Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp721880ybm; Thu, 28 May 2020 13:27:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwxMK3kYC0weZUMUVc96w1ukkrNgWW6Uf+2NPJ8z8f5lFI6ONlAyBEBWtvPF/xRcBFJRc6n X-Received: by 2002:a17:906:f891:: with SMTP id lg17mr4551286ejb.405.1590697621715; Thu, 28 May 2020 13:27:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590697621; cv=none; d=google.com; s=arc-20160816; b=DQww2mXQ2JROAIjhZJ4Q5s438z9GvuhPPbBjwrlmKertLWRU8eftXOEHdxF9h+ndXG mkz3dfWosYOmv8Ok//+R36tXrf0SLnzp1s4u5+VVxrntKh7zTYijT3FTwFpMBSr31wE2 sY9JD3imy8heZm4ztHLxtSFYTM+GALAfatB+RqP9oRRWNmgUcz3bQKYxYHz3zlLMDFbs 6CRv5iXiU87bz1eACDqB3NfkgWWbgbb81AENGemLfrPm26h9mwJfaPf2FZniOlavCqaP i5wipkZOB+UuJ8q2rFgwtaUpvpCEHs6z3Dx/gNyX1PcvSP1dGc3yabAee8WTqKgQ/yUN DAvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:subject:cc:to :from:date:user-agent:message-id:dkim-signature; bh=6c1l8mv8BHX+LPR3tE4uLKCg0tOvdVhpWAI761gXwMc=; b=a8FiYmVG+IMrX50gysZjjUxD8BURK10UQuiwHj/KoWS6ULESdykIPDTvfjBUbRAJUY h1ndBxInFD2My9kf7XBrWPkL7nB6dzOF1bWTuPTvPrLlMJFdLAbehSy+DSUFx2YaXhtb wP/2wcSvuia51TSpJ/kuq7i1ep2EhdHI5qod50RQAGraoQ8IDzPkB76tEZaNZxICpsS/ 0hQbDL7YOnXSNMPlvD1yL9muSQshRxEx9ylXgbtBlT4nF/tVccV0Zd4Zwe+iQ4miON+x bi+5PSdWrDhrHUwd/jDXJD/ddgpPm9lBE6A+liLWgpT2aLUSHCyylEXPTLmjQ6ByG537 C1Gw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=lWg1JeIX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o25si4690993edz.324.2020.05.28.13.26.36; Thu, 28 May 2020 13:27:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=lWg1JeIX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407096AbgE1UYi (ORCPT + 99 others); Thu, 28 May 2020 16:24:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2407021AbgE1UYc (ORCPT ); Thu, 28 May 2020 16:24:32 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E0E77C08C5C6 for ; Thu, 28 May 2020 13:24:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=Content-Type:MIME-Version:References: Subject:Cc:To:From:Date:Message-ID:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:In-Reply-To; bh=6c1l8mv8BHX+LPR3tE4uLKCg0tOvdVhpWAI761gXwMc=; b=lWg1JeIXMFh7DksQ9qUBq/wXK+ Zd9gDLZ5VWM154XrVUmXObfDi+EdbsrNEPdyqCOatMc97HTTWpW75xupmVhJZl6W5AmOMhXNsyiv+ hfAUL/8Ite10nya3b9etDoB2jw3Ieir8+MPADyADw4NMka8Jw17i1wKX8LZNVIZ7N7gWWixLwt9+I TL5XdxA68uxBK79S6u+qsvAgXpI9bDVbQnokcUbaQHarGfLL1EKxhUAwCE+fTi5CPwnHs9oNdZRQk Q0wv3ThqRLKhs31RDqP7A0ncI0vGipQ1DKAZ84rLMX90qIcTaUS2TKnVZn+afrHlViIBg8SuH+fpJ VqFvkhog==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by bombadil.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1jeP4j-0005Zp-6V; Thu, 28 May 2020 20:24:25 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 3237030704D; Thu, 28 May 2020 22:24:23 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 0) id DF3B12BA01B1A; Thu, 28 May 2020 22:24:22 +0200 (CEST) Message-ID: <20200528202328.708732152@infradead.org> User-Agent: quilt/0.66 Date: Thu, 28 May 2020 22:19:43 +0200 From: Peter Zijlstra To: tglx@linutronix.de, luto@amacapital.net, peterz@infradead.org Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Lai Jiangshan , sean.j.christopherson@intel.com, andrew.cooper3@citrix.com, daniel.thompson@linaro.org Subject: [RFC][PATCH 6/6] x86/entry: Remove DBn stacks References: <20200528201937.038455891@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Both #DB itself, as all other IST users (NMI, #MC) now clear DR7 on entry. Combined with not allowing breakpoints on entry/noinstr/NOKPROBE text and no single step (EFLAGS.TF) inside the #DB handler should guarantee us no nested #DB. XXX depends on KGDB breakpoints not being stupid Signed-off-by: Peter Zijlstra (Intel) --- arch/x86/entry/entry_64.S | 13 ------------- arch/x86/include/asm/cpu_entry_area.h | 6 ------ arch/x86/kernel/asm-offsets_64.c | 3 --- arch/x86/kernel/dumpstack_64.c | 3 --- arch/x86/mm/cpu_entry_area.c | 1 - 5 files changed, 26 deletions(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -396,11 +396,6 @@ SYM_CODE_END(\asmsym) idtentry \vector asm_\cfunc \cfunc has_error_code=0 .endm -/* - * MCE and DB exceptions - */ -#define CPU_TSS_IST(x) PER_CPU_VAR(cpu_tss_rw) + (TSS_ist + (x) * 8) - /** * idtentry_mce_db - Macro to generate entry stubs for #MC and #DB * @vector: Vector number @@ -445,16 +440,8 @@ SYM_CODE_START(\asmsym) movq %rsp, %rdi /* pt_regs pointer */ - .if \vector == X86_TRAP_DB - subq $DB_STACK_OFFSET, CPU_TSS_IST(IST_INDEX_DB) - .endif - call \cfunc - .if \vector == X86_TRAP_DB - addq $DB_STACK_OFFSET, CPU_TSS_IST(IST_INDEX_DB) - .endif - jmp paranoid_exit /* Switch to the regular task stack and use the noist entry point */ --- a/arch/x86/include/asm/cpu_entry_area.h +++ b/arch/x86/include/asm/cpu_entry_area.h @@ -16,10 +16,6 @@ char DF_stack[EXCEPTION_STKSZ]; \ char NMI_stack_guard[guardsize]; \ char NMI_stack[EXCEPTION_STKSZ]; \ - char DB2_stack_guard[guardsize]; \ - char DB2_stack[db2_holesize]; \ - char DB1_stack_guard[guardsize]; \ - char DB1_stack[EXCEPTION_STKSZ]; \ char DB_stack_guard[guardsize]; \ char DB_stack[EXCEPTION_STKSZ]; \ char MCE_stack_guard[guardsize]; \ @@ -42,8 +38,6 @@ struct cea_exception_stacks { enum exception_stack_ordering { ESTACK_DF, ESTACK_NMI, - ESTACK_DB2, - ESTACK_DB1, ESTACK_DB, ESTACK_MCE, N_EXCEPTION_STACKS --- a/arch/x86/kernel/asm-offsets_64.c +++ b/arch/x86/kernel/asm-offsets_64.c @@ -57,9 +57,6 @@ int main(void) BLANK(); #undef ENTRY - OFFSET(TSS_ist, tss_struct, x86_tss.ist); - DEFINE(DB_STACK_OFFSET, offsetof(struct cea_exception_stacks, DB_stack) - - offsetof(struct cea_exception_stacks, DB1_stack)); BLANK(); #ifdef CONFIG_STACKPROTECTOR --- a/arch/x86/kernel/dumpstack_64.c +++ b/arch/x86/kernel/dumpstack_64.c @@ -22,8 +22,6 @@ static const char * const exception_stack_names[] = { [ ESTACK_DF ] = "#DF", [ ESTACK_NMI ] = "NMI", - [ ESTACK_DB2 ] = "#DB2", - [ ESTACK_DB1 ] = "#DB1", [ ESTACK_DB ] = "#DB", [ ESTACK_MCE ] = "#MC", }; @@ -79,7 +77,6 @@ static const struct estack_pages estack_pages[CEA_ESTACK_PAGES] ____cacheline_aligned = { EPAGERANGE(DF), EPAGERANGE(NMI), - EPAGERANGE(DB1), EPAGERANGE(DB), EPAGERANGE(MCE), }; --- a/arch/x86/mm/cpu_entry_area.c +++ b/arch/x86/mm/cpu_entry_area.c @@ -107,7 +107,6 @@ static void __init percpu_setup_exceptio */ cea_map_stack(DF); cea_map_stack(NMI); - cea_map_stack(DB1); cea_map_stack(DB); cea_map_stack(MCE); }