Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1966276ybk; Mon, 11 May 2020 08:35:58 -0700 (PDT) X-Google-Smtp-Source: APiQypIQfaaRi6KWxfMySN5mAGj/59yOk7+CuNGoxyMV5Wd+e5P/8/VkfPuydgjMq8ESRQwBICuo X-Received: by 2002:a50:cdc8:: with SMTP id h8mr13625346edj.26.1589211357916; Mon, 11 May 2020 08:35:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589211357; cv=none; d=google.com; s=arc-20160816; b=UCW1X3l+SmrZEaSHWOIH30PQoJoaEID3Ratwf0cHfAThcfCKgT0bYW0658l6qffICB rjRSkaBHqs8dJ72TSrNemEbei++2KJInp9Fp+ETamBU7KKJ35HaR4C3aXAp+NBvWLdc5 uER6WiveqtUE3hWMP+hNBTrofT7eofdCAX5BMjA4VvNFT99QUIajniTcALpCoJwqSc7O HG28zmVCL38xCZdXn4xcIINwdQZxvTT2AGO+HmBWE1evV0ElSwTbMSwfjfTKjwT0ZpQj ZHZfLkeTtnC2BOzqJuJX5MXwa+8BxZo5zclfF9t2zuJQaqH8cbsHxaeYBxGsG7xytAci 0z2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=pe0ja/2ZxjiibVywNdczGw1JKOAU4yrKg57V1y4STCw=; b=MQkf7ZUMoGupoRBdmOokdz69MbHBlEQDSqW1/LoZWUIarXM0e5qhQNFm+XHcCTrAEb z7IBxaH4G/lVQdBTUeLJaccThSs038U5/n/LKWgk4Iqbymyt6XTwYvMdBWywp04/gjaL Hc4hcl3JEPgJLAg/X4HY4/c1oisHVBmuu2gHgy3b8/r2dP+VS8uQ+H9jtpc7cluZ5JVr hXRTJOfM4QDSIZ8pOHOE35Zep2TsYgt767Ri3IumwlDW2eaStQ+lWrQdAX/7jpPgO5jQ Mnj024J5r2+d2GzGIjbr9sL7l5eQBB89xgd5lC1Il2mb4iCRuSmFVDhiV+f5JINO59EI BtgA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jES46bsx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d6si7187064edo.493.2020.05.11.08.35.31; Mon, 11 May 2020 08:35:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jES46bsx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729725AbgEKPbg (ORCPT + 99 others); Mon, 11 May 2020 11:31:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:60720 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727019AbgEKPbg (ORCPT ); Mon, 11 May 2020 11:31:36 -0400 Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 555D220722 for ; Mon, 11 May 2020 15:31:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589211095; bh=gSFwgi6KRNOf6GXeGdW9MNXB6P4io37niSrrQMmZOVA=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=jES46bsxQhNuWgu9nt3PSsoehA/8Ww43cjESs9Weung5mg3SY7yHvdoMQ+pvWBMiX 5nLI29a8ojfwZBxxNnnYpAI7Vnher8EnHkaJxokzchnPnASIxBzGpJW5Qe79znCeUz DnzA8arCY4gUTBZSipwlGJRDmuDRIBaeYmYBz64w= Received: by mail-wm1-f50.google.com with SMTP id g14so7139651wme.1 for ; Mon, 11 May 2020 08:31:35 -0700 (PDT) X-Gm-Message-State: AGi0PuYNum0UgmQLuvi2DRfHQGnZEN4vumdgVvT/yrReC6xhAZM/vEqQ TObtSZNS7pHNZriq00CKgRpvhWIT/i/25piVkRTE4A== X-Received: by 2002:a7b:c74d:: with SMTP id w13mr31085022wmk.36.1589211093752; Mon, 11 May 2020 08:31:33 -0700 (PDT) MIME-Version: 1.0 References: <20200505134354.774943181@linutronix.de> <20200505134904.457578656@linutronix.de> <874ksm7n5d.fsf@nanos.tec.linutronix.de> In-Reply-To: <874ksm7n5d.fsf@nanos.tec.linutronix.de> From: Andy Lutomirski Date: Mon, 11 May 2020 08:31:22 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [patch V5 part 3 12/29] x86/entry/common: Provide idtentry_enter/exit() To: Thomas Gleixner Cc: Andy Lutomirski , LKML , X86 ML , "Paul E. McKenney" , Alexandre Chartre , Frederic Weisbecker , Paolo Bonzini , Sean Christopherson , Masami Hiramatsu , Petr Mladek , Steven Rostedt , Joel Fernandes , Boris Ostrovsky , Juergen Gross , Brian Gerst , Mathieu Desnoyers , Josh Poimboeuf , Will Deacon Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 11, 2020 at 3:59 AM Thomas Gleixner wrote: > > Andy Lutomirski writes: > >> + * Invoked by all exception/interrupt IDTENTRY handlers which are not > >> + * returning through the paranoid exit path (all except NMI, #DF and the IST > >> + * variants of #MC and #DB). > > > +void noinstr idtentry_exit(struct pt_regs *regs) > +{ > + lockdep_assert_irqs_disabled(); > + > + if (IS_ENABLED(CONFIG_DEBUG_ENTRY)) > + WARN_ON_ONCE(!on_thread_stack()); Whoops. After sleeping on this, this is obviously wrong. If this is something like a page fault, we can be on an IST or IRQ stack. Perhaps the actual condition should be: WARN_ON_ONCE(!on_thread_stack() && (regs->flags & X86_FLAGS_IF) && preempt_count() == 0); IOW, the actual condition we want is that, if the idtenter_entry/exit code might schedule or if a cond_local_irq_enable() path might schedule, we had better be on the correct stack. Sorry for causing confusion.