Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1170458imu; Fri, 4 Jan 2019 14:43:21 -0800 (PST) X-Google-Smtp-Source: ALg8bN7m3+qwnap6JETMl4U5iWrArq42OZrSWaSuEHTBmEGGkMngDUczs4M8wDFxz0pwLXpV2C9u X-Received: by 2002:a63:4b25:: with SMTP id y37mr3231403pga.181.1546641801051; Fri, 04 Jan 2019 14:43:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546641801; cv=none; d=google.com; s=arc-20160816; b=rk4L75sxXX3ZNMVIeU3pd/Dw4aCnK5oYBlrIcPy7i4KMV/eNBAFvNuWKtb9zINbOgE h1UCW2tli4x4ccX/rZsGw4O2r41Th2YBYxWiKABhEn+Ymz9xQbSh1GInUDBtrnETBBP0 twX4UYVvnIonjVBIjLIzc6YVmnrpMEGjcAcbHWCwzqWBM4oqCmSkZWGInKbmCkoqLQs1 Jq9iMzrcS9pPV9F7HOQThTBgo4dScwJIZcJiGtZZNH2Sw1jvhYQKQjDqCQXiTuSM0Is5 eAELxhDftSvHtTfqUb8elImTIS0+EHQjqlf5p7DBFkKF3iDoH0nw/ipERc+gk+fzdeIz 3vmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=K+hu/szRdpCoEHVfPXWtAsdcR4ZpvDETIT6LcidjJiY=; b=LpINLaZ0X8ngr7IN6ZDQ0lPszHQbZAHA6Du/MI/k9GUNkcCIugl40LQJBQPFOO4cDZ ZuDWjppe7nR2Zi6MHKZvfRKx8MJGto8ODIliD4BnbcNBLa12R/ojirEZrufI8OrfpAKj XIGBwmSVj2cXpusUh9tx+t/+eEojw5NdI+gdl2wXW5Z7DfGiatEXa4O8ARr4Tk2HUF6E 2iPcwClB2Y+nYIyrw2CKA1ZoyvbLVpvqoqayanc0CzKejAItTOz9c9+dTfu5RKsT6vCB F9s1qEtcdjymp/oGXPylTwvz5kSmeQcgULOMQ8ZoMkXUs2uyUasNn3vf3zHLwPdfhI9A VN7Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x10si35622737pgl.209.2019.01.04.14.43.05; Fri, 04 Jan 2019 14:43:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726224AbfADWl7 (ORCPT + 99 others); Fri, 4 Jan 2019 17:41:59 -0500 Received: from verein.lst.de ([213.95.11.211]:42121 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726100AbfADWl7 (ORCPT ); Fri, 4 Jan 2019 17:41:59 -0500 Received: by newverein.lst.de (Postfix, from userid 107) id 373A868DDC; Fri, 4 Jan 2019 23:41:58 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on newverein.lst.de X-Spam-Level: X-Spam-Status: No, score=-0.2 required=5.0 tests=ALL_TRUSTED,BAYES_50 autolearn=disabled version=3.3.1 Received: from lst.de (p5B33F989.dip0.t-ipconnect.de [91.51.249.137]) by newverein.lst.de (Postfix) with ESMTPSA id 91DA567358; Fri, 4 Jan 2019 23:41:53 +0100 (CET) Date: Fri, 4 Jan 2019 23:41:45 +0100 From: Torsten Duwe To: Steven Rostedt Cc: Mark Rutland , Will Deacon , Catalin Marinas , Julien Thierry , Josh Poimboeuf , Ingo Molnar , Ard Biesheuvel , Arnd Bergmann , AKASHI Takahiro , Amit Daniel Kachhap , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, live-patching@vger.kernel.org Subject: Re: [PATCH v6] arm64: implement ftrace with regs Message-ID: <20190104224145.GA28236@lst.de> References: <20190104141053.360F768D93@newverein.lst.de> <20190104175017.GA7157@lakrids.cambridge.arm.com> <20190104130648.02657f3f@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190104130648.02657f3f@gandalf.local.home> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 04, 2019 at 01:06:48PM -0500, Steven Rostedt wrote: > On Fri, 4 Jan 2019 17:50:18 +0000 > Mark Rutland wrote: > > > At Linux Plumbers, I had a conversation with Steve Rostedt, and we came > > to the conclusion that (withut heavyweight synchronization) patching two > > NOPs at runtime isn't safe, since a CPU might have executed the first > > NOP as a NOP before another CPU patches both instructions. So a CPU > > might execute: > > > > NOP > > BL ftrace_regs_caller > > > > ... rather than the expected: > > > > MOV X9, X30 > > BL ftrace_regs_caller > > > > ... and therefore X9 contains some UNKNOWN value, rather than the > > original LR value. I'm perfectly aware of that; an earlier version had barriers, attempting to avoid just that, which Mark(?) wrote weren't neccessary. But is this a realistic scenario? All function entries are aligned 8 bytes. Are there arm64 implementations out there that fetch only 4 bytes and give a chance to mess with the 2nd 4 bytes? You at arm.com should know, and I won't be surprised if the answer is a weird "yes". Or maybe it's just another erratum lurking somewhere... My point is: those 2 insn will _never_ be split by any alignment boundary > 8; does that mean anything, have you considered this? > > I wonder if we could solve that by patching the kernel at build-time, to > > add the MOV X9, X30 in place of the first NOP. If we were to do that, we > > could also update the addresses to pooint at the second NOP, simplifying > > the changes to the runtime code. > > You can also patch it at boot up when there's only one CPU running, and > interrupts are disabled. May I remind about possible performance hits? Even the NOPs had a tiny impact on certain in-order implementations. I'd rather switch between the mov and a "b +2". Torsten