Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1403972pxj; Fri, 21 May 2021 13:25:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyGVJHmvDNsraSZzZFz9HLuKgwnANgHEV03ZOkJQc7hvxC7+kZP5vQM8oQRFYvTzGpwwv/f X-Received: by 2002:a17:906:2ac5:: with SMTP id m5mr11893206eje.517.1621628737382; Fri, 21 May 2021 13:25:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621628737; cv=none; d=google.com; s=arc-20160816; b=AU48yS0Iv+h22ZFVRIGY+MKjZ7erSbMvTyT09xXp1PH5VLPJH/CQpGIKTD9+N5j+9N WXG/OgfXIucR67qwQSy83K/fvnIlei/z88GqmrUDLhCP4EYN/yy/QX2CWdFYq4f5Qqgl vB1F+dhq2zfo5dZvouoUnZbSD6uRwVUxXMjt5CJAuML6y/hiBk2Vcqyd7w05TbL7mEOg qa3fKSzBdKNk8+RXBNdU25wRZxP3zKzaRI1/Q4r7z8FOZLrm/m8+n4LWNaqo04WfDRYV 0tvdKVK7hazYHh/bZLDE6xo4rd3QoQBeizYiq9/ZxieyZsl7SlbRPTg0FE32LhthIg37 1TCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature:dkim-filter; bh=vU/JTuWi3C5fB8RNIolLlnI9ipYsWSFq874acAyf40w=; b=nsAoLttaBeygwYkoSLEdMlGb/DABISgjYZYGhUeBpkKg229M2UWg8mjjeY9Ys3wjJh HO9Ckf05zTH6I1EQMvs0WlOYC1NORWhqMFj2nVejKufoTIqy9LM558Wd8sdnFiYIjjBh mZ0KbgBwys8qrcE/lYEsk03By5PHCESCpwVWpQvTbEdEKw6I30WUpOw4VuPY1yw3PB2n MVl6nW7rNgY3H7gbhH3koP8Lh8wI6uqRB/i+aw8x4mRe9pXZDGP5qT3MBLWzke/x5bOm ef6wQfcRI+mHQN9eYepHIRGldB97H+s09jEnu2ClelqQNNcLxDFTX6HTGb4bWESTrj0f tAfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=VbNgyb8B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g14si5954110edr.106.2021.05.21.13.25.10; Fri, 21 May 2021 13:25:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=VbNgyb8B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238901AbhEURvQ (ORCPT + 99 others); Fri, 21 May 2021 13:51:16 -0400 Received: from linux.microsoft.com ([13.77.154.182]:33412 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238628AbhEURt6 (ORCPT ); Fri, 21 May 2021 13:49:58 -0400 Received: from [192.168.254.32] (unknown [47.187.214.213]) by linux.microsoft.com (Postfix) with ESMTPSA id A2F2A20B7188; Fri, 21 May 2021 10:48:34 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com A2F2A20B7188 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1621619315; bh=vU/JTuWi3C5fB8RNIolLlnI9ipYsWSFq874acAyf40w=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=VbNgyb8BxOjzNrhqJ1+kLXKgpAdDz0/s4fsSb5gh6kosis6ztaDaiL82PhCuKiRPP 48ZhbmMBBUPNIZi8+/Cr6rsLxZ7cibrDZSGtL0OAMObMfxaF3d9NrUkBLg17VGZ7Pz oRpzGr3BjYbst42wOW9ZN1L+zKbLHhowyOPtQIJI= Subject: Re: [RFC PATCH v4 0/2] arm64: Stack trace reliability checks in the unwinder To: Mark Brown Cc: mark.rutland@arm.com, jpoimboe@redhat.com, ardb@kernel.org, jthierry@redhat.com, catalin.marinas@arm.com, will@kernel.org, jmorris@namei.org, pasha.tatashin@soleen.com, linux-arm-kernel@lists.infradead.org, live-patching@vger.kernel.org, linux-kernel@vger.kernel.org References: <68eeda61b3e9579d65698a884b26c8632025e503> <20210516040018.128105-1-madvenka@linux.microsoft.com> <20210521171808.GC5825@sirena.org.uk> <654dde25-e6a2-a1e7-c2d7-e2692bc11528@linux.microsoft.com> <20210521174702.GE5825@sirena.org.uk> From: "Madhavan T. Venkataraman" Message-ID: <1feec2ba-538b-e28d-1e03-ac9c1af43842@linux.microsoft.com> Date: Fri, 21 May 2021 12:48:34 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20210521174702.GE5825@sirena.org.uk> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/21/21 12:47 PM, Mark Brown wrote: > On Fri, May 21, 2021 at 12:32:52PM -0500, Madhavan T. Venkataraman wrote: > >> I have followed the example in the Kprobe deny list. I place the section >> in initdata so it can be unloaded during boot. This means that I need to >> copy the information before that in early_initcall(). > >> If the initialization must be performed on first use, I probably have to >> move SYM_CODE_FUNCTIONS from initdata to some other place where it will >> be retained. > >> If you prefer this, I could do it this way. > > No, I think if people are fine with this for kprobes they should be fine > with it here too and if not we can always incrementally improve > performance - let's just keep things simple and easy to understand for > now. > OK. Madhavan