Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1042683imu; Fri, 11 Jan 2019 13:58:25 -0800 (PST) X-Google-Smtp-Source: ALg8bN5t4uzCAzsUE+qg0t5pcPUDrWOabaKKG4/O2Y3Lm3XfFkFk1NYRM8bP2zbvtvTBYQI8UNBP X-Received: by 2002:a17:902:bc81:: with SMTP id bb1mr15909214plb.223.1547243904872; Fri, 11 Jan 2019 13:58:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547243904; cv=none; d=google.com; s=arc-20160816; b=qeoZelrCUgszc56jUijGM0yRIv5Q/Nb6IFJIKent+5hw5yJaQPOM+6lWW6NxluPmzD /F+Hpgyqvdtkk6ZpjTeoDeVHbxQXihTDZE7YwLvqM7r2qN7tzuln7FjYZft4d48sK26x hBvhFD9bXsZ5sRquGIk0ZJvWo/i66WvPT14mfsl6vHVEMJmNVmmqYiPf5X3nQrAVXfRa /geJFFSdwZfF7T++lu7iyGFF3Vo+57Q29gu4XUuTnAlumQVFah8mqPt9t/4pOw7Apshn V4bHRXEzhhLrgK0Q8nHJPm99rNeV7NLnrz4tRwHx+AmEjj2ioYGF+CoZzGdyxi3jgN7S 2Fvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=NB2d35ICwUprnrzDmus26pC/ng/1jxoY43Y7zpuYfaA=; b=eMuK2hRSItYK+rMjcjjcmCAMUH+YgTc5qj1uTf5tmDyzTp63xuIyNlSmlcZJq0Fp+H ThBGHes2qLCVyBGMNQ429lnjbIQz9HGHYJff2hfEid8xLZHNHHcHoDTc4AWemR5nzLHO uzgyVe9DU6PFQhBa6Rxq7XT0WIX+NOKgNvLJRgu/QEgwGHm9SESO4opE13T1gMpIlN+E sFs9nhgny02UTveRYLwBcxD++YQ6XxXnui1ju9ycUh7mgRLb1VvJ3rWHKzJJSy6MDGER OpmQ/rHaPhrZLk5ZqV8S0nn+BA2QwtH43batmSOTbTn6xZLjgewbUwhEeJSaZElHXo26 bRmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w189si16002146pfb.151.2019.01.11.13.58.09; Fri, 11 Jan 2019 13:58:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726424AbfAKVzj convert rfc822-to-8bit (ORCPT + 99 others); Fri, 11 Jan 2019 16:55:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:52392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725536AbfAKVzj (ORCPT ); Fri, 11 Jan 2019 16:55:39 -0500 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 989712183F; Fri, 11 Jan 2019 21:55:36 +0000 (UTC) Date: Fri, 11 Jan 2019 16:55:35 -0500 From: Steven Rostedt To: Josh Poimboeuf Cc: Nadav Amit , Linus Torvalds , Andy Lutomirski , Peter Zijlstra , the arch/x86 maintainers , Linux List Kernel Mailing , Ard Biesheuvel , Ingo Molnar , Thomas Gleixner , Masami Hiramatsu , Jason Baron , Jiri Kosina , David Laight , Borislav Petkov , Julia Cartwright , Jessica Yu , "H. Peter Anvin" , Rasmus Villemoes , Edward Cree , Daniel Bristot de Oliveira Subject: Re: [PATCH v3 0/6] Static calls Message-ID: <20190111165535.467c59a3@gandalf.local.home> In-Reply-To: <20190111214122.dzye2mg32aksuyo3@treble> References: <20190111151525.tf7lhuycyyvjjxez@treble> <20190111200420.qtyffayxceysoarf@treble> <20190111203135.5clurevf34bkiy3o@treble> <20190111212210.veyfn5vvjswcwacm@treble> <6B0B7437-0577-4FE7-A0BC-EFB5D94B8C21@vmware.com> <20190111214122.dzye2mg32aksuyo3@treble> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 11 Jan 2019 15:41:22 -0600 Josh Poimboeuf wrote: > > I don’t see RCU-sched solves the problem if you don’t disable preemption. On > > a fully preemptable kernel, you can get preempted between the push and the > > call (jmp) or before the push. RCU-sched can then finish, and the preempted > > task may later jump to a wrong patched-dest. > > Argh, I misspoke about RCU-sched. Words are hard. > > I meant synchronize_rcu_tasks(), which is a completely different animal. > My understanding is that it waits until all runnable tasks (including > preempted tasks) have gotten a chance to run. Not quite, but does the same thing. It waits for all tasks to either schedule voluntarily (not preempted), or be / go into idle, or be /go into userspace. In any case, it makes sure code is off of trampolines. I use this before freeing trampolines used by ftrace. -- Steve