Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp697484rwl; Fri, 24 Mar 2023 00:14:54 -0700 (PDT) X-Google-Smtp-Source: AKy350bjMH1xMyRv8XdgvmbgeTOsWXKnLnwlSf09zWMfHuz7kqwINOCTjmR4VJeE38yQVG2+Cwc9 X-Received: by 2002:a17:90b:3e89:b0:236:a4bc:222 with SMTP id rj9-20020a17090b3e8900b00236a4bc0222mr1588395pjb.38.1679642093955; Fri, 24 Mar 2023 00:14:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679642093; cv=none; d=google.com; s=arc-20160816; b=S3vqo90LhwDiYVKfBuidhjcHQFgSlI6jCXKQNq6YOng5GzsNl62XLJ/TX6xtaUjwPq uE/4Rd/d+XRNkEEOO7OM0Cyz/Ae7/61TSUjBTEFhMs3mRAkEhyQZiOKRX94Uk8ZIxE6l LM6eomDvS76HicWMNmXog1B6Pe8GU91YpVCqQTeEwwvujUWOX/6gzXTPK3AUwXrr2MVy 4UZcRmoWmJdd/4w5bD/EwWfH9zhbSl6pjYoNWN/CJkkLRPIJzZ0G4ObHfkRXwl6E5YAP wAAhQ97+eV57m1dfGY+s/Tu5xNRi36tgvSbTxSkv0+jGg4V5HBy3HT33m9hIv1IFgNro cTBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=uGsYvNGxft+wNS0lws0LNhCaQ49Ek3NBHII0NbX5Ae0=; b=GPT+fLs9MC3+6C8H2kPGmxG279B3BwBuntJPkuIezHg7/gRNBsusgy+JkFKsp4tKTS ZXROMCFrH/TXlVXBPAl2rx/I7ltD8OzIKJHeX1nExwgtG0CS4Ol0ymLA/SkUkD9fjrb5 85SbP06RPxSIYI1DnSGSvT09HRcMOfsXanrqPcFnove0mKir+ogmrAIXrzM0/wgQe9oZ Zg0pSpF1neNCsaphkM9/WuIJSQnjCl0cI0c5vgKM3uezOIpbo4mrdIGZgYvaRL6K0vNi 9cecT2EkLonbyYDW+LG+9Cc9CYTxaFvEZv2GK/EQDzmj8MELm/hQAUoDngcJefhKFeYp GsZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=eWxOyk+v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e7-20020a636907000000b00513162c2244si2897739pgc.348.2023.03.24.00.14.41; Fri, 24 Mar 2023 00:14:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=eWxOyk+v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231405AbjCXHO2 (ORCPT + 99 others); Fri, 24 Mar 2023 03:14:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32784 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230132AbjCXHO1 (ORCPT ); Fri, 24 Mar 2023 03:14:27 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A7A2DF977; Fri, 24 Mar 2023 00:14:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 59B03B822F4; Fri, 24 Mar 2023 07:14:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DEBDBC4339B; Fri, 24 Mar 2023 07:14:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1679642063; bh=EedrYgr7tkK5Mvh078T+7DfsEEWhgvcGC/Eoj8RUZNk=; h=From:To:Cc:Subject:Date:From; b=eWxOyk+vXuOr7sWjquE27lpMmBg6b7f5Qpcd6b/YERHMsqBBznLDpSuG3j+ax4Y6m 6z6nVG20YkUtNYY/FShqzI9xKLN3HSk7F0JhHzJlb/aJvt7wnL7Nr5GeoFJb1mOcb8 68bcG5eFXBfxpwK8QheCkvvqTlsi6CHkSgy+6LhCmJxKrZbnupTevCfxkiccrb/zgm vc0HWcmnKbV5zsGfDm0/1Mdkxl3Bd2eIYAWv9aLIabNy3wx/t3KcK0jpWGGQlxAIEI onysatkm+FHHrYp3GD8RsZFcLt+O26yKkJ22ijiUgVCbVjutX8TCfDsd+niYSJWQgj XPdWr/klbRQSg== From: guoren@kernel.org To: arnd@arndb.de, guoren@kernel.org, palmer@rivosinc.com, tglx@linutronix.de, peterz@infradead.org, luto@kernel.org, conor.dooley@microchip.com, heiko@sntech.de, jszhang@kernel.org, lazyparser@gmail.com, falcon@tinylab.org, chenhuacai@kernel.org, apatel@ventanamicro.com, atishp@atishpatra.org, mark.rutland@arm.com, bjorn@kernel.org Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Guo Ren Subject: [PATCH -next V11 0/3] riscv: Add independent irq/softirq stacks Date: Fri, 24 Mar 2023 03:12:36 -0400 Message-Id: <20230324071239.151677-1-guoren@kernel.org> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guo Ren This patch series adds independent irq/softirq stacks to decrease the press of the thread stack. Also, add a thread STACK_SIZE config for users to adjust the proper size during compile time. This patch series belonged to the generic entry, which has been merged to for-next now. v11: - Rebase on palmer/for-next (20230324) - Separate from generic entry patch series. v10: https://lore.kernel.org/linux-riscv/20221208025816.138712-1-guoren@kernel.org/ - Rebase on palmer/for-next branch (20221208) - Remove unrelated patches from the series (Suggested-by: Bjorn) - Fixup Typos. v9: https://lore.kernel.org/linux-riscv/20221130034059.826599-1-guoren@kernel.org/ - Fixup NR_syscalls check (by Ben Hutchings) - Add Tested-by: Jisheng Zhang v8: https://lore.kernel.org/linux-riscv/20221103075047.1634923-1-guoren@kernel.org/ - Rebase on palmer/for-next branch (20221102) - Add save/restore_from_x5_to_x31 .macro (JishengZhang) - Consolidate ret_from_kernel_thread into ret_from_fork (JishengZhang) - Optimize __noinstr_section comment (JiangshanLai) v7: https://lore.kernel.org/linux-riscv/20221015114702.3489989-1-guoren@kernel.org/ - Fixup regs_irqs_disabled with SR_PIE - Optimize stackleak_erase -> stackleak_erase_on_task_stack (Thx Mark Rutland) - Add BUG_ON(!irqs_disabled()) in trap handlers - Using regs_irqs_disabled in __do_page_fault - Remove unnecessary irq disable in ret_from_exception and add comment v6: https://lore.kernel.org/linux-riscv/20221002012451.2351127-1-guoren@kernel.org/ - Use THEAD_SIZE_ORDER for thread size adjustment in kconfig (Thx Arnd) - Move call_on_stack to inline style (Thx Peter Zijlstra) - Fixup fp chain broken (Thx Chen Zhongjin) - Remove common entry modification, and fixup page_fault entry (Thx Peter Zijlstra) - Treat some traps as nmi entry (Thx Peter Zijlstra) v5: https://lore.kernel.org/linux-riscv/20220918155246.1203293-1-guoren@kernel.org/ - Add riscv own stackleak patch instead of generic entry modification (by Mark Rutland) - Add EXPERT dependency for THREAD_SIZE (by Arnd) - Add EXPERT dependency for IRQ_STACK (by Sebastian, David Laight) - Corrected __trap_section (by Peter Zijlstra) - Add Tested-by (Yipeng Zou) - Use CONFIG_SOFTIRQ_ON_OWN_STACK replace "#ifndef CONFIG_PREEMPT_RT" - Fixup systrace_enter compile error - Fixup exit_to_user_mode_prepare preempt_disable warning V4: https://lore.kernel.org/linux-riscv/20220908022506.1275799-1-guoren@kernel.org/ - Fixup entry.S with "la" bug (by Conor.Dooley) - Fixup missing noinstr bug (by Peter Zijlstra) V3: https://lore.kernel.org/linux-riscv/20220906035423.634617-1-guoren@kernel.org/ - Fixup CONFIG_COMPAT=n compile error - Add THREAD_SIZE_ORDER config - Optimize elf_kexec.c warning fixup - Add static to irq_stack_ptr definition V2: https://lore.kernel.org/linux-riscv/20220904072637.8619-1-guoren@kernel.org/ - Fixup compile error by include "riscv: ptrace: Remove duplicate operation" - Fixup compile warning Reported-by: kernel test robot - Add test repo link in cover letter V1: https://lore.kernel.org/linux-riscv/20220903163808.1954131-1-guoren@kernel.org/ Guo Ren (3): riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK riscv: stack: Add config of thread stack size arch/riscv/Kconfig | 19 ++++++++ arch/riscv/include/asm/thread_info.h | 14 ++---- arch/riscv/include/asm/vmap_stack.h | 28 ++++++++++++ arch/riscv/kernel/irq.c | 66 ++++++++++++++++++++++++++++ arch/riscv/kernel/traps.c | 38 +++++++++++++++- 5 files changed, 152 insertions(+), 13 deletions(-) create mode 100644 arch/riscv/include/asm/vmap_stack.h -- 2.36.1