From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from merlin.infradead.org ([205.233.59.134]:48896 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729249AbeIGBDM (ORCPT ); Thu, 6 Sep 2018 21:03:12 -0400 Date: Thu, 6 Sep 2018 22:25:47 +0200 From: Peter Zijlstra Subject: Re: [PATCH v2 1/6] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()" Message-ID: <20180906202547.GC9358@worktop.programming.kicks-ass.net> References: <20180902173224.30606-1-namit@vmware.com> <20180902173224.30606-2-namit@vmware.com> <20180906194003.GD4816@worktop.programming.kicks-ass.net> <20180906195351.GB9358@worktop.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: linux-arch-owner@vger.kernel.org List-ID: To: Nadav Amit Cc: Thomas Gleixner , LKML , Ingo Molnar , X86 ML , Arnd Bergmann , linux-arch , Dave Hansen , Jiri Kosina , Andy Lutomirski , Kees Cook , Dave Hansen Message-ID: <20180906202547.GoKcBHkmhWgw8vfCPq5Oi5LjQ3JAFSSRbRHmfZLNb0w@z> On Thu, Sep 06, 2018 at 07:58:40PM +0000, Nadav Amit wrote: > > With that CR3 trickery, we can rid ourselves of the text_mutex > > requirement, since concurrent text_poke is 'safe'. That would clean up > > the kgdb code quite a bit. > > I don’t know. I’m somewhat worried with multiple mechanisms potentially > changing the same code at the same time - and maybe ending up with some > mess. kgdb only pokes INT3, that should be pretty safe.