[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181129134725.6d86ade6@gandalf.local.home>
Date: Thu, 29 Nov 2018 13:47:25 -0500
From: Steven Rostedt <rostedt@...dmis.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Andy Lutomirski <luto@...capital.net>,
Josh Poimboeuf <jpoimboe@...hat.com>,
Peter Zijlstra <peterz@...radead.org>,
Andrew Lutomirski <luto@...nel.org>,
"the arch/x86 maintainers" <x86@...nel.org>,
Linux List Kernel Mailing <linux-kernel@...r.kernel.org>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
Ingo Molnar <mingo@...nel.org>,
Thomas Gleixner <tglx@...utronix.de>, mhiramat@...nel.org,
jbaron@...mai.com, Jiri Kosina <jkosina@...e.cz>,
David.Laight@...lab.com, bp@...en8.de, julia@...com,
jeyu@...nel.org, Peter Anvin <hpa@...or.com>
Subject: Re: [PATCH v2 4/4] x86/static_call: Add inline static call
implementation for x86-64
On Thu, 29 Nov 2018 10:23:44 -0800
Linus Torvalds <torvalds@...ux-foundation.org> wrote:
> On Thu, Nov 29, 2018 at 9:59 AM Steven Rostedt <rostedt@...dmis.org> wrote:
> >
> > Do you realize that the cmpxchg used by the first attempts of the
> > dynamic modification of code by ftrace was the source of the e1000e
> > NVRAM corruption bug.
>
> If you have a static call in IO memory, you have bigger problems than that.
>
> What's your point?
Just that cmpxchg on dynamic modified code brings back bad memories ;-)
>
> Again - I will point out that the things you guys have tried to come
> up with have been *WORSE*. Much worse.
Note, we do have a bit of control at what is getting called. The patch
set requires that the callers are wrapped in macros. We should not
allow just any random callers (like from asm).
This isn't about modifying any function call. This is for a specific
subset, that we can impose rules on.
-- Steve
Powered by blists - more mailing lists