Received: by 2002:a05:7412:a9a3:b0:f9:327e:43ab with SMTP id o35csp79445rdh; Mon, 18 Dec 2023 05:05:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IFk21W2y+AtbrfFHzpDn50HvY21U7BvwluammNmI9P074orKU8jl+B6Q2GS9YzKu6jIQJzI X-Received: by 2002:a05:6214:242f:b0:67f:434c:3e22 with SMTP id gy15-20020a056214242f00b0067f434c3e22mr3102855qvb.64.1702904720055; Mon, 18 Dec 2023 05:05:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702904720; cv=none; d=google.com; s=arc-20160816; b=SPEXsDwPX5s612eYptc+fXqHnZn/9AtsYLS3W9vi29+33Jl269j4xdTRG03L2lGYRl KR9pTEVoIZxTYYZ5fJoXkXSg7+d3z9WQkZgaBs23rF3h1GMgQMMujvloZRdri3S8uiWK N58DthXc8/8GIBJwIRReexvwI3GaQF9vj7GEBeOqx5lulaRXg7vi0U26hofmJWB5R+k9 m4gt15+CNn87ndZAnp7jg3K131ctQxU/dOm9sQXcUHzN90YYhQV7x6viixAuuavyKuG3 LYspKwaItgyau7lhNRURACvHoYglhgpFCg8RgaBx6pLIGmLNLN/O6tt0zk0Cc1jgsZUt 4UDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=UhkQSXtgryohrskJLvRJYVFkwLj/nWzQ5PI02O3CiYE=; fh=1ZtviAqIh/VuyJK0VpFTUYwYpIw0GA9TidCk6AerqbU=; b=0qmxSDKWRfH2aTKvC8tKvbRK4ORlXiHh6ks0Z+/ighF1VbGKCDXN4aClYa8MKoU2d5 +z/PahZ+WfwzMBXpV2dxKJQ9XHc/YVK94pMVGG5c7gez+SeXTaoK3dd9AIiwG2G9irDn tm+kaRlQpKV/QIKo3W7Yi4E0YxDKZJ26VZfmXYL/Hka7KNY1Lha7lPAXNG8nL7ClsR+K kHBekIcxbni8iEpE+y8DIQQ7MEwc0BcOL1333BppHyXzwgdsVAJojE4tHnpOLqbEJ0UL sfBKNCnBu/axtwRaT/j6a3Rd4hEirYO7p6a2q/zzVejhKiur0BSqph5aIR5xzWowpMC6 BK+g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=T3QcNoNN; spf=pass (google.com: domain of linux-kernel+bounces-3676-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-3676-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id y18-20020a0cd992000000b0067f462e5ea2si1968547qvj.409.2023.12.18.05.05.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Dec 2023 05:05:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-3676-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=T3QcNoNN; spf=pass (google.com: domain of linux-kernel+bounces-3676-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-3676-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id CBB3A1C22336 for ; Mon, 18 Dec 2023 13:05:19 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 550E8129ED5; Mon, 18 Dec 2023 12:47:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="T3QcNoNN" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 866041297C5; Mon, 18 Dec 2023 12:47:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 480ACC433C9; Mon, 18 Dec 2023 12:47:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702903657; bh=jg4pe2j16nuLVB+2t6PWwYOylMOu9N+p+EVl2Kz2PQ4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T3QcNoNNf6HchHE05I8IggI09bLhrAcJVPwAbGamVwBUkK2PhQpERaI9dWkAIrKyg 9AIXjczuIDPrUNpAbZwmWc+09mjdtr84+fvhps/kMmjo73122NW97PS1BdOURQ2RLV rMxiU/zB1G4PzKKEHcQPPcBW4csn3EX7+wyxHz710oOanIypHGzYpE7R1WWcYaCbh8 9R/S5zrMz94bbu7TvULCx6xxdwSbTk5mCl4AQNJVdg/qEt6ZBgxfnZbqNzzzyUrZ4P dlzOs7X2NIEg983M+RR0i44xrsxk1utLfOLNywO4fn7BNzQD5yEXb7zx14XyxZNlVz eDfCcNL69h2yA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: "Steven Rostedt (Google)" , Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Sasha Levin , linux-trace-kernel@vger.kernel.org Subject: [PATCH AUTOSEL 4.14 6/6] ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI Date: Mon, 18 Dec 2023 07:47:23 -0500 Message-ID: <20231218124725.1382738-6-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20231218124725.1382738-1-sashal@kernel.org> References: <20231218124725.1382738-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 4.14.333 Content-Transfer-Encoding: 8bit From: "Steven Rostedt (Google)" [ Upstream commit 712292308af2265cd9b126aedfa987f10f452a33 ] As the ring buffer recording requires cmpxchg() to work, if the architecture does not support cmpxchg in NMI, then do not do any recording within an NMI. Link: https://lore.kernel.org/linux-trace-kernel/20231213175403.6fc18540@gandalf.local.home Cc: Masami Hiramatsu Cc: Mark Rutland Cc: Mathieu Desnoyers Signed-off-by: Steven Rostedt (Google) Signed-off-by: Sasha Levin --- kernel/trace/ring_buffer.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/kernel/trace/ring_buffer.c b/kernel/trace/ring_buffer.c index f0d4ff2db2ef0..b1acec3e4dc3b 100644 --- a/kernel/trace/ring_buffer.c +++ b/kernel/trace/ring_buffer.c @@ -2774,6 +2774,12 @@ rb_reserve_next_event(struct ring_buffer *buffer, int nr_loops = 0; u64 diff; + /* ring buffer does cmpxchg, make sure it is safe in NMI context */ + if (!IS_ENABLED(CONFIG_ARCH_HAVE_NMI_SAFE_CMPXCHG) && + (unlikely(in_nmi()))) { + return NULL; + } + rb_start_commit(cpu_buffer); #ifdef CONFIG_RING_BUFFER_ALLOW_SWAP -- 2.43.0