Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp865233ybx; Thu, 31 Oct 2019 02:03:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqyweEKa3WDoU9tpzgdCNyEWtTxZVNxG5x3c0+iJ/XoCVONoPFUKfcFGTM5RbucqfajADM1/ X-Received: by 2002:a17:906:6a8e:: with SMTP id p14mr2691447ejr.137.1572512636058; Thu, 31 Oct 2019 02:03:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572512636; cv=none; d=google.com; s=arc-20160816; b=vJ/1yH2hLcayUE8AJ/sQi2YvH1q2vAojHhunwbqy318+rLhfRP12aLTgBbRSQpYBf0 Ffyze6Vi2KX9lG/9F25IbmJcspOrw/G3W2MGHbd9qpzkZUg/WvXDpbvHqBWIWvABAs+F HtpzRxZq2SfAoWqip2+fGNOLcGtW6Yz7VqfJ5DUIA4OesCd1pzDYpQRTSVXEWhPGTSZQ zGkYSXW3tshXPAh0TK13ESjOzfbYCKWyHBj1jPOkFY92S8fu0A8JSzb2czRUHfmHm2UO VO/Ksr5btRaFV6zxkQOynImueIS4NRlSEFDrafOr4DR9m9NAb05OpiP1SnZIKQPrTIph azqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Ymk0d/Be4Nc9vxtuKn6J8DmS8CYZFq6kK5L5HZRlqBE=; b=NKTutxucuK4/aLRVMNv3ma3+zlJgrM2PjQsiS2w8+Cuhu8loyg++/qMi+t9aeCBiOe NOJmtPO00vACNKyyzdpunIEEaNMRgtbqKh7QsDVpCrSsObBF069tdeT1+o8e/0dHa3R3 zXh91dWpEArWwdLPN//Ssw0EAF9GFD+6dsfyLbcaRLiJHVhJNn88Z5KMBIgEDRnUxrkE bz2oKV8XAEvlM+vVEsxhy+KlSDGW/j0uSmycldLTiq3H/P5wJSHRoHHovdmAU+1fpeLe imq/9ky7NLiNBSZTaOTyIS6ikvt5h/yt/3Ad4oDNROuxST+Y8g3ajBo9ZiHa709pPC+K 5HpA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c8si3836951edf.79.2019.10.31.02.03.32; Thu, 31 Oct 2019 02:03:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727073AbfJaJCn (ORCPT + 99 others); Thu, 31 Oct 2019 05:02:43 -0400 Received: from foss.arm.com ([217.140.110.172]:45954 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726864AbfJaJCm (ORCPT ); Thu, 31 Oct 2019 05:02:42 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DE80531F; Thu, 31 Oct 2019 02:02:41 -0700 (PDT) Received: from blommer (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 627483F71E; Thu, 31 Oct 2019 02:02:37 -0700 (PDT) Date: Thu, 31 Oct 2019 09:02:32 +0000 From: Mark Rutland To: Torsten Duwe Cc: linux-arm-kernel@lists.infradead.org, Jessica Yu , Helge Deller , "James E.J. Bottomley" , linux-kernel@vger.kernel.org, amit.kachhap@arm.com, catalin.marinas@arm.com, james.morse@arm.com, jpoimboe@redhat.com, jthierry@redhat.com, linux-parisc@vger.kernel.org, mingo@redhat.com, peterz@infradead.org, rostedt@goodmis.org, svens@stackframe.org, takahiro.akashi@linaro.org, will@kernel.org Subject: Re: [PATCHv2 2/8] module/ftrace: handle patchable-function-entry Message-ID: <20191031090231.GA3340@blommer> References: <20191029165832.33606-1-mark.rutland@arm.com> <20191029165832.33606-3-mark.rutland@arm.com> <20191030150302.GA965@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191030150302.GA965@suse.de> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 30, 2019 at 04:03:02PM +0100, Torsten Duwe wrote: > On Tue, Oct 29, 2019 at 04:58:26PM +0000, Mark Rutland wrote: > > When using patchable-function-entry, the compiler will record the > > callsites into a section named "__patchable_function_entries" rather > > than "__mcount_loc". Let's abstract this difference behind a new > > FTRACE_CALLSITE_SECTION, so that architectures don't have to handle this > > explicitly (e.g. with custom module linker scripts). > > > > As parisc currently handles this explicitly, it is fixed up accordingly, > > with its custom linker script removed. Since FTRACE_CALLSITE_SECTION is > > only defined when DYNAMIC_FTRACE is selected, the parisc module loading > > code is updated to only use the definition in that case. When > > DYNAMIC_FTRACE is not selected, modules shouldn't have this section, so > > this removes some redundant work in that case. > > > > I built parisc generic-{32,64}bit_defconfig with DYNAMIC_FTRACE enabled, > > and verified that the section made it into the .ko files for modules. > > This is because of remaining #ifdeffery in include/asm-generic/vmlinux.lds.h: > > #ifdef CC_USING_PATCHABLE_FUNCTION_ENTRY > #define MCOUNT_REC() . = ALIGN(8); \ > __start_mcount_loc = .; \ > KEEP(*(__patchable_function_entries)) \ > __stop_mcount_loc = .; > #else > #define MCOUNT_REC() . = ALIGN(8); \ > __start_mcount_loc = .; \ > KEEP(*(__mcount_loc)) \ > __stop_mcount_loc = .; > #endif For modules we use a combination of scripts/module-common.lds and an architecture's own module.lds, not vmlinux.lds.h. So I don't think the above is relevant for modules. For modules the kernel's ELF loader looks for the ELF ection, not the __{start,stop}_mcount_loc symbols that we use for the main kernel image. FWIW, when building a module, I see the following linker operations: | [mark@blommer:~/src/linux]% toolchain korg gcc-8.1.0-nolibc make V=1 ARCH=arm64 CROSS_COMPILE=aarch64-linux- arch/arm64/crypto/sha512-ce.ko | grep aarch64-linux-ld | aarch64-linux-ld -EL -maarch64elf -r -o arch/arm64/crypto/sha512-ce.o arch/arm64/crypto/sha512-ce-glue.o arch/arm64/crypto/sha512-ce-core.o | aarch64-linux-ld -r -EL -maarch64elf --build-id -T ./scripts/module-common.lds -T ./arch/arm64/kernel/module.lds -o arch/arm64/crypto/sha512-ce.ko arch/arm64/crypto/sha512-ce.o arch/arm64/crypto/sha512-ce.mod.o; true > Maybe you want to tackle that as well? I suggest to have at least one > FTRACE_CALLSITE_SECTION definition without double quotes. Alternatively, my > earlier solution just kept both sections, in case either one or both are > present. > > KEEP(*(__patchable_function_entries)) \ > KEEP(*(__mcount_loc)) \ I agree that the CC_USING_PATCHABLE_FUNCTION_ENTRY ifdeffery could be simplified, and that it would be nice to consistently use FTRACE_CALLSITE_SECTION if we can. However, the generic linker script doesn't include anything, and I don't see a good location for that to live. What I could do is add an explicit comment: /* * The ftrace call sites are logged to a section whose name depends on the * compiler option used. A given kernel image will only use one, AKA * FTRACE_CALLSITE_SECTION. We capture all of them here to avoid header * dependencies. */ #define MCOUNT_REC() \ . = ALIGN(8); \ __start_mcount_loc = .; \ KEEP(*(__patchable_function_entries)) \ KEEP(*(__mcount_loc)) \ __stop_mcount_loc = .; ... which should make the dependency clear. Does that sound good to you? Thanks, Mark.