Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1441108pxb; Thu, 4 Mar 2021 11:19:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJwE77Wz2VZdwI0ooLWiab8Bvzasvl/wPO+HcXHkCWL4l+KS16pDxsFZ6DuLmzBKSdA6NSze X-Received: by 2002:aa7:d503:: with SMTP id y3mr6053019edq.142.1614885555252; Thu, 04 Mar 2021 11:19:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614885555; cv=none; d=google.com; s=arc-20160816; b=fyXUXWsl6pAogaq/QqDEqy6ZAsu4AEX6+mrNHvS+JFrgp+X8AfLb4f60PkNdpSLRAA WIta95+hdXL/8hgJiP13k6OFXCSCOAHBMIx4w8MoqkT0JhmdLvW5sTFfKGOoKVJfaO0Z wcOD26nl9acdROIxSfYkF926i8mQ+McmhxvrPk3l2/mLjyFc5cCfR+Na5jLTjks0dnVP z02KSZQI/igptybb1kK+eCJBKWcMKHTjIBKE1YRRsfcL+9MDEDCnwXqsZaP4TsnvbNZT FR0VPRocTYAPpbF07IaH7wj/XvBwq5MMHEAP9NheFOv7Tilqr3yeTGs/wklmBkMsg6UQ 5YHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7tXv4hWRJQ9Fo+673+TAj01f+LF5XrtE+ygt1R0GLkU=; b=gBER614fNUGr35n5tWb6730ImIm2SPS9jnqGT5l+a7L/zH/Sbyg+0k2OUs7B/8Fp4r 60oh/ZHKx7RAK1B+1IIB+QYOhKh8eoYVlfMxrptuOokH8ec6tyFkCdlXturUVlddRS5l 7SboRc4CzAPrbK0V/0+joZPmr38eXBwey/gKUb1yPW7qaCAGWHqJyPtM2/BtBZUgumCy IjiXlZC6xbJ9frWbeb+P5RTTPUeogNyBrQGWR7dyjr8uiFbJv/3AaMUAVJFgrJMiIM4E DQ1iYa72eT204Dxs42+Ficei7gh9GJnk2gGtSNobWuEsXLCT0xHtPHHWm34dTAfnCcAf OlMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h2zvMyu6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o11si29718eju.241.2021.03.04.11.18.52; Thu, 04 Mar 2021 11:19:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h2zvMyu6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238010AbhCDTHj (ORCPT + 99 others); Thu, 4 Mar 2021 14:07:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:39314 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237790AbhCDTH3 (ORCPT ); Thu, 4 Mar 2021 14:07:29 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 62CA764F6A; Thu, 4 Mar 2021 19:06:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1614884773; bh=iJuDAEs8wTPplNyBhVDGDcDHMjFj9a6SiXNImJt+0aU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=h2zvMyu61UKTHM8ucwT0ULSYotGTvim3FItFS9rEiWi4FSVbzBKEGl4Ykqp9xnruH IyS1Lu9GRAKz1UxKXi8W0AGjKEMcnqBNfDO66crLcwi0Ppy1q0ghBfk+LUDfqvg/GB BRn5eZV+DAITwLhe4k7J6E5nBiuNLlHYu9rhDTFq5hf1grBtoMn63waqQJ4pczuwva MDJjAW4KH+qmAIYAd4PvIAbil52I1bJMdAy3FVUtUpeIiTfmlqZq0IPpXgRH4WmWM9 fQW5JwreeLRx+Us/AFWnbJw/AYi/BXU80UxcIORGSNXOkrYWsz1DAhcMk2zfQbc8/1 spaaGi4dbe0Lw== From: Andy Lutomirski To: x86@kernel.org Cc: LKML , Mark Rutland , Andy Lutomirski Subject: [PATCH v3 07/11] kentry: Make entry/exit_to_user_mode() arm64-only Date: Thu, 4 Mar 2021 11:06:00 -0800 Message-Id: X-Mailer: git-send-email 2.29.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org exit_to_user_mode() does part, but not all, of the exit-to-user-mode work. It's used only by arm64, and arm64 should stop using it (hint, hint!). Compile it out on other architectures to minimize the chance of error. enter_from_user_mode() is a legacy way to spell kentry_enter_from_user_mode(). It's also only used by arm64. Give it the same treatment. Signed-off-by: Andy Lutomirski --- include/linux/entry-common.h | 34 ++++++---------------------------- kernel/entry/common.c | 4 ++++ 2 files changed, 10 insertions(+), 28 deletions(-) diff --git a/include/linux/entry-common.h b/include/linux/entry-common.h index 5287c6c15a66..a75374f87258 100644 --- a/include/linux/entry-common.h +++ b/include/linux/entry-common.h @@ -97,26 +97,15 @@ static inline __must_check int arch_syscall_enter_tracehook(struct pt_regs *regs } #endif +#ifdef CONFIG_ARM64 /** * enter_from_user_mode - Establish state when coming from user mode * - * Syscall/interrupt entry disables interrupts, but user mode is traced as - * interrupts enabled. Also with NO_HZ_FULL RCU might be idle. + * Legacy variant of kentry_enter_from_user_mode(). Used only by arm64. * - * 1) Tell lockdep that interrupts are disabled - * 2) Invoke context tracking if enabled to reactivate RCU - * 3) Trace interrupts off state - * - * Invoked from architecture specific syscall entry code with interrupts - * disabled. The calling code has to be non-instrumentable. When the - * function returns all state is correct and interrupts are still - * disabled. The subsequent functions can be instrumented. - * - * This is invoked when there is architecture specific functionality to be - * done between establishing state and enabling interrupts. The caller must - * enable interrupts before invoking syscall_enter_from_user_mode_work(). */ void enter_from_user_mode(struct pt_regs *regs); +#endif /** * kentry_syscall_begin - Prepare to invoke a syscall handler @@ -261,25 +250,14 @@ static inline void arch_syscall_exit_tracehook(struct pt_regs *regs, bool step) } #endif +#ifdef CONFIG_ARM64 /** * exit_to_user_mode - Fixup state when exiting to user mode * - * Syscall/interrupt exit enables interrupts, but the kernel state is - * interrupts disabled when this is invoked. Also tell RCU about it. - * - * 1) Trace interrupts on state - * 2) Invoke context tracking if enabled to adjust RCU state - * 3) Invoke architecture specific last minute exit code, e.g. speculation - * mitigations, etc.: arch_exit_to_user_mode() - * 4) Tell lockdep that interrupts are enabled - * - * Invoked from architecture specific code when syscall_exit_to_user_mode() - * is not suitable as the last step before returning to userspace. Must be - * invoked with interrupts disabled and the caller must be - * non-instrumentable. - * The caller has to invoke syscall_exit_to_user_mode_work() before this. + * Does the latter part of irqentry_exit_to_user_mode(). Only used by arm64. */ void exit_to_user_mode(void); +#endif /** * kentry_syscall_end - Finish syscall processing diff --git a/kernel/entry/common.c b/kernel/entry/common.c index 800ad406431b..4ba82c684189 100644 --- a/kernel/entry/common.c +++ b/kernel/entry/common.c @@ -25,10 +25,12 @@ static __always_inline void __enter_from_user_mode(struct pt_regs *regs) instrumentation_end(); } +#ifdef CONFIG_ARM64 void noinstr enter_from_user_mode(struct pt_regs *regs) { __enter_from_user_mode(regs); } +#endif static inline void syscall_enter_audit(struct pt_regs *regs, long syscall) { @@ -106,10 +108,12 @@ static __always_inline void __exit_to_user_mode(void) lockdep_hardirqs_on(CALLER_ADDR0); } +#ifdef CONFIG_ARM64 void noinstr exit_to_user_mode(void) { __exit_to_user_mode(); } +#endif /* Workaround to allow gradual conversion of architecture code */ void __weak arch_do_signal_or_restart(struct pt_regs *regs, bool has_signal) { } -- 2.29.2