Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp4209907ybv; Tue, 25 Feb 2020 15:32:01 -0800 (PST) X-Google-Smtp-Source: APXvYqwn9hJ8N4oWOsGi2f8yMXaOMfhjurGWld3inuouRP7f0zmyxLmGndaLb371BGVMma9R1Kvw X-Received: by 2002:a05:6830:22ee:: with SMTP id t14mr794599otc.236.1582673521760; Tue, 25 Feb 2020 15:32:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582673521; cv=none; d=google.com; s=arc-20160816; b=usU6AEEtzI7ys5swM1w+ll5gB0G9MMlNuV1maJZi9zzuOtXd1vHBKbcr4jHWTKuxlo o+3lvkLNcxYLVCzJO+1+6KuRFSCYy+NG9LeVeMnyXzeOsiGWECCV50lhOZdQe+FSsWfb pPY5jkwVQMeq8mYX8a7atIVDVK0yCKc6qzIrmAzNpodDnx5eoOlW5fr40buOQ1kXQx1c 1M+6pidrdWuUbsrCtFbLfPsSXUx+9ZYwEajEIx8yAeHUnK1884qmrw3gMfWyKlkVRbBi GeK/swhcU2YW5Fk3F7PkZGcpjkxBO2kG4/9TdaPOZkLS8s9RrIuy3cAmrgKtCqegCqZs nkcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:subject:cc:to :from:date:user-agent:message-id; bh=GLyP4YDdfUPdfphnazybqsifTiLMZMH6p3N01azY2dM=; b=xFM+GclGMIkI8ZTmb99fhpL8s/cPX05HH7JGRmkp0XgcOhtXu+ZRc6MjEE3/r7w5p+ Uqn5CLApu8lAsOth7DDEHRobGZy8+zjsHqWzydmcLsEPAksXncnhmObyU/yTVzuD9a7c njt86Pe2FbyXejXi71jDr6jf3vuW/gnneJcXzafSI8E9/u0N/cVU8u+UaJSpQ5bJmiz7 cT+GEKNGEE3aBwG4efy4ffDJPX8u88Kf1mieLAm47DHhPURY331rXaqnJRYOs5hiSLG5 5+ozk+bQ3HlfyaohxsyEFKI0/zKn9oh1mBD3GfHyWFmxHHCZgtfH49WtjhcLkMnTLKFI yeXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j13si182614otq.146.2020.02.25.15.31.50; Tue, 25 Feb 2020 15:32:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730464AbgBYXaZ (ORCPT + 99 others); Tue, 25 Feb 2020 18:30:25 -0500 Received: from Galois.linutronix.de ([193.142.43.55]:55545 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729553AbgBYXZx (ORCPT ); Tue, 25 Feb 2020 18:25:53 -0500 Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1j6ja8-0004bl-Aq; Wed, 26 Feb 2020 00:25:40 +0100 Received: from nanos.tec.linutronix.de (localhost [IPv6:::1]) by nanos.tec.linutronix.de (Postfix) with ESMTP id DD5DF104089; Wed, 26 Feb 2020 00:25:33 +0100 (CET) Message-Id: <20200225221306.026841950@linutronix.de> User-Agent: quilt/0.65 Date: Tue, 25 Feb 2020 23:08:09 +0100 From: Thomas Gleixner To: LKML Cc: x86@kernel.org, Steven Rostedt , Brian Gerst , Juergen Gross , Paolo Bonzini , Arnd Bergmann Subject: [patch 8/8] x86/entry: Move irqflags tracing to do_int80_syscall_32() References: <20200225220801.571835584@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org which cleans up the ASM maze. Signed-off-by: Thomas Gleixner --- arch/x86/entry/common.c | 8 +++++++- arch/x86/entry/entry_32.S | 9 ++------- arch/x86/entry/entry_64_compat.S | 14 +++++--------- 3 files changed, 14 insertions(+), 17 deletions(-) --- a/arch/x86/entry/common.c +++ b/arch/x86/entry/common.c @@ -333,6 +333,7 @@ void do_syscall_64_irqs_on(unsigned long { syscall_entry_fixups(); do_syscall_64_irqs_on(nr, regs); + trace_hardirqs_on(); } NOKPROBE_SYMBOL(do_syscall_64); #endif @@ -389,6 +390,7 @@ static __always_inline void do_syscall_3 { syscall_entry_fixups(); do_syscall_32_irqs_on(regs); + trace_hardirqs_on(); } NOKPROBE_SYMBOL(do_int80_syscall_32); @@ -468,8 +470,12 @@ static __always_inline long do_fast_sysc /* Returns 0 to return using IRET or 1 to return using SYSEXIT/SYSRETL. */ __visible notrace long do_fast_syscall_32(struct pt_regs *regs) { + long ret; + syscall_entry_fixups(); - return do_fast_syscall_32_irqs_on(regs); + ret = do_fast_syscall_32_irqs_on(regs); + trace_hardirqs_on(); + return ret; } NOKPROBE_SYMBOL(do_fast_syscall_32); --- a/arch/x86/entry/entry_32.S +++ b/arch/x86/entry/entry_32.S @@ -811,8 +811,7 @@ SYM_CODE_START(ret_from_fork) /* When we fork, we trace the syscall return in the child, too. */ movl %esp, %eax call syscall_return_slowpath - STACKLEAK_ERASE - jmp restore_all_switch_stack + jmp .Lsyscall_32_done /* kernel thread */ 1: movl %edi, %eax @@ -968,8 +967,7 @@ SYM_FUNC_START(entry_SYSENTER_32) STACKLEAK_ERASE -/* Opportunistic SYSEXIT */ - TRACE_IRQS_ON /* User mode traces as IRQs on. */ + /* Opportunistic SYSEXIT */ /* * Setup entry stack - we keep the pointer in %eax and do the @@ -1072,11 +1070,8 @@ SYM_FUNC_START(entry_INT80_32) movl %esp, %eax call do_int80_syscall_32 .Lsyscall_32_done: - STACKLEAK_ERASE -restore_all: - TRACE_IRQS_IRET restore_all_switch_stack: SWITCH_TO_ENTRY_STACK CHECK_AND_APPLY_ESPFIX --- a/arch/x86/entry/entry_64_compat.S +++ b/arch/x86/entry/entry_64_compat.S @@ -132,8 +132,8 @@ SYM_FUNC_START(entry_SYSENTER_compat) movq %rsp, %rdi call do_fast_syscall_32 /* XEN PV guests always use IRET path */ - ALTERNATIVE "testl %eax, %eax; jz .Lsyscall_32_done", \ - "jmp .Lsyscall_32_done", X86_FEATURE_XENPV + ALTERNATIVE "testl %eax, %eax; jz swapgs_restore_regs_and_return_to_usermode", \ + "jmp swapgs_restore_regs_and_return_to_usermode", X86_FEATURE_XENPV jmp sysret32_from_system_call .Lsysenter_fix_flags: @@ -244,8 +244,8 @@ SYM_INNER_LABEL(entry_SYSCALL_compat_aft movq %rsp, %rdi call do_fast_syscall_32 /* XEN PV guests always use IRET path */ - ALTERNATIVE "testl %eax, %eax; jz .Lsyscall_32_done", \ - "jmp .Lsyscall_32_done", X86_FEATURE_XENPV + ALTERNATIVE "testl %eax, %eax; jz swapgs_restore_regs_and_return_to_usermode", \ + "jmp swapgs_restore_regs_and_return_to_usermode", X86_FEATURE_XENPV /* Opportunistic SYSRET */ sysret32_from_system_call: @@ -254,7 +254,7 @@ SYM_INNER_LABEL(entry_SYSCALL_compat_aft * stack. So let's erase the thread stack right now. */ STACKLEAK_ERASE - TRACE_IRQS_ON /* User mode traces as IRQs on. */ + movq RBX(%rsp), %rbx /* pt_regs->rbx */ movq RBP(%rsp), %rbp /* pt_regs->rbp */ movq EFLAGS(%rsp), %r11 /* pt_regs->flags (in r11) */ @@ -393,9 +393,5 @@ SYM_CODE_START(entry_INT80_compat) movq %rsp, %rdi call do_int80_syscall_32 -.Lsyscall_32_done: - - /* Go back to user mode. */ - TRACE_IRQS_ON jmp swapgs_restore_regs_and_return_to_usermode SYM_CODE_END(entry_INT80_compat)