Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp524599ybg; Fri, 12 Jun 2020 07:46:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5XLFy87o0wDJAOEKjLI+cZXHzUmh6RMJezSbFMT8kq8PysQocil65pIkyeT20LkYz0zDY X-Received: by 2002:a17:906:360b:: with SMTP id q11mr9160204ejb.290.1591973180010; Fri, 12 Jun 2020 07:46:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591973180; cv=none; d=google.com; s=arc-20160816; b=a5tU9Eta6hAswzWVSpCbR2P+DmKVrzliE8k+UnQ+FFYA9n5nEsyTGU374uG9CLhqmb eYq5u7YdwvXulZDfIa6zuKQJbDpVgfK1ZZSGU2i5ib+j1i3pJ7w8W6JABvyq07/p6Srj 3fOZN2fJn2exTxzpzc6ivcace2gC7MpPs3XK0cIacGLlPAMyx2JcOlR0mSH92SyUeWZm 3ie6wk//q41WnuLp6QbdmloEpbApa6XYPhnN35Vpnl8dhYuxK1WTJ+lh72hnAT3RRvoT pFINxN+0mbsW5F7blGTVZDLnYu+e7Q3aJfjCAc8qv8nvMXGtnkFtcXmP/+OsZmFkyQyT guPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=F4aKUcJ1CUilxeIZ8AeYvtFw5dxl82lln2nonhRSl5Q=; b=CXLT7aZ8fK2U1Gk5D+gqIn0ZvTk+JwU6xJZn1pB01I6nZsGx0pPsE4qgHqXls2kWVw SS91gWUueNSz26BQrMyCgoex2B/ClzKu/03BZTk4bl2I8sXs89B0ypCMdHu+RePSXtA/ 1mL5vwU2nNCUiqaT6L5fJkBbROX1E1RzkMKtT0UV59JRB0JtRYkgEEdEGlvgkbnWfKrD rQ2cdpkoHsHaCVXa0sMFTo6Hqspt5nYCw/ZtUCySMb0vXNR5LgMjdVy0giL0Yeh6dEdH LJ2TJiVzsviYb+SInymsG859CWEFciniuKaazNnoOof1rmdGIGMszvToLGdsVFsj0wXh Jupg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t9si3727818eds.213.2020.06.12.07.45.57; Fri, 12 Jun 2020 07:46:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726307AbgFLOlZ (ORCPT + 99 others); Fri, 12 Jun 2020 10:41:25 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:38299 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726255AbgFLOlZ (ORCPT ); Fri, 12 Jun 2020 10:41:25 -0400 Received: from ip5f5af183.dynamic.kabel-deutschland.de ([95.90.241.131] helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jjkrw-0002S8-Ok; Fri, 12 Jun 2020 14:41:20 +0000 Date: Fri, 12 Jun 2020 16:41:20 +0200 From: Christian Brauner To: "Tan, Ley Foon" Cc: Arnd Bergmann , "linux-kernel@vger.kernel.org" , Thomas Gleixner , Sebastian Andrzej Siewior Subject: Re: [PATCH] nios2: enable HAVE_COPY_THREAD_TLS, switch to kernel_clone_args Message-ID: <20200612144120.tzjs675xjsu4wkkf@wittgenstein> References: <20200524100606.1378815-1-christian.brauner@ubuntu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 12, 2020 at 06:20:48AM +0000, Tan, Ley Foon wrote: > > > > -----Original Message----- > > From: Christian Brauner > > Sent: Sunday, May 24, 2020 6:06 PM > > To: Tan, Ley Foon ; Arnd Bergmann > > > > Cc: linux-kernel@vger.kernel.org; Thomas Gleixner ; > > Sebastian Andrzej Siewior ; Christian Brauner > > > > Subject: [PATCH] nios2: enable HAVE_COPY_THREAD_TLS, switch to > > kernel_clone_args > > > > This is part of a larger series that aims at getting rid of the > > copy_thread()/copy_thread_tls() split that makes the process creation > > codepaths in the kernel more convoluted and error-prone than they need to > > be. > > I'm converting all the remaining arches that haven't yet switched and am > > collecting individual acks. Once I have them, I'll send the whole series > > removing the copy_thread()/copy_thread_tls() split, the > > HAVE_COPY_THREAD_TLS define and the legacy do_fork() helper. The only > > kernel-wide process creation entry point for anything not going directly > > through the syscall path will then be based on struct kernel_clone_args. > > No more danger of weird process creation abi quirks between architectures > > hopefully, and easier to maintain overall. > > It also unblocks implementing clone3() on architectures not support > > copy_thread_tls(). Any architecture that wants to implement clone3() will > > need to select HAVE_COPY_THREAD_TLS and thus need to implement > > copy_thread_tls(). So both goals are connected but independently beneficial. > > > > HAVE_COPY_THREAD_TLS means that a given architecture supports > > CLONE_SETTLS and not setting it should usually mean that the architectures > > doesn't implement it but that's not how things are. In fact all architectures > > support CLONE_TLS it's just that they don't follow the calling convention that > > HAVE_COPY_THREAD_TLS implies. That means all architectures can be > > switched over to select HAVE_COPY_THREAD_TLS. Once that is done we can > > remove that macro (yay, less code), the unnecessary do_fork() export in > > kernel/fork.c, and also rename copy_thread_tls() back to copy_thread(). At > > this point > > copy_thread() becomes the main architecture specific part of process > > creation but it will be the same layout and calling convention for all > > architectures. (Once that is done we can probably cleanup each > > copy_thread() function even more but that's for the future.) > > > > Since nios2 does support CLONE_SETTLS there's no reason to not select > > HAVE_COPY_THREAD_TLS. This brings us one step closer to getting rid of the > > copy_thread()/copy_thread_tls() split we still have and ultimately the > > HAVE_COPY_THREAD_TLS define in general. A lot of architectures have > > already converted and nios2 is one of the few hat haven't yet. This also > > unblocks implementing the clone3() syscall on nios2. Once that is done we > > can get of another ARCH_WANTS_* macro. > > > > Once Any architecture that supports HAVE_COPY_THREAD_TLS cannot call > > the > > do_fork() helper anymore. This is fine and intended since it should be > > removed in favor of the new, cleaner _do_fork() calling convention based on > > struct kernel_clone_args. In fact, most architectures have already switched. > > With this patch, nios2 joins the other arches which can't use the fork(), > > vfork(), clone(), clone3() syscalls directly and who follow the new process > > creation calling convention that is based on struct kernel_clone_args which > > we introduced a while back. This means less custom assembly in the > > architectures entry path to set up the registers before calling into the process > > creation helper and it is easier to to support new features without having to > > adapt calling conventions. It also unifies all process creation paths between > > fork(), vfork(), clone(), and clone3(). (We can't fix the ABI nightmare that > > legacy > > clone() is but we can prevent stuff like this happening in the future.) > > > > For some more context, please see: > > commit 606e9ad20094f6d500166881d301f31a51bc8aa7 > > Merge: ac61145a725a 457677c70c76 > > Author: Linus Torvalds > > Date: Sat Jan 11 15:33:48 2020 -0800 > > > > Merge tag 'clone3-tls-v5.5-rc6' of > > git://git.kernel.org/pub/scm/linux/kernel/git/brauner/linux > > > > Pull thread fixes from Christian Brauner: > > "This contains a series of patches to fix CLONE_SETTLS when used with > > clone3(). > > > > The clone3() syscall passes the tls argument through struct clone_args > > instead of a register. This means, all architectures that do not > > implement copy_thread_tls() but still support CLONE_SETTLS via > > copy_thread() expecting the tls to be located in a register argument > > based on clone() are currently unfortunately broken. Their tls value > > will be garbage. > > > > The patch series fixes this on all architectures that currently define > > __ARCH_WANT_SYS_CLONE3. It also adds a compile-time check to > > ensure > > that any architecture that enables clone3() in the future is forced to > > also implement copy_thread_tls(). > > > > My ultimate goal is to get rid of the copy_thread()/copy_thread_tls() > > split and just have copy_thread_tls() at some point in the not too > > distant future (Maybe even renaming copy_thread_tls() back to simply > > copy_thread() once the old function is ripped from all arches). This > > is dependent now on all arches supporting clone3(). > > > > While all relevant arches do that now there are still four missing: > > ia64, m68k, sh and sparc. They have the system call reserved, but not > > implemented. Once they all implement clone3() we can get rid of > > ARCH_WANT_SYS_CLONE3 and HAVE_COPY_THREAD_TLS. > > > > Note that in the meantime, m68k has already switched to the new calling > > convention. And I've got sparc patches acked by Dave and ia64 is already > > done too. You can find a link to a booting qemu nios2 system with all the > > changes here at [1]. > > > > [1]: https://asciinema.org/a/333353 > > Cc: linux-kernel@vger.kernel.org > > Cc: Thomas Gleixner > > Cc: Sebastian Andrzej Siewior > > Cc: Ley Foon Tan > > Signed-off-by: Christian Brauner > Acked-by: Ley Foon Tan Thanks! > > Assume this patch will merge with your series. If people agree with it, then yep. Just waiting for rc1 before sending it out. Christian