Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759487AbbLCJiY (ORCPT ); Thu, 3 Dec 2015 04:38:24 -0500 Received: from foss.arm.com ([217.140.101.70]:47567 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757678AbbLCJiV (ORCPT ); Thu, 3 Dec 2015 04:38:21 -0500 Date: Thu, 3 Dec 2015 09:38:21 +0000 From: Will Deacon To: libin Cc: rostedt@goodmis.org, mingo@redhat.com, catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, guohanjun@huawei.com, dingtianhong@huawei.com Subject: Re: [PATCH] arm64: ftrace: stop using kstop_machine to enable/disable tracing Message-ID: <20151203093821.GD7023@arm.com> References: <1448697009-17211-1-git-send-email-huawei.libin@huawei.com> <20151202123654.GC4523@arm.com> <56600992.4040005@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <56600992.4040005@huawei.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1795 Lines: 36 On Thu, Dec 03, 2015 at 05:21:22PM +0800, libin wrote: > > on 2015/12/2 20:36, Will Deacon wrote: > > On Sat, Nov 28, 2015 at 03:50:09PM +0800, Li Bin wrote: > >> On arm64, kstop_machine which is hugely disruptive to a running > >> system is not needed to convert nops to ftrace calls or back, > >> because that modifed code is a single 32bit instructions which > >> is impossible to cross cache (or page) boundaries, and the used str > >> instruction is single-copy atomic. > > This commit message is misleading, since the single-copy atomicity > > guarantees don't apply to the instruction-side. Instead, the architecture > > calls out a handful of safe instructions in "Concurrent modification and > > execution of instructions". > > Right, thank you for your comments. > > > Now, those safe instructions *do* include NOP, B and BL, so that should > > be sufficient for ftrace provided that we don't patch condition codes > > (and I don't think we do). > > Yes, and so far this assumption has no probem, but in order to avoid exceeding these > safe insturctions in the future, we can use aarch64_insn_hotpatch_safe() to verify the > instruction to determine whether needs stop_machine() to synchronize or use > aarch64_insn_patch_text directly. Right or I am missing something? I think you're missing the case where the instruction changes under our feet after we've read it but before we've replaced it (e.g. due to module unloading). I think that's why ftrace_modify_code has the comment about lack of locking thanks to stop_machine. Will -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/