Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp7250ybm; Thu, 28 May 2020 14:39:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbg03FWWaWQu8+IVAx4leeHk6AmnqSdrOUfNaoORSa5gt0jtPtgoDUFTixlrgPaxNd3d/b X-Received: by 2002:aa7:cc84:: with SMTP id p4mr5335046edt.216.1590701972739; Thu, 28 May 2020 14:39:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590701972; cv=none; d=google.com; s=arc-20160816; b=HnPxNlFGP/wzutS3j4tUb2y1JuLsMK2zXyDPxleLwjccBK7Gie8VZcJQmsrDn02BcF CJOeSbCgpTO+nRwKsYQ//a9USp9xvSLvVAFImzhYmwrerbZAwo4W6bcNxLqyh6KOSnu4 HU35hS+XSrhB+iwSfvCHcnvyFSbw8kqXlbWGulOpWAzqPCRypa8ROa2rW01gD/xI7J+8 0/Mr72osk7rFChotv4uNHU7lSCIdwYNVbf5+Ox0hsliyfXGg+vCyTa1+8/8skBAnJ/Ry k7tBhqV86Eerwj652bC6oS6UdfYywUaAxizUK8ey3l9y9Gi7IeC4F2i3+df8UmZO4Ef+ 0eJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=0Dk9pDi5A0Grl+33dKekzFj/v7tOenmN7kNP8GX+NOA=; b=OrYwAj8V5bU7dceoKPr3tYTK1+Xco4OqAL7xTIMzcIs/RmUnfoVxOAtGY8wNTXrGlr u5qL3Zh3qkVWe7q1S6CRwjWbDSzX6lX/MJ/QmWmngOxZwRzFYbvUfjA/9GHG5KJ1vY// sS0HQu9yLgV/oka/wftHa0GV1foc4Y6WAdsn37aFEsDHDQC6CKoph/aqBs/14YwVhtFt SGXE+U4VkRKNvv3mKQQq+wtf78rSkZB7PMjTk6ILTI4OpxmdgegUjML5eDw0JvJbAxxV WinzjQaNB8twrxIo0f2y/kH9hbGwJAsrD+2/2KeD1QukJLelzbI+Yc1+HRkMgbhGByqD FWYQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p5si4231592edx.68.2020.05.28.14.39.09; Thu, 28 May 2020 14:39:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2436646AbgE1VhE (ORCPT + 99 others); Thu, 28 May 2020 17:37:04 -0400 Received: from ppsw-31.csi.cam.ac.uk ([131.111.8.131]:33090 "EHLO ppsw-31.csi.cam.ac.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2436603AbgE1VhC (ORCPT ); Thu, 28 May 2020 17:37:02 -0400 X-Cam-AntiVirus: no malware found X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus Received: from 88-109-182-220.dynamic.dsl.as9105.com ([88.109.182.220]:60864 helo=[192.168.1.219]) by ppsw-31.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.157]:465) with esmtpsa (PLAIN:amc96) (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) id 1jeQCt-000ve8-Jk (Exim 4.92.3) (return-path ); Thu, 28 May 2020 22:36:55 +0100 Subject: Re: [PATCH 1/6] x86/entry: Introduce local_db_{save,restore}() To: Peter Zijlstra Cc: tglx@linutronix.de, luto@amacapital.net, linux-kernel@vger.kernel.org, x86@kernel.org, Lai Jiangshan , sean.j.christopherson@intel.com, daniel.thompson@linaro.org References: <20200528201937.038455891@infradead.org> <20200528202328.418625592@infradead.org> <17e097f5-f92c-bd7e-fb1d-ee08c4169dbe@citrix.com> <20200528211550.GR2483@worktop.programming.kicks-ass.net> From: Andrew Cooper Message-ID: <8831da5e-b65d-a4e8-2a3b-ac46282f4591@citrix.com> Date: Thu, 28 May 2020 22:36:54 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200528211550.GR2483@worktop.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-GB Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28/05/2020 22:15, Peter Zijlstra wrote: > On Thu, May 28, 2020 at 09:52:30PM +0100, Andrew Cooper wrote: >> On 28/05/2020 21:19, Peter Zijlstra wrote: >>> --- a/arch/x86/include/asm/debugreg.h >>> +++ b/arch/x86/include/asm/debugreg.h >>> @@ -113,6 +113,31 @@ static inline void debug_stack_usage_inc >>> static inline void debug_stack_usage_dec(void) { } >>> #endif /* X86_64 */ >>> >>> +static __always_inline void local_db_save(unsigned long *dr7) >>> +{ >>> + get_debugreg(*dr7, 7); >>> + if (*dr7) >>> + set_debugreg(0, 7); >> %dr7 has an architecturally stuck bit in it. >> >> You want *dr7 != 0x400 to avoid writing 0 unconditionally. > Do we have to have that bit set when writing it? Otherwise I might > actually prefer masking it out. Not currently.  I guess it depends on how likely %dr7 is to gain an inverted polarity bit like %dr6 did. ~Andrew