Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4042028imu; Mon, 7 Jan 2019 14:27:52 -0800 (PST) X-Google-Smtp-Source: ALg8bN76pFtThe7N2ubbNUyJKAMsjt8uNo/j6SzY8zDxXDtYG343SvCrU2Xq5oGdi9Sp7BT7s0D1 X-Received: by 2002:a17:902:aa4c:: with SMTP id c12mr62796873plr.48.1546900072399; Mon, 07 Jan 2019 14:27:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546900072; cv=none; d=google.com; s=arc-20160816; b=qWP8ks/sOKLzJKvWXt5atCrpVlBJjoLKgsITL+yU2kkttD/q/qBppV35STOXwVKJOE H5CWk59MbU7Aat6XdgEe+DtwUGD54uEuUVDC2VFDpiyZ4qWsFglvupWhrPncmik4UpEQ znkZdO4Ce0I1cxaQICdMW9JSFXMIKa+b1ZzWB+aKLkZu4MZfoZGw0ze1qAvImULanTz9 p+cTUXRJET9V8mqys5VhOtF/p74PX4mn1z4SaBpidkxSEvEBUSkGTi2sHhMhol3NIp+I XtcE6ozWKvFBg0Ei1WKU1j3gZFuG926ep/ds4hpLEe+ynC7UhMhZEDO2lOZf6ki2Oxt7 XUkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=tGqS5Ak6/r3zvAIevSmtgYjk+Hq2egFxx9BqcBNXpPI=; b=lMJ2dIDsEJCBRyJpPKjycvhdNWAXdQch5rV6rMjJGECUL08SMKJbAA+GsRS9wTmsya r4ipu+0ghYXQZBm7wSxDjGeJQ+HlY6rcLIvvdv8Y5ArtGnpKrw59ehUudNXvN8QiH+Cw HskKF2cMu7Lwka1oTsAwpPLUOKcmSwQAhXos4eyYVR5DqEm6FjLnk6+aB7t5utPf3yNT 2mN61IiOHXUWm7Itiagkg4sMiSe3Ngf8fLm/eaPq2DjAKkGIRss0oy++HQI+oZ8WU0u0 Z7FxlN6QO0lPqcjORgGif4RTy8Ms0wtn4xhJRj7yrebLeFgSdyCYd8ftNKOMlNsm0ZEn a2Ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rX3E4pvg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n3si11887524pld.36.2019.01.07.14.27.36; Mon, 07 Jan 2019 14:27:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rX3E4pvg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727237AbfAGWIk (ORCPT + 99 others); Mon, 7 Jan 2019 17:08:40 -0500 Received: from mail-ed1-f65.google.com ([209.85.208.65]:33542 "EHLO mail-ed1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726767AbfAGWIk (ORCPT ); Mon, 7 Jan 2019 17:08:40 -0500 Received: by mail-ed1-f65.google.com with SMTP id p6so2402891eds.0 for ; Mon, 07 Jan 2019 14:08:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=tGqS5Ak6/r3zvAIevSmtgYjk+Hq2egFxx9BqcBNXpPI=; b=rX3E4pvgdfZ/GmpYH9TqvCKuaZWPoS3xV78T4SfQoukpfW4E2y/O+H1QZG0T9tN07p qN9dP4EtB08wwqVTLqcbPLMd6y+qxNfb6urcjRH2SXAAPD5mtgpiPpBobLCUg3bpH/8e ygGVux42oWENAoICeU+KdEpv209/ceoBCjnvo9h5SV6rkU6FcdUOoXf/OBp1u9UwPKli PY53DCWZmmxSQnMUrY6wfy7KYKURkcCm2nArloScJpQwj4C55YsjlHhyIDirXkJvWCRA k6fADFhZQIB1Ly/fac+5KEdfKjj9QTYotncMDmDJoXXS6Ym5ZAiXykG316iY+39lGrGb KFnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=tGqS5Ak6/r3zvAIevSmtgYjk+Hq2egFxx9BqcBNXpPI=; b=mP0hPJYdMMOkvZ6ojMnL36xzBXDfoB/AdPlK4RmCOf7ynV45XnHSRsKgrXCmhtcnPa 1qg/FBpW0dq01o1eutFzfhjWeDQpBKDXubc50uuE7dLN+siNWL5EIZTuEd/qRlQxUHWE vTWjYr8LydX3fyc9aJn2NLWSNhEghNBTKXL4HqXfLTl7sHRA7cXXwQpADOoBJKzoQoFy wQOi6WuH/7VxsvuGe5n+i3xfG9h33JvoyqItASdP8Wqzeefm3yz1bV8djD3GF73zVGfL aV8m3v71HOaARxsqagg1QyCIsVsGTrmJILEwhnRcyzi3qZSpf0hkM9kxIuHaBMYzRrna Rb4A== X-Gm-Message-State: AJcUukcoCAecIR7LM+UNMi1wpd0281o4ihYSuCwiPDDVmGajh5M5NHVa BrOfX3EyDxUEPIYyZDKDY2XdF3n7djEZ9rTJ8kXinA== X-Received: by 2002:a50:d753:: with SMTP id i19mr16919054edj.75.1546898918303; Mon, 07 Jan 2019 14:08:38 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Marc Dionne Date: Mon, 7 Jan 2019 18:08:26 -0400 Message-ID: Subject: Re: x86/fpu: Don't export __kernel_fpu_{begin,end}() To: Sebastian Andrzej Siewior Cc: Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 27, 2018 at 11:20 AM Linux Kernel Mailing List wrote: > > Commit: 12209993e98c5fa1855c467f22a24e3d5b8be205 > Parent: 2f2fcc40a961ed04f0e130803fbaa868c2899310 > Refname: refs/heads/master > Web: https://git.kernel.org/torvalds/c/12209993e98c5fa1855c467f22a= 24e3d5b8be205 > Author: Sebastian Andrzej Siewior > AuthorDate: Thu Nov 29 16:02:10 2018 +0100 > Committer: Borislav Petkov > CommitDate: Tue Dec 4 12:37:28 2018 +0100 > > x86/fpu: Don't export __kernel_fpu_{begin,end}() > > There is one user of __kernel_fpu_begin() and before invoking it, > it invokes preempt_disable(). So it could invoke kernel_fpu_begin() > right away. The 32bit version of arch_efi_call_virt_setup() and > arch_efi_call_virt_teardown() does this already. > > The comment above *kernel_fpu*() claims that before invoking > __kernel_fpu_begin() preemption should be disabled and that KVM is a > good example of doing it. Well, KVM doesn't do that since commit > > f775b13eedee2 ("x86,kvm: move qemu/guest FPU switching out to vcpu_= run") > > so it is not an example anymore. > > With EFI gone as the last user of __kernel_fpu_{begin|end}(), both ca= n > be made static and not exported anymore. > > Signed-off-by: Sebastian Andrzej Siewior > Signed-off-by: Borislav Petkov > Reviewed-by: Rik van Riel > Cc: "H. Peter Anvin" > Cc: "Jason A. Donenfeld" > Cc: Andy Lutomirski > Cc: Ard Biesheuvel > Cc: Dave Hansen > Cc: Ingo Molnar > Cc: Nicolai Stange > Cc: Paolo Bonzini > Cc: Radim Kr=C4=8Dm=C3=A1=C5=99 > Cc: Thomas Gleixner > Cc: kvm ML > Cc: linux-efi > Cc: x86-ml > Link: https://lkml.kernel.org/r/20181129150210.2k4mawt37ow6c2vq@linut= ronix.de > --- > arch/x86/include/asm/efi.h | 6 ++---- > arch/x86/include/asm/fpu/api.h | 15 +++++---------- > arch/x86/kernel/fpu/core.c | 6 ++---- > 3 files changed, 9 insertions(+), 18 deletions(-) > > diff --git a/arch/x86/include/asm/efi.h b/arch/x86/include/asm/efi.h > index eea40d52ca78..45864898f7e5 100644 > --- a/arch/x86/include/asm/efi.h > +++ b/arch/x86/include/asm/efi.h > @@ -82,8 +82,7 @@ struct efi_scratch { > #define arch_efi_call_virt_setup() \ > ({ \ > efi_sync_low_kernel_mappings(); \ > - preempt_disable(); \ > - __kernel_fpu_begin(); \ > + kernel_fpu_begin(); \ > firmware_restrict_branch_speculation_start(); \ > \ > if (!efi_enabled(EFI_OLD_MEMMAP)) \ > @@ -99,8 +98,7 @@ struct efi_scratch { > efi_switch_mm(efi_scratch.prev_mm); \ > \ > firmware_restrict_branch_speculation_end(); \ > - __kernel_fpu_end(); \ > - preempt_enable(); \ > + kernel_fpu_end(); \ > }) > > extern void __iomem *__init efi_ioremap(unsigned long addr, unsigned lon= g size, > diff --git a/arch/x86/include/asm/fpu/api.h b/arch/x86/include/asm/fpu/ap= i.h > index a9caac9d4a72..b56d504af654 100644 > --- a/arch/x86/include/asm/fpu/api.h > +++ b/arch/x86/include/asm/fpu/api.h > @@ -12,17 +12,12 @@ > #define _ASM_X86_FPU_API_H > > /* > - * Careful: __kernel_fpu_begin/end() must be called with preempt disable= d > - * and they don't touch the preempt state on their own. > - * If you enable preemption after __kernel_fpu_begin(), preempt notifier > - * should call the __kernel_fpu_end() to prevent the kernel/user FPU > - * state from getting corrupted. KVM for example uses this model. > - * > - * All other cases use kernel_fpu_begin/end() which disable preemption > - * during kernel FPU usage. > + * Use kernel_fpu_begin/end() if you intend to use FPU in kernel context= . It > + * disables preemption so be careful if you intend to use it for long pe= riods > + * of time. > + * If you intend to use the FPU in softirq you need to check first with > + * irq_fpu_usable() if it is possible. > */ > -extern void __kernel_fpu_begin(void); > -extern void __kernel_fpu_end(void); > extern void kernel_fpu_begin(void); > extern void kernel_fpu_end(void); > extern bool irq_fpu_usable(void); > diff --git a/arch/x86/kernel/fpu/core.c b/arch/x86/kernel/fpu/core.c > index 2ea85b32421a..2e5003fef51a 100644 > --- a/arch/x86/kernel/fpu/core.c > +++ b/arch/x86/kernel/fpu/core.c > @@ -93,7 +93,7 @@ bool irq_fpu_usable(void) > } > EXPORT_SYMBOL(irq_fpu_usable); > > -void __kernel_fpu_begin(void) > +static void __kernel_fpu_begin(void) > { > struct fpu *fpu =3D ¤t->thread.fpu; > > @@ -111,9 +111,8 @@ void __kernel_fpu_begin(void) > __cpu_invalidate_fpregs_state(); > } > } > -EXPORT_SYMBOL(__kernel_fpu_begin); > > -void __kernel_fpu_end(void) > +static void __kernel_fpu_end(void) > { > struct fpu *fpu =3D ¤t->thread.fpu; > > @@ -122,7 +121,6 @@ void __kernel_fpu_end(void) > > kernel_fpu_enable(); > } > -EXPORT_SYMBOL(__kernel_fpu_end); > > void kernel_fpu_begin(void) > { This commit removes an exported function pair that is currently used by out of tree modules, while the replacement pair (kernel_fpu_begin/end) is EXPORT_SYMBOL_GPL. So this is making existing functionality GPL only, which will probably be an issue for several out of tree modules that use the fpu. Could kernel_fpu_begin/end be made plain EXPORT_SYMBOL? Marc