Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp3245058pxy; Mon, 3 May 2021 19:51:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbuFFpZS/vGWIfC0s8Pa3MRfV4Bn2rb2cFbcMqQeh5B2EykeZFXhjgQRkAlJsVVu2XrRe3 X-Received: by 2002:a05:6402:50c6:: with SMTP id h6mr7507000edb.327.1620096700321; Mon, 03 May 2021 19:51:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620096700; cv=none; d=google.com; s=arc-20160816; b=Saexqx0olwfDrMNZGaF7LKI2WF9ad9huiBFki4M75dPZtOYIvFn5415NN3qtZ2iIF1 W2PgYgCSd1l/LbkbD7f2GKOTNcnCBVjj23NpUGiOuKDdv9HnAYCHX8ij21pnGA+Q2lP8 FUVJMs5+8u2i/fUugWgDUXJYiyCfgi/8S0gzf8ujVQrTL1XsWZMAqzet0vEBGH8DCxfW 7lc3zKhHSiwKqp78ZimbnIIgklpifEQY+cTr2UxE1AO0tjz32eLO+uH/k850oeTuGpc2 Yr6BvyLAp6yNBotpqydgExTv1DeTc2wa0OMsvczJOcxsmehPW3UKaMbRqzAQe56PzBoJ 6ePA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=bs2uDwxwq1zZi6hfXlJFHm5DU97INKbe3KBPR4vz8kc=; b=MPlM4zeqDQwt7Y2xKoU1IpJhc7zlKIxrJAVDKeeIvQjVH/UBOvxHyX+lfAAhE7K2Kh mkrjzwJ49/W9kA4e/1UZdkWXQCzfM6VCIspyLFfsv5KoFw4xmw3XeR8Q/yfp+v/lYu9K kfiBKG8b5KedN8CmqDORocuUuaTw0so0TvgaoNmM13XiBrqHpLdzvRZODW3KhE1TEeT4 VEX7Gxu9vUQKVSMvCyBgPglaC3vnO8F9Ry8RovBsulluo5oPtAxHdC5btI8p+VuctmOw Dk2PHUpO/awahR1CchAQ7GdIWTrNOwekq3beu9vmj/v9pbw76YxoaSRwGx2QnozC45+u XrWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=xOCEKg+l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kl2si1823148ejc.644.2021.05.03.19.51.17; Mon, 03 May 2021 19:51:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=xOCEKg+l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229693AbhEDCvQ (ORCPT + 99 others); Mon, 3 May 2021 22:51:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44396 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229687AbhEDCvP (ORCPT ); Mon, 3 May 2021 22:51:15 -0400 Received: from mail-pl1-x634.google.com (mail-pl1-x634.google.com [IPv6:2607:f8b0:4864:20::634]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 722A0C061574 for ; Mon, 3 May 2021 19:50:21 -0700 (PDT) Received: by mail-pl1-x634.google.com with SMTP id h20so4023501plr.4 for ; Mon, 03 May 2021 19:50:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=bs2uDwxwq1zZi6hfXlJFHm5DU97INKbe3KBPR4vz8kc=; b=xOCEKg+lkLAZgc8KF/dua6pJchU9Z4xAuGC3A0C/3oS3nfZXIYBXgNaJp9QBxdy/d+ YFt3d/kpVMxS9Y5QbXmMy5y6K5NmsOG2R03vhIE06/K9xW2VNhG4dB0pbG3+QBIfSdFk FSzlu0cYHuKTrWJITlRyrwvW0EZhMeKAueucCt5J1Fh4w7aOQ0+EQ/Vyew2cO8j4YzWr sUlymfbl/zAj5OvyJ7PsFpVQWTm5DIMz8gqC/IA6HyieQARsfqJx/AOiyYoa9EALMGXr J6DoF+fe5Hil85itNf2RhIzM82bulKeSgmC7UfrOMh+Cd5HepZTmMol8b3//FXoou0PE afBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=bs2uDwxwq1zZi6hfXlJFHm5DU97INKbe3KBPR4vz8kc=; b=eohcQVKXZ9yYoh0BKlzxNBUm3sZ9Ida8i6T7UoQg97HUMfxkSYkXDcqg7ZG0+vP8/S 9+xAqCeXL0Bl7KvHt3TdGjTC/wlUZbbzf7VIK9uDdDguDUriLCECafV6bJmFRlfm8K87 jH9HWdVSyQiEvUOV+dhkF7BAEiZxc8GYPnEV0kAEA6UUKEuAGwGmRsjjCRaL+LFlhwzK 2wgMTQl1PxmxRMAA6dZx8PghqwPhcKNHKGsr+L4+M9bx/iW6+fuiFYFqCLuLLuyoezEw EJwQFS9IOcaYEjI/o8RNBLtpmQulRBBkbC/bsiNPiPQMOpbLiPtW9pVFviq4sPxLdqzL 6n5g== X-Gm-Message-State: AOAM533RBkdOVPxWvIjq0dyKCEqz8b56r7PGKy+LR77JZmjhyyXj/fTB iobi6Rw3FYWF2SB7qi7eJG+jrA== X-Received: by 2002:a17:902:a514:b029:ed:18b0:1d10 with SMTP id s20-20020a170902a514b02900ed18b01d10mr23776152plq.7.1620096620904; Mon, 03 May 2021 19:50:20 -0700 (PDT) Received: from [192.168.1.134] ([66.219.217.173]) by smtp.gmail.com with ESMTPSA id c16sm1143556pgl.79.2021.05.03.19.50.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 03 May 2021 19:50:20 -0700 (PDT) Subject: Re: [PATCH] io_thread/x86: don't reset 'cs', 'ss', 'ds' and 'es' registers for io_threads To: Linus Torvalds , Stefan Metzmacher Cc: Thomas Gleixner , Andy Lutomirski , Linux Kernel Mailing List , io-uring , the arch/x86 maintainers References: <8735v3ex3h.ffs@nanos.tec.linutronix.de> <3C41339D-29A2-4AB1-958F-19DB0A92D8D7@amacapital.net> <8735v3jujv.ffs@nanos.tec.linutronix.de> <12710fda-1732-ee55-9ac1-0df9882aa71b@samba.org> From: Jens Axboe Message-ID: <59ea3b5a-d7b3-b62e-cc83-1f32a83c4ac2@kernel.dk> Date: Mon, 3 May 2021 20:50:19 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/3/21 5:48 PM, Linus Torvalds wrote: > On Mon, May 3, 2021 at 4:27 PM Stefan Metzmacher wrote: >> >> If I remember correctly gdb showed bogus addresses for the backtraces of the io_threads, >> as some regs where not cleared. > > Yeah, so that patch will make the IO thread have the user stack > pointer point to the original user stack, but that stack will > obviously be used by the original thread which means that it will > contain random stuff on it. > > Doing a > > childregs->sp = 0; > > is probably a good idea for that PF_IO_WORKER case, since it really > doesn't have - or need - a user stack. > > Of course, it doesn't really have - or need - any of the other user > registers either, but once you fill in the segment stuff to make gdb > happy, you might as well fill it all in using the same code that the > regular case does. I tested the below, which is the two combined, with a case that deliberately has two types of io threads - one for SQPOLL submission, and one that was created due to async work being needed. gdb attaches just fine to the creator, with a slight complaint: Attaching to process 370 [New LWP 371] [New LWP 372] Error while reading shared library symbols for /usr/lib/libpthread.so.0: Cannot find user-level thread for LWP 372: generic error 0x00007f1a74675125 in clock_nanosleep@GLIBC_2.2.5 () from /usr/lib/libc.so.6 (gdb) info threads Id Target Id Frame * 1 LWP 370 "io_uring" 0x00007f1a74675125 in clock_nanosleep@GLIBC_2.2.5 () from /usr/lib/libc.so.6 2 LWP 371 "iou-sqp-370" 0x00007f1a746a7a9d in syscall () from /usr/lib/libc.so.6 3 LWP 372 "io_uring" 0x00007f1a74675125 in clock_nanosleep@GLIBC_2.2.5 () from /usr/lib/libc.so.6 (gdb) thread 2 [Switching to thread 2 (LWP 371)] #0 0x00007f1a746a7a9d in syscall () from /usr/lib/libc.so.6 (gdb) bt #0 0x00007f1a746a7a9d in syscall () from /usr/lib/libc.so.6 Backtrace stopped: Cannot access memory at address 0x0 (gdb) thread 1 [Switching to thread 1 (LWP 370)] #0 0x00007f1a74675125 in clock_nanosleep@GLIBC_2.2.5 () from /usr/lib/libc.so.6 (gdb) bt #0 0x00007f1a74675125 in clock_nanosleep@GLIBC_2.2.5 () from /usr/lib/libc.so.6 #1 0x00007f1a7467a357 in nanosleep () from /usr/lib/libc.so.6 #2 0x00007f1a7467a28e in sleep () from /usr/lib/libc.so.6 #3 0x000055bd41e929ba in main (argc=, argv=) at t/io_uring.c:658 which looks very reasonable to me - no backtraces for the io threads, and no arch complaints. diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c index 43cbfc84153a..58987bce90e2 100644 --- a/arch/x86/kernel/process.c +++ b/arch/x86/kernel/process.c @@ -156,7 +156,7 @@ int copy_thread(unsigned long clone_flags, unsigned long sp, unsigned long arg, #endif /* Kernel thread ? */ - if (unlikely(p->flags & (PF_KTHREAD | PF_IO_WORKER))) { + if (unlikely(p->flags & PF_KTHREAD)) { memset(childregs, 0, sizeof(struct pt_regs)); kthread_frame_init(frame, sp, arg); return 0; @@ -168,6 +168,12 @@ int copy_thread(unsigned long clone_flags, unsigned long sp, unsigned long arg, if (sp) childregs->sp = sp; + if (unlikely(p->flags & PF_IO_WORKER)) { + childregs->sp = 0; + kthread_frame_init(frame, sp, arg); + return 0; + } + #ifdef CONFIG_X86_32 task_user_gs(p) = get_user_gs(current_pt_regs()); #endif -- Jens Axboe