnGt33tFzZ8NyOHiG3d+F3knXjqRzP26nnh4OH8rX lqO/58GxwRiV9Libil0TF8VM5T6M+CvtKE8lNdt9wXGaSsmf6PlBuqjCiVco5+Hn0kTl C+oMTBTFc3plV0Pr3Ba0wgBtypx3JEXE6+XUeXD7SvW6P28TMyaHu5pnSYSMoA7mY/6i PX0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=PtjjlgyNQKmaTfWk+6+pxnV57I1w7MnR27Snmbuq9i4=; b=C+ltGub7iYB9fxO8D93VExkELb44jFqOFa3w1xP1EZxlrLB7ghu97AyyA0B5ac+oxN CB+y4L+5be5wdAqXsccMOezcQyAZKh/wx9gk7OtPcvHGR3+jJOijtdRHhd5K98xSpxkl SkAZrpiVADWMLeq+r+vqFg02sgFb+5HmZi7lFKAweVZ7VMAnmKPjrKcg3CJIpLl79g8B QD9a0gZa0ll//q9EUasljWTAnQ5Ir7IsvwSxT6lLFlArWH4OLACLL17BQYXCENx6VKgm agJquoyvvCNAP0c3pOafdangCAOdxnMDb1EY1xUUyrInBidfYKXDIY797i6putYc2XLC NwGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fPa1gBwH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r9-20020a05640251c900b00427e1b17847si2161609edd.202.2022.05.03.11.21.28; Tue, 03 May 2022 11:22:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fPa1gBwH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234029AbiECKFG (ORCPT + 99 others); Tue, 3 May 2022 06:05:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234005AbiECKE6 (ORCPT ); Tue, 3 May 2022 06:04:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4DB6937A83 for ; Tue, 3 May 2022 03:01:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6332A614A7 for ; Tue, 3 May 2022 10:01:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B6BBAC385B1; Tue, 3 May 2022 10:01:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651572077; bh=uGn4/MomNIQOvt1kVzK6g2/4eo2NkPnsPiqsExJKXrY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fPa1gBwHddN2GTHFmzaXKJTfNGwuYoqQq2uQH2mQ+zjFGoiGJb6jUM/+g3HRamuBi W+N9XW4ooBhF1D8h6t/Lc84wDIgNxH0nkOlQ34GMzJ5qPF13PNWLfUcPiduwIsrle1 p4XLb0vO25tPdXKja3CzFckGrwu3gdBYk/AgrA8708vPyE+gzBQOzBWoUeplAU+dIL z0f8R2FI46i0Jg9z1XGzriwq8Rz9Z/4KrbcCixEhgmiBjflzN0OSAMkDEznWmBhMeT ChbWHP08l87/OkrjaZyMTTMsDm9a5ZDAd0Rr3+sg8p2W8zaDMvir4UEDzRzaGfwnl5 bxdzapIrFjKAQ== From: Frederic Weisbecker To: LKML Cc: Frederic Weisbecker , Peter Zijlstra , Phil Auld , Alex Belits , Nicolas Saenz Julienne , Xiongfeng Wang , Neeraj Upadhyay , Thomas Gleixner , Yu Liao , Boqun Feng , "Paul E . McKenney" , Marcelo Tosatti , Paul Gortmaker , Uladzislau Rezki , Joel Fernandes Subject: [PATCH 04/21] context_tracking: Add a note about noinstr VS unsafe context tracking functions Date: Tue, 3 May 2022 12:00:34 +0200 Message-Id: <20220503100051.2799723-5-frederic@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220503100051.2799723-1-frederic@kernel.org> References: <20220503100051.2799723-1-frederic@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some context tracking functions enter or exit into/from RCU idle mode while using trace-able and lockdep-aware IRQs (un-)masking. This could be easily solved with using raw versions of local_irq_*() but we would then lose some precious debugging informations. Another possible way to solve this may consist in using rude RCU-tasks in lockdep and irqsoff tracing. In any case and until this get solved, those functions can't get tagged as noinstr even though they should. Reported-by: Peter Zijlstra Cc: Paul E. McKenney Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: Neeraj Upadhyay Cc: Uladzislau Rezki Cc: Joel Fernandes Cc: Boqun Feng Cc: Nicolas Saenz Julienne Cc: Marcelo Tosatti Cc: Xiongfeng Wang Cc: Yu Liao Cc: Phil Auld Cc: Paul Gortmaker Cc: Alex Belits Signed-off-by: Frederic Weisbecker --- kernel/context_tracking.c | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c index 36a98c48aedc..1f44b0461d14 100644 --- a/kernel/context_tracking.c +++ b/kernel/context_tracking.c @@ -103,6 +103,11 @@ void noinstr __context_tracking_enter(enum ctx_state state) } EXPORT_SYMBOL_GPL(__context_tracking_enter); +/* + * FIXME: This function should be noinstr but the below local_irq_restore() is + * unsafe because it involves illegal RCU uses through tracing and lockdep. This + * must be fixed first. + */ void context_tracking_enter(enum ctx_state state) { unsigned long flags; @@ -125,6 +130,10 @@ void context_tracking_enter(enum ctx_state state) NOKPROBE_SYMBOL(context_tracking_enter); EXPORT_SYMBOL_GPL(context_tracking_enter); +/* + * FIXME: This function should be noinstr but it unsafely calls local_irq_restore(), + * involving illegal RCU uses through tracing and lockdep. This must be fixed first. + */ void context_tracking_user_enter(void) { user_enter(); @@ -168,6 +177,11 @@ void noinstr __context_tracking_exit(enum ctx_state state) } EXPORT_SYMBOL_GPL(__context_tracking_exit); +/* + * FIXME: This function should be noinstr but the below local_irq_save() is + * unsafe because it involves illegal RCU uses through tracing and lockdep. This + * must be fixed first. + */ void context_tracking_exit(enum ctx_state state) { unsigned long flags; @@ -182,6 +196,10 @@ void context_tracking_exit(enum ctx_state state) NOKPROBE_SYMBOL(context_tracking_exit); EXPORT_SYMBOL_GPL(context_tracking_exit); +/* + * FIXME: This function should be noinstr but it unsafely calls local_irq_save(), + * involving illegal RCU uses through tracing and lockdep. This must be fixed first. + */ void context_tracking_user_exit(void) { user_exit(); -- 2.25.1