From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933121AbdELUFi (ORCPT ); Fri, 12 May 2017 16:05:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:47136 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932439AbdELUFg (ORCPT ); Fri, 12 May 2017 16:05:36 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 78CEA23992 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=goodmis.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=rostedt@goodmis.org Date: Fri, 12 May 2017 16:05:32 -0400 From: Steven Rostedt To: "Paul E. McKenney" Cc: linux-kernel@vger.kernel.org, Thomas Gleixner , Peter Zijlstra , Ingo Molnar , Mathieu Desnoyers , Masami Hiramatsu Subject: Re: [RFC][PATCH 1/5] tracing: Make sure RCU is watching before calling a stack trace Message-ID: <20170512160532.4aacbffe@gandalf.local.home> In-Reply-To: <20170512185003.GC3956@linux.vnet.ibm.com> References: <20170512171544.100715273@goodmis.org> <20170512172449.879684501@goodmis.org> <20170512182535.GZ3956@linux.vnet.ibm.com> <20170512143619.281db952@gandalf.local.home> <20170512185003.GC3956@linux.vnet.ibm.com> X-Mailer: Claws Mail 3.14.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 12 May 2017 11:50:03 -0700 "Paul E. McKenney" wrote: > On Fri, May 12, 2017 at 02:36:19PM -0400, Steven Rostedt wrote: > > On Fri, 12 May 2017 11:25:35 -0700 > > "Paul E. McKenney" wrote: > > > > > On Fri, May 12, 2017 at 01:15:45PM -0400, Steven Rostedt wrote: > > > > From: "Steven Rostedt (VMware)" > > > > > > > > As stack tracing now requires "rcu watching", force RCU to be watching when > > > > recording a stack trace. > > > > > > > > Signed-off-by: Steven Rostedt (VMware) > > > > > > Assuming that you never get to __trace_stack() if in an NMI handler, > > > this looks good to me! > > > > > > In contrast, if if __trace_stack() ever is called from an NMI handler, > > > invoking rcu_irq_enter() can be fatal. > > > > Then someone may die. > > > > OK, what's the case of running this in nmi? How does perf do it? > > I have no idea. If it cannot happen, then it cannot happen and all > is well, RCU is happy, and I am happy. ;-) > > > Do we just skip the check if it is in an nmi? > > > > if (!in_nmi()) { > > if (unlikely(rcu_irq_enter_disabled())) > > return; > > rcu_irq_enter(); > > } > > > > __ftrace_trace_stack(); > > > > if (!in_nmi()) > > rcu_irq_exit(); > > > > ? > > If it -can- happen, bail out of the function without doing the Why? > __ftrace_trace_stack()? Or does that just cause other problems further > down the road? Or BUG_ON(in_nmi())? Why? > > But again if it cannot happen, no problem and no need for extra code. > We can't call stack trace from nmi anymore? It calls rcu_read_lock() which is why we need to make sure rcu is watching, otherwise lockdep complains. -- Steve