Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp210858iob; Mon, 2 May 2022 17:19:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxx+opum8TgIIHD9U9iYcWKJeGX/o+GcLUAqdt2HlprIoS8EKHAxX4XG9uWf3jT2hj6Tyb8 X-Received: by 2002:a17:90b:1bc4:b0:1dc:2133:2e01 with SMTP id oa4-20020a17090b1bc400b001dc21332e01mr1885732pjb.221.1651537170880; Mon, 02 May 2022 17:19:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651537170; cv=none; d=google.com; s=arc-20160816; b=ra922iNaoo4Dh0YlqQD7rjDDDSMRW7CNofzsW0Dff/Z1XwY1oy8ZiBBxUfUQhfWI8P HH+o+mhO8T4MfWj54rowtHYsPHjl4iuNX08dsqDmtqtbYIeD5W/JHEZYMIKErhwIRLb4 MjxtOrCPUc7yzKKYE8AvfJPKhdx4Eckh9aF76HYcsJ8TDaxV35Hk3cmW9cuV3kM8NzuT qCBC6HLAxGQXs+/Tt4GTdU3CFFkyiYkvTNDCoYpGCdnhUzdDi05DbCZBofzfwrxRdfW3 oop9Xu3pHcCf1i7AIlJufl/wIlqt7L2XYduHf7ThVIZUMjEVi4owWRG7VhiwKqimsWx1 8rLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=xkMo8IXjwSpSn3yFdYrBLF5OKTpukIzfN2ZfXfe5+JU=; b=m7XmdwEKeO8cEn4epn2BYRW0MzuiEpRMJFq4UqY56b17+GT7EdwLfgQjiE7Vxq9yTU K7Kvle+JVkr1udHkEjndPhhT+o/xCxApnOqQbvLBN9qxMERkjqbUEdCBe5KA1sGb4ReM 9wD1etG5jEqhvDiW8KVKGXABmvD2132bHra1YFtWj9LUUmrkmnIhC68P9stjU+wYTsrO SEpQmci3uzC6dvIMg3SZIFVr1LCiwcR7+EMeldARFUjvVRDTNBvj+4fEar9SvPQB0xUe skLXj0VkPPIMglMX8HZ5lA9X2oDZGLBEiwtWzpQfnO5bXsHRQYjIxuSYLQmFmrmALBbL w5bA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=g8WtUhdL; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id dt15-20020a17090afa4f00b001cba2c0d367si674360pjb.115.2022.05.02.17.19.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 17:19:30 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=g8WtUhdL; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5AFD937BE8; Mon, 2 May 2022 17:16:36 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1385766AbiEBOjS (ORCPT + 99 others); Mon, 2 May 2022 10:39:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44616 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1385591AbiEBOir (ORCPT ); Mon, 2 May 2022 10:38:47 -0400 Received: from mail.skyhub.de (mail.skyhub.de [5.9.137.197]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 48FE626E for ; Mon, 2 May 2022 07:35:17 -0700 (PDT) Received: from zn.tnic (p5de8eeb4.dip0.t-ipconnect.de [93.232.238.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 34B321EC0455; Mon, 2 May 2022 16:35:12 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1651502112; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=xkMo8IXjwSpSn3yFdYrBLF5OKTpukIzfN2ZfXfe5+JU=; b=g8WtUhdLz2SwUpnTdEDnmjnBUusVsLPo7yw8+u9/0uiq9mWgDDR8mXLZXugOnq9DoJxLmf ezQRZbpCUAmqqk75bJOKYGvzmq02HnYfd/pASAPgRdp0AOSEXHDBW5ZkQwVE+qPP3uFiPB JXxd1a1acDHm+4KatO1jsnNabZ4DXYE= Date: Mon, 2 May 2022 16:35:10 +0200 From: Borislav Petkov To: Thomas Gleixner Cc: LKML , x86@kernel.org, Filipe Manana Subject: Re: [patch 3/3] x86/fpu: Make FPU protection more robust Message-ID: References: <20220501192740.203963477@linutronix.de> <20220501193102.704267030@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220501193102.704267030@linutronix.de> X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, May 01, 2022 at 09:31:47PM +0200, Thomas Gleixner wrote: > --- a/arch/x86/kernel/fpu/core.c > +++ b/arch/x86/kernel/fpu/core.c > @@ -42,7 +42,7 @@ struct fpu_state_config fpu_user_cfg __r > struct fpstate init_fpstate __ro_after_init; > > /* Track in-kernel FPU usage */ > -static DEFINE_PER_CPU(bool, in_kernel_fpu); > +static DEFINE_PER_CPU(bool, fpu_in_use); > > /* > * Track which context is using the FPU on the CPU: > @@ -50,6 +50,50 @@ static DEFINE_PER_CPU(bool, in_kernel_fp > DEFINE_PER_CPU(struct fpu *, fpu_fpregs_owner_ctx); > > /** > + * fpregs_lock - Lock FPU state for maintenance operations "maintenance"? > + * > + * This protects against preemption, soft interrupts and in-kernel FPU > + * usage on both !RT and RT enabled kernels. > + * > + * !RT kernels use local_bh_disable() to prevent soft interrupt processing > + * and preemption. > + * > + * On RT kernels local_bh_disable() is not sufficient because it only > + * serializes soft interrupt related sections via a local lock, but stays > + * preemptible. Disabling preemption is the right choice here as bottom > + * half processing is always in thread context on RT kernels so it > + * implicitly prevents bottom half processing as well. > + */ > +void fpregs_lock(void) > +{ > + if (!IS_ENABLED(CONFIG_PREEMPT_RT)) > + local_bh_disable(); > + else > + preempt_disable(); So I'm wondering: can we get rid of this distinction and simply do preempt_disable()? Or can FPU be used in softirq processing too so we want to block that there? But even if, fpu_in_use will already state that fact... ... > @@ -410,10 +433,9 @@ void kernel_fpu_begin_mask(unsigned int > { > preempt_disable(); > > - WARN_ON_FPU(!kernel_fpu_usable()); > - WARN_ON_FPU(this_cpu_read(in_kernel_fpu)); > + WARN_ON_ONCE(!kernel_fpu_usable()); > > - this_cpu_write(in_kernel_fpu, true); > + this_cpu_write(fpu_in_use, true); This starts to look awfully similar to fpregs_lock()... > > if (!(current->flags & PF_KTHREAD) && > !test_thread_flag(TIF_NEED_FPU_LOAD)) { > @@ -433,9 +455,9 @@ EXPORT_SYMBOL_GPL(kernel_fpu_begin_mask) > > void kernel_fpu_end(void) > { > - WARN_ON_FPU(!this_cpu_read(in_kernel_fpu)); > + WARN_ON_ONCE(!this_cpu_read(fpu_in_use)); > > - this_cpu_write(in_kernel_fpu, false); > + this_cpu_write(fpu_in_use, false); > preempt_enable(); ... and this to fpregs_unlock(). Can we use those here too instead of open-coding them mostly? -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette