Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp4598102rwl; Mon, 3 Apr 2023 07:12:23 -0700 (PDT) X-Google-Smtp-Source: AKy350Z9rDnA3Gqf2psI0G6o7n4qgJHIEENky1+4xYdnbu/zzRaMaTeKgmZ0aP87PicezdDRwNZh X-Received: by 2002:aa7:d60c:0:b0:502:9578:38ed with SMTP id c12-20020aa7d60c000000b00502957838edmr5716478edr.27.1680531143647; Mon, 03 Apr 2023 07:12:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680531143; cv=none; d=google.com; s=arc-20160816; b=BGmYgpjc39B3U+X1yJ2I1w/XnSzG9ERRVY8y33kSiRrMAizOzRdg0tTucDjSxEwMM8 jBvX+7+oFzazmKeYo7zPjsOlLKtFMSniLrXSRPUtdENgVU+P3RXyYP+SiUGDLEFqf+AN PfJJvoKaGnIFGwkqUJj0WDyjOsAXCk+nVNGukduslNS+h+pTKaeHa9eyEXIWJDqJXVFD EdooeeVfr7K3FyS2Gd0lA845xIty0Mxg1r8YtumzvUgoqUNcPQYjbt6SmqyFD4HZxrsu WmxVsD/ZYRgg9ws2gimX6tGFJx7J7dUUahZhgvrGrMrO9J3tlRAHUqUMeT4JlBqQOL8b /4YA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=pP1y+2npNFi89ug0/IC9s4GPFuEkE96kXvViHM8S82Y=; b=MyTrhT4DQ1TtAIBzO4CQ+Z+FpFXZ4ZKeHG9QfzYIXih52GAxIB7aBPcA43JO4QmA0a R99vTj6TQF6h9Bvn76sBt3YfdwUFial8SNpwsR3XVjbZ3I+Md9Ag1ClUY2affUYHgA+8 3GAWNdR12wsUbNTli8Grf5hYAnJk375tIkUz6+xjzauNOGxdKGfKAQUmKnvLCF8ZT4xA kOaEwD52CKfe/IkvwqG4mPhT74VegDC45JF7HVzBVyNGVwji+MMYvEG24aQB0NQhJZVm 82cO8Ealu0L2Bb8S1a7Te8gZeI3wL4LsLVaifABRv3e+QdlRwE4iCL58xJ1rQn1J/t60 mDwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=LYgZJSU2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s17-20020aa7cb11000000b0050281b75a38si6145531edt.386.2023.04.03.07.11.49; Mon, 03 Apr 2023 07:12:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=LYgZJSU2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232792AbjDCOFk (ORCPT + 99 others); Mon, 3 Apr 2023 10:05:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42322 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232805AbjDCOFc (ORCPT ); Mon, 3 Apr 2023 10:05:32 -0400 Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73BD227825; Mon, 3 Apr 2023 07:05:10 -0700 (PDT) Received: by mail-pj1-x102d.google.com with SMTP id q102so27289296pjq.3; Mon, 03 Apr 2023 07:05:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1680530709; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=pP1y+2npNFi89ug0/IC9s4GPFuEkE96kXvViHM8S82Y=; b=LYgZJSU2LQVRKrVl3gJ6LmbsVBK8qTWoaiMbyLBWehqV4nTSQiAgTT3PYjLLV4+aRl U/o2j8y3HhKy0BXoBFaF91+h1zy+ksM1f5aJ9S4ql1WBgMBz3UXtr2MiXM2Oqk+CK9Bh FpVuJHo+ShHAPoJPVbr1/j76Tn0xm9zDBoofWk1lh+VyAVl/OMjaduJ/HPanBKTvzPK5 w/3MvnrMud4MqCovVyBgPjuXkhxKBF3jEvDvzwRM1AVOIlg+3yXdxjK+D1u8spJ+bjpo 0i99aQYTXGrHlujBFga9HLJn/awlfmA7b9pLZkKhysVnQua51WB9SVYgu/B7BPwYOvba Yd/A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680530709; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=pP1y+2npNFi89ug0/IC9s4GPFuEkE96kXvViHM8S82Y=; b=nwAK7cguxb7/Pwc+zB6WxBgOrgFY/3Pr5KD8a/6iqwCY3VTecyU/kUhZi3zqmN5cpl n6RltTj2Oq7v/m+dIRP5NPHtMSyYgZJ3kebwUv1ZDz41GMQF3J5Io92+E4Gna+bvcc7V gE1Mt8fUx+t0PmONUSJc8H0yp/VH83i9T7rUOBh1ahGJphGehpEA0K0pGm3j0ivOCZBo 40hHQFhz5IXn1xN+T3OJGjyg2oMcX4Rd1hvrBaxorQgFPm6MgdhijKfthMLGBvmc8rtq EnxgojfPDLps4aDgYwVB0EgQCqIRXFzOfiA0MjCZ8M663xA2zcb7aa8mzgeibJ6Wa/eb TBRA== X-Gm-Message-State: AAQBX9cfzaZmYW+mokRoHHUq5kb3bB4e4fC7KCGJanSZPIoto66xP6QL RMUNCV6GuzfGlgEg0h/z2oAjL7AWFQw= X-Received: by 2002:a17:902:fa8d:b0:19f:30be:ea0d with SMTP id lc13-20020a170902fa8d00b0019f30beea0dmr30070199plb.62.1680530709345; Mon, 03 Apr 2023 07:05:09 -0700 (PDT) Received: from localhost ([198.11.176.14]) by smtp.gmail.com with ESMTPSA id u8-20020a170902a60800b001a045f45d49sm6638401plq.281.2023.04.03.07.05.08 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 03 Apr 2023 07:05:08 -0700 (PDT) From: Lai Jiangshan To: linux-kernel@vger.kernel.org Cc: Lai Jiangshan , "H. Peter Anvin" , Andi Kleen , Andrew Cooper , Andy Lutomirski , Asit Mallick , Cfir Cohen , Dan Williams , Dave Hansen , David Kaplan , David Rientjes , Dirk Hohndel , Erdem Aktas , Jan Kiszka , Jiri Slaby , Joerg Roedel , Juergen Gross , Kees Cook , Kirill Shutemov , Kuppuswamy Sathyanarayanan , Linus Torvalds , Mike Stunes , Peter Zijlstra , Raj Ashok , Sean Christopherson , Thomas Gleixner , Tom Lendacky , Tony Luck , kvm@vger.kernel.org, linux-coco@lists.linux.dev, x86@kernel.org, Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Jonathan Corbet , linux-doc@vger.kernel.org Subject: [RFC PATCH 2/7] x86/entry: Add IST main stack Date: Mon, 3 Apr 2023 22:06:00 +0800 Message-Id: <20230403140605.540512-3-jiangshanlai@gmail.com> X-Mailer: git-send-email 2.19.1.6.gb485710b In-Reply-To: <20230403140605.540512-1-jiangshanlai@gmail.com> References: <20230403140605.540512-1-jiangshanlai@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lai Jiangshan Add IST main stack for atomic-IST-entry. The size is THREAD_SIZE since there might be multiple super exceptions being handled on the stack. Signed-off-by: Lai Jiangshan --- Documentation/x86/kernel-stacks.rst | 2 ++ arch/x86/include/asm/cpu_entry_area.h | 5 +++++ arch/x86/kernel/dumpstack_64.c | 6 ++++-- arch/x86/mm/cpu_entry_area.c | 1 + 4 files changed, 12 insertions(+), 2 deletions(-) diff --git a/Documentation/x86/kernel-stacks.rst b/Documentation/x86/kernel-stacks.rst index 6b0bcf027ff1..be89acf302da 100644 --- a/Documentation/x86/kernel-stacks.rst +++ b/Documentation/x86/kernel-stacks.rst @@ -105,6 +105,8 @@ The currently assigned IST stacks are: middle of switching stacks. Using IST for MCE events avoids making assumptions about the previous state of the kernel stack. +* ESTACK_IST. bla bla + For more details see the Intel IA32 or AMD AMD64 architecture manuals. diff --git a/arch/x86/include/asm/cpu_entry_area.h b/arch/x86/include/asm/cpu_entry_area.h index 462fc34f1317..a373e8c37e25 100644 --- a/arch/x86/include/asm/cpu_entry_area.h +++ b/arch/x86/include/asm/cpu_entry_area.h @@ -10,6 +10,8 @@ #ifdef CONFIG_X86_64 +#define IST_MAIN_STKSZ THREAD_SIZE + #ifdef CONFIG_AMD_MEM_ENCRYPT #define VC_EXCEPTION_STKSZ EXCEPTION_STKSZ #else @@ -30,6 +32,8 @@ char VC_stack[optional_stack_size]; \ char VC2_stack_guard[guardsize]; \ char VC2_stack[optional_stack_size]; \ + char IST_stack_guard[guardsize]; \ + char IST_stack[IST_MAIN_STKSZ]; \ char IST_top_guard[guardsize]; \ /* The exception stacks' physical storage. No guard pages required */ @@ -52,6 +56,7 @@ enum exception_stack_ordering { ESTACK_MCE, ESTACK_VC, ESTACK_VC2, + ESTACK_IST, N_EXCEPTION_STACKS }; diff --git a/arch/x86/kernel/dumpstack_64.c b/arch/x86/kernel/dumpstack_64.c index f05339fee778..3413b23fa9f1 100644 --- a/arch/x86/kernel/dumpstack_64.c +++ b/arch/x86/kernel/dumpstack_64.c @@ -26,11 +26,12 @@ static const char * const exception_stack_names[] = { [ ESTACK_MCE ] = "#MC", [ ESTACK_VC ] = "#VC", [ ESTACK_VC2 ] = "#VC2", + [ ESTACK_IST ] = "#IST", }; const char *stack_type_name(enum stack_type type) { - BUILD_BUG_ON(N_EXCEPTION_STACKS != 6); + BUILD_BUG_ON(N_EXCEPTION_STACKS != ARRAY_SIZE(exception_stack_names)); if (type == STACK_TYPE_TASK) return "TASK"; @@ -89,6 +90,7 @@ struct estack_pages estack_pages[CEA_ESTACK_PAGES] ____cacheline_aligned = { EPAGERANGE(MCE), EPAGERANGE(VC), EPAGERANGE(VC2), + EPAGERANGE(IST), }; static __always_inline bool in_exception_stack(unsigned long *stack, struct stack_info *info) @@ -98,7 +100,7 @@ static __always_inline bool in_exception_stack(unsigned long *stack, struct stac struct pt_regs *regs; unsigned int k; - BUILD_BUG_ON(N_EXCEPTION_STACKS != 6); + BUILD_BUG_ON(N_EXCEPTION_STACKS != 7); begin = (unsigned long)__this_cpu_read(cea_exception_stacks); /* diff --git a/arch/x86/mm/cpu_entry_area.c b/arch/x86/mm/cpu_entry_area.c index 7316a8224259..62341cb819ab 100644 --- a/arch/x86/mm/cpu_entry_area.c +++ b/arch/x86/mm/cpu_entry_area.c @@ -148,6 +148,7 @@ static void __init percpu_setup_exception_stacks(unsigned int cpu) cea_map_stack(NMI); cea_map_stack(DB); cea_map_stack(MCE); + cea_map_stack(IST); if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { if (cc_platform_has(CC_ATTR_GUEST_STATE_ENCRYPT)) { -- 2.19.1.6.gb485710b