Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1629298pxp; Thu, 17 Mar 2022 13:06:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8T37m/teiTX/OvXT1Ha+7FPu0Wa/7tAnh34zZKiple3G/xEruypclulBrdf3nD/Fovk1M X-Received: by 2002:a05:6a00:1501:b0:4f7:5773:f3f6 with SMTP id q1-20020a056a00150100b004f75773f3f6mr6591127pfu.31.1647547580196; Thu, 17 Mar 2022 13:06:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647547580; cv=none; d=google.com; s=arc-20160816; b=g/2tmH4bj/rvBFenayNKjhZxJWckQcAwPUd+z2lY4uiXg7hXK7KcqRSspPiYb8YFCx zG1sl3Dc+1jaiwKolM/UvlOUZ6q8TISBZY3Mdo8Opq2ZIOv5iAcT6fzRFgqNJzlEtzEF KdFg8y6MbRfCtcWvDZBzyjqBCJz5YG5MVmOP2pAXvlnZP32jcSCboZlQGKpggugH+Qhw ekESslzaCkmDnCJchDV18hZ2qFvOQ1ZpP1HvIOqP/bUNWm13yOTS09yjfUDfh0/F1H1Z O6/2FtpRtvHNvz+ZWgPPa4rRnPPK6PvQzYd92vwZIfnbe+XbZkatGpOF+ytbZOvYgpxV +PDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AElgJgCzjsOop7DbD+LaK7IRJCY0+caEj36aP8QshNE=; b=UFVCMiqSrQiMfrA9TpeXEaQ4rPQn43WdFSla9P4nKTun2rbQSgsCSasqYAI/HuCazb 7mf/XinQX3Ynu5C6qVxPEzPZp5uSrLv4knygpaNbji6P9vEQ4pv1xzdKB+2qy1kkBQ9D Y/3+sG4gK/sdADtmgXGSty5VBLT5FXx041NMpamupaNGeCIGztvbAqtmHWy3hn99vYUE tx+hJzUKzxkpjBWKq+qCiv2/6QUnz0Ho6N9ZJNFfTa0NRHvPsrXo9RhOnByEe4S9nwx/ uc9D03tMVUUbstyUzF1D/XqLJeThCGVqeA6lb+x8oBvzSarlHAiX25woFhUiioY0uIpo KImw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fVTysvw5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id y23-20020a170902d65700b00153b2d164dcsi23649plh.228.2022.03.17.13.06.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 17 Mar 2022 13:06:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fVTysvw5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id EBAE4289590; Thu, 17 Mar 2022 12:54:46 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234746AbiCQOGm (ORCPT + 99 others); Thu, 17 Mar 2022 10:06:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233413AbiCQOGl (ORCPT ); Thu, 17 Mar 2022 10:06:41 -0400 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 582F9BCAB for ; Thu, 17 Mar 2022 07:05:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1647525923; x=1679061923; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=UJwH4Qp1MP8RYi0LZsv/gcqMk1tUiY30AAEZAqJEryo=; b=fVTysvw5gmSs0AdNt93Iy1kvXipX+nzUPuzpw/bENlmQa31g2usAACJj S1uB97NSUt9FxNdynDtgWv7SKl4ooBnixJoKXcjHeQKvZbpteDMJWLW/J tnxdvUZADxjbAP/0kro0mqOfCIrz4RlLcC0Ms3SYYZqvCPf4zUQuncO5K P7kj3GBYED4buSt4gLehXmaeh4Rhe/Zwo4ffXaWmQfzN7FDPW/BJn71iO X6YRWuswhFcIPD2dwNWJgAN56rQdIxroFezEuH9WW3H/yReds0SsfO9x3 WeTOMzQrNlqxITYvsZ1SJkRZM1NVKfcLUz+Zw9miLKm9yjRsfRVXkUxQP g==; X-IronPort-AV: E=McAfee;i="6200,9189,10288"; a="254430362" X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; d="scan'208";a="254430362" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2022 07:05:23 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; d="scan'208";a="635370355" Received: from black.fi.intel.com ([10.237.72.28]) by FMSMGA003.fm.intel.com with ESMTP; 17 Mar 2022 07:05:17 -0700 Received: by black.fi.intel.com (Postfix, from userid 1000) id 9B6D3150; Thu, 17 Mar 2022 16:05:36 +0200 (EET) Date: Thu, 17 Mar 2022 17:05:36 +0300 From: "Kirill A. Shutemov" To: Thomas Gleixner Cc: mingo@redhat.com, bp@alien8.de, dave.hansen@intel.com, luto@kernel.org, peterz@infradead.org, sathyanarayanan.kuppuswamy@linux.intel.com, aarcange@redhat.com, ak@linux.intel.com, dan.j.williams@intel.com, david@redhat.com, hpa@zytor.com, jgross@suse.com, jmattson@google.com, joro@8bytes.org, jpoimboe@redhat.com, knsathya@kernel.org, pbonzini@redhat.com, sdeep@vmware.com, seanjc@google.com, tony.luck@intel.com, vkuznets@redhat.com, wanpengli@tencent.com, thomas.lendacky@amd.com, brijesh.singh@amd.com, x86@kernel.org, linux-kernel@vger.kernel.org, Dave Hansen Subject: Re: [PATCHv6 06/30] x86/traps: Refactor exc_general_protection() Message-ID: <20220317140536.ebab2nenzr64mizp@black.fi.intel.com> References: <20220316020856.24435-1-kirill.shutemov@linux.intel.com> <20220316020856.24435-7-kirill.shutemov@linux.intel.com> <87a6dp2ztq.ffs@tglx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87a6dp2ztq.ffs@tglx> X-Spam-Status: No, score=-3.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 17, 2022 at 01:21:53AM +0100, Thomas Gleixner wrote: > On Wed, Mar 16 2022 at 05:08, Kirill A. Shutemov wrote: > > TDX brings a new exception -- Virtualization Exception (#VE). Handling > > of #VE structurally very similar to handling #GP. > > > > Extract two helpers from exc_general_protection() that can be reused for > > handling #VE. > > > > No functional changes. > > > > Signed-off-by: Kirill A. Shutemov > > Reviewed-by: Dave Hansen > > Not that I care much, but this is the second instance of something I > suggested. We have tags for that... Sorry, will add the tag. By the other instance you meant common base for SEAMCALL and TDCALL C wrappers, right? Will fix too. > > +static bool gp_try_fixup_and_notify(struct pt_regs *regs, int trapnr, > > + unsigned long error_code, const char *str) > > +{ > > + int ret; > > Adding this to make my suggestion compile is the easy way out, but... > > > + > > + if (fixup_exception(regs, trapnr, error_code, 0)) > > + return true; > > + > > + current->thread.error_code = error_code; > > + current->thread.trap_nr = trapnr; > > + > > + /* > > + * To be potentially processing a kprobe fault and to trust the result > > + * from kprobe_running(), we have to be non-preemptible. > > + */ > > + if (!preemptible() && kprobe_running() && > > + kprobe_fault_handler(regs, trapnr)) > > + return true; > > + > > + ret = notify_die(DIE_GPF, str, regs, error_code, trapnr, SIGSEGV); > > + return ret == NOTIFY_STOP; > > Why not doing the obvious: > > return notify_die(DIE_GPF, str, regs, error_code, trapnr, SIGSEGV) == NOTIFY_STOP; > > Hmm? I don't like lines this long (although my variant doesn't look good too). Will do your way. -- Kirill A. Shutemov