Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp315974pxb; Wed, 20 Apr 2022 23:43:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJybXhyrCqno8Gjre9vWTogYTM5Tr6W8vu1Rq3pwarQBIoMAnsx3vyCTg/74gvuI+5rBcv/q X-Received: by 2002:a17:907:1c10:b0:6da:6316:d009 with SMTP id nc16-20020a1709071c1000b006da6316d009mr21507803ejc.621.1650523382813; Wed, 20 Apr 2022 23:43:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650523382; cv=none; d=google.com; s=arc-20160816; b=JRbaoHkq3zHZ1txForrRfL+OPL4Jb7PERUeRi5jYEo5P27Mmjgvqk2V6NVBjzCPpOB CIYy1HDpIIdhqVoPeC+QB3z6w4PcRSqJDz4dnrXR8l4wUe8X1/xAYhCE9BFprpaPuaI+ gZholvt1Lzgn78AqOf1ScCvWHN1j6zB5bESuIEzUg35aagBPyyDTRhakpGxvLTkM/HET iKqDvBzsVQKR3i92kDoqP0t3+bI4nZA481aG/dxTzW7zVgJCwLT+hfYCGqfwR6tSTk5E djgVZ+BmZ2MfsSUUbFSuT3xnaMCKXd1ykrMtn2lqQV6kFs2fuIcOGnSQ1p5k/pQiE/9q 2bGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=9UyBlcyj9qmPmLqcx+Y9IVqbgazV7crvGV9M069W33g=; b=wE7n082BPjbB42+xIYFpTVHEJdKj7aErNGwp0+cOrYQ/aTRW92aeWF7q8IFfCfXphE XnIrSiYybW7F+4DHLR+FQbGJvLg7Yh1oza4umiFwZZ2R7RpETB8czF976Hf2NM8bAXAj ZJKHOXyiphL/yPV2POg6Gxeu1xMQZ81idwsCLwzrv6fwc6FxYJNSu/rxJj0aapUeU+fQ fBlwVab5B4888nggdrO8rrbK1JV8K6/A+bgIAATaJZ7rbEXoKgv9WmZuMY14/htXuq4J pi+ddQMvi8yDYHwsOXV/ZaXah7BModyOh13VYXnDSFvJuzJVxBhBnQmWl4wsFYg52hpH 9eYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=kiEG+mOg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z19-20020a1709060f1300b006eff0ac4c7csi3447387eji.230.2022.04.20.23.42.39; Wed, 20 Apr 2022 23:43:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=kiEG+mOg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1380542AbiDTQfu (ORCPT + 99 others); Wed, 20 Apr 2022 12:35:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42114 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1380628AbiDTQfq (ORCPT ); Wed, 20 Apr 2022 12:35:46 -0400 Received: from mail.skyhub.de (mail.skyhub.de [IPv6:2a01:4f8:190:11c2::b:1457]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 18D3643EDC for ; Wed, 20 Apr 2022 09:32:54 -0700 (PDT) Received: from zn.tnic (p200300ea971b58ed329c23fffea6a903.dip0.t-ipconnect.de [IPv6:2003:ea:971b:58ed:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 631221EC0104; Wed, 20 Apr 2022 18:32:47 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1650472367; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9UyBlcyj9qmPmLqcx+Y9IVqbgazV7crvGV9M069W33g=; b=kiEG+mOgRrJDs9kkDSzfs3HRsquiuc6o84iYCAbyH3h3FzrMTnqNZ0q6kk9yoTRfMqMzbK 07895Hkv4GbvryjlB/upmx0ALyblW2kpYs5XqVAGBic4V7EPHZTt75s6QLgHy/DDQbxxD9 fWf7k+nbG2V4scjKjixDxI6Kq+LQ/A8= Date: Wed, 20 Apr 2022 18:32:43 +0200 From: Borislav Petkov To: Lai Jiangshan , =?utf-8?Q?J=C3=BCrgen?= Gross Cc: linux-kernel@vger.kernel.org, Peter Zijlstra , Josh Poimboeuf , Andy Lutomirski , Thomas Gleixner , x86@kernel.org, Lai Jiangshan , Ingo Molnar , Dave Hansen , "H. Peter Anvin" Subject: Re: [PATCH V5 5/7] x86/entry: Don't call error_entry() for XENPV Message-ID: References: <20220412121541.4595-1-jiangshanlai@gmail.com> <20220412121541.4595-6-jiangshanlai@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20220412121541.4595-6-jiangshanlai@gmail.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 12, 2022 at 08:15:39PM +0800, Lai Jiangshan wrote: > From: Lai Jiangshan > > When in XENPV, it is already in the task stack, and it can't fault for > native_iret() nor native_load_gs_index() since XENPV uses its own pvops > for IRET and load_gs_index(). And it doesn't need to switch the CR3. > > So there is no reason to call error_entry() in XENPV. > > Signed-off-by: Lai Jiangshan > --- > arch/x86/entry/entry_64.S | 13 +++++++++++-- > 1 file changed, 11 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S > index 7b6a0f15bb20..3aca7815fe79 100644 > --- a/arch/x86/entry/entry_64.S > +++ b/arch/x86/entry/entry_64.S > @@ -328,8 +328,17 @@ SYM_CODE_END(ret_from_fork) > PUSH_AND_CLEAR_REGS > ENCODE_FRAME_POINTER > > - call error_entry > - movq %rax, %rsp /* switch to the task stack if from userspace */ > + /* > + * Call error_entry() and switch to the task stack if from userspace. > + * > + * When in XENPV, it is already in the task stack, and it can't fault > + * for native_iret() nor native_load_gs_index() since XENPV uses its > + * own pvops for IRET and load_gs_index(). And it doesn't need to > + * switch the CR3. So it can skip invoking error_entry(). > + */ > + ALTERNATIVE "call error_entry; movq %rax, %rsp", \ > + "", X86_FEATURE_XENPV > + > ENCODE_FRAME_POINTER > UNWIND_HINT_REGS > > -- This one needs Jürgen. CCed. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette