Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp695619lqg; Fri, 1 Mar 2024 20:18:53 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUZSarpxGHuAYtnmBtNYCf8C2jWakkIM7pV3TXufCzmqNAb0TX5vLeI4yvJiF6USR9KlA47ZutD1o0n4V1M4J/JPjNnD0cOxlXWki+klw== X-Google-Smtp-Source: AGHT+IGx/JAm8F9g4e6sUeN9pNRJzvWu9eRgpTHmFRHIkcvszxYEQaNEW0lsT3DNTwcfdVK3xNsh X-Received: by 2002:ac8:7dc4:0:b0:42e:8ce6:66de with SMTP id c4-20020ac87dc4000000b0042e8ce666demr3719314qte.24.1709353133040; Fri, 01 Mar 2024 20:18:53 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709353133; cv=pass; d=google.com; s=arc-20160816; b=Sb3Px6945Wt9aDN+3ndMQPpvZrkI/Q4EabXumeOxAUJ94MI/MAAw0it2uKRjPIinwb 4L/0g8AhypzRDTaz8QlY33xV0mzOJx8BLMsm9ErIY2G6j66XSpgAqKbA9Xr27kv7olz3 qu5NA1gMxaTCKo/l+tG5TV/W2tHk+38Y641pn1HekacSYbDk49mOydvRt0O0vNLOPWX4 fhJvzx71eQ7xIJ3OLGL24b/A+jVMXTGLANE/Xtm+P+tx3mUqXXQn7HOyQ7rSJd2097Jm o9sgGqZp9zXtUPtcDDWy6ouO86anYZroxhdejYltT7brp5B1mKNMz4sP2h0oWBTTgW6F HZug== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:autocrypt:from :content-language:references:cc:to:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature:dkim-filter; bh=zkH9jdOm9lyQ5evGJsoOR0OkpIqw0UDM+K1wsPFRox4=; fh=V6+ciZq7QRYzKQeN/7NpYFaJPoZ2oBLdwzIx0DTJlUw=; b=EOvnxEW6/L1jx/LSvFgTcBSL9AgzRW3/exbatGS7M6vo3DMH0igH28fWI1wdrFCVnh u1SlyS62Ma0YRyfCN8yin8+pcBNbQzyQkZYd8dhBn8ZEF6oFVuHdJFRXBk0f55W5w9en 4aEiuDtV5Zp3D/RKnBzXm5bpUM8NxseCkPuQJ5gv4xqZcOl0DwcnlrtXWYWyJsrLFyxg PWuavlj4PFJYpSpjoGDPXxA3rjx5IyR3vi/FwptgLeCgB4AfCFURa7F6UoBxznUwkj77 UMlmnWpjWRLJOV2Q3DMUCsdT76ayGB2xVJ69CJY72JMIiWfpNhcwFkK2J7oVDqNf+BP9 gAXQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@zytor.com header.s=2024021201 header.b=cPe2no9m; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-89332-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89332-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id m16-20020ac86890000000b0042dc2aa2568si4582988qtq.635.2024.03.01.20.18.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Mar 2024 20:18:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-89332-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2024021201 header.b=cPe2no9m; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-89332-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89332-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B03341C218FF for ; Sat, 2 Mar 2024 04:18:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B236A11C88; Sat, 2 Mar 2024 04:18:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="cPe2no9m" Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2EFC5B662 for ; Sat, 2 Mar 2024 04:18:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709353123; cv=none; b=LQi2AVDmwCeoHG3HjMnQN3uMX7okCa73fpvDkRQNg7jmt7l+qrHAtyaMBC4BH+MHvpwOSMwzo6s6a+03+P1qhds59xLqsTVXMHykb/11hw6NpDJvt4/Rr7NLTuWYlIzgSB5m4zIgjTVOC1EXDtROIgW4PTuhGHcflV5DxoqnVuM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709353123; c=relaxed/simple; bh=Ujmcpy2dB7P+XYqqlVtvlzsrGz012Xd/azkbDPGDSzM=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=JKTyecr5nvV+plKuFBu1vhnWoYuYJVYS29qKrHoJQct/ifcDvKxL/gMa/f6bDd8tsU6KOmrKV7CUk9BkfvmS/RJKVmwnSpvmJkv0XSoNAknJxoDWLZ8E3uTC/gNMNG1Ihce5xIWjDrsv/bSIuAVlO+8H4+ugDVx+639f4CCbBGU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=cPe2no9m; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Received: from [192.168.7.187] ([71.202.166.45]) (authenticated bits=0) by mail.zytor.com (8.17.2/8.17.1) with ESMTPSA id 4224HjZX3764965 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Fri, 1 Mar 2024 20:17:46 -0800 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 4224HjZX3764965 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2024021201; t=1709353066; bh=zkH9jdOm9lyQ5evGJsoOR0OkpIqw0UDM+K1wsPFRox4=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=cPe2no9mszrnzVala+OgOyDQNIVm0rLeH3QmJzE339wXl+UHwys9tQJ4gPkGL8P6G 4gdXsgZTvcbfhqzV1lfEXVp7Ux7X+YWAhSrfpE+rhrFGFZhTzXWTxXb0ynvLtw8Lc3 YglhPeCXvLE7xM6EC2pbsGX58d9DRMUbhA0SZc4XqFXla2H65izhXgVsM4muy9y93w DZX/OK8f+gSmmL6+9Q/kmp9nXgKvjH20bza8zP+ldFXkaselIxUDexTAh2FVg60wY+ DqcAo9KajsYPXyQE1RIbQaWtZbX1PpMX0/6/fsIOnt7gnafVEEeQuXcqNvVjl2TFf6 XuUSUvPvUsdTg== Message-ID: Date: Fri, 1 Mar 2024 20:17:44 -0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v1 1/1] x86/fred: Fix init_task thread stack pointer initialization To: Brian Gerst Cc: linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com References: <20240301084046.3370376-1-xin@zytor.com> Content-Language: en-US From: Xin Li Autocrypt: addr=xin@zytor.com; keydata= xsDNBGUPz1cBDACS/9yOJGojBFPxFt0OfTWuMl0uSgpwk37uRrFPTTLw4BaxhlFL0bjs6q+0 2OfG34R+a0ZCuj5c9vggUMoOLdDyA7yPVAJU0OX6lqpg6z/kyQg3t4jvajG6aCgwSDx5Kzg5 Rj3AXl8k2wb0jdqRB4RvaOPFiHNGgXCs5Pkux/qr0laeFIpzMKMootGa4kfURgPhRzUaM1vy bsMsL8vpJtGUmitrSqe5dVNBH00whLtPFM7IbzKURPUOkRRiusFAsw0a1ztCgoFczq6VfAVu raTye0L/VXwZd+aGi401V2tLsAHxxckRi9p3mc0jExPc60joK+aZPy6amwSCy5kAJ/AboYtY VmKIGKx1yx8POy6m+1lZ8C0q9b8eJ8kWPAR78PgT37FQWKYS1uAroG2wLdK7FiIEpPhCD+zH wlslo2ETbdKjrLIPNehQCOWrT32k8vFNEMLP5G/mmjfNj5sEf3IOKgMTMVl9AFjsINLHcxEQ 6T8nGbX/n3msP6A36FDfdSEAEQEAAc0WWGluIExpIDx4aW5Aenl0b3IuY29tPsLBDQQTAQgA NxYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89XBQkFo5qAAhsDBAsJCAcFFQgJCgsFFgID AQAACgkQa70OVx2uN1HUpgv/cM2fsFCQodLArMTX5nt9yqAWgA5t1srri6EgS8W3F+3Kitge tYTBKu6j5BXuXaX3vyfCm+zajDJN77JHuYnpcKKr13VcZi1Swv6Jx1u0II8DOmoDYLb1Q2ZW v83W55fOWJ2g72x/UjVJBQ0sVjAngazU3ckc0TeNQlkcpSVGa/qBIHLfZraWtdrNAQT4A1fa sWGuJrChBFhtKbYXbUCu9AoYmmbQnsx2EWoJy3h7OjtfFapJbPZql+no5AJ3Mk9eE5oWyLH+ QWqtOeJM7kKvn/dBudokFSNhDUw06e7EoVPSJyUIMbYtUO7g2+Atu44G/EPP0yV0J4lRO6EA wYRXff7+I1jIWEHpj5EFVYO6SmBg7zF2illHEW31JAPtdDLDHYcZDfS41caEKOQIPsdzQkaQ oW2hchcjcMPAfyhhRzUpVHLPxLCetP8vrVhTvnaZUo0xaVYb3+wjP+D5j/3+hwblu2agPsaE vgVbZ8Fx3TUxUPCAdr/p73DGg57oHjgezsDNBGUPz1gBDAD4Mg7hMFRQqlzotcNSxatlAQNL MadLfUTFz8wUUa21LPLrHBkUwm8RujehJrzcVbPYwPXIO0uyL/F///CogMNx7Iwo6by43KOy g89wVFhyy237EY76j1lVfLzcMYmjBoTH95fJC/lVb5Whxil6KjSN/R/y3jfG1dPXfwAuZ/4N cMoOslWkfZKJeEut5aZTRepKKF54T5r49H9F7OFLyxrC/uI9UDttWqMxcWyCkHh0v1Di8176 jjYRNTrGEfYfGxSp+3jYL3PoNceIMkqM9haXjjGl0W1B4BidK1LVYBNov0rTEzyr0a1riUrp Qk+6z/LHxCM9lFFXnqH7KWeToTOPQebD2B/Ah5CZlft41i8L6LOF/LCuDBuYlu/fI2nuCc8d m4wwtkou1Y/kIwbEsE/6RQwRXUZhzO6llfoN96Fczr/RwvPIK5SVMixqWq4QGFAyK0m/1ap4 bhIRrdCLVQcgU4glo17vqfEaRcTW5SgX+pGs4KIPPBE5J/ABD6pBnUUAEQEAAcLA/AQYAQgA JhYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89ZBQkFo5qAAhsMAAoJEGu9DlcdrjdR4C0L /RcjolEjoZW8VsyxWtXazQPnaRvzZ4vhmGOsCPr2BPtMlSwDzTlri8BBG1/3t/DNK4JLuwEj OAIE3fkkm+UG4Kjud6aNeraDI52DRVCSx6xff3bjmJsJJMb12mWglN6LjdF6K+PE+OTJUh2F dOhslN5C2kgl0dvUuevwMgQF3IljLmi/6APKYJHjkJpu1E6luZec/lRbetHuNFtbh3xgFIJx 2RpgVDP4xB3f8r0I+y6ua+p7fgOjDLyoFjubRGed0Be45JJQEn7A3CSb6Xu7NYobnxfkwAGZ Q81a2XtvNS7Aj6NWVoOQB5KbM4yosO5+Me1V1SkX2jlnn26JPEvbV3KRFcwV5RnDxm4OQTSk PYbAkjBbm+tuJ/Sm+5Yp5T/BnKz21FoCS8uvTiziHj2H7Cuekn6F8EYhegONm+RVg3vikOpn gao85i4HwQTK9/D1wgJIQkdwWXVMZ6q/OALaBp82vQ2U9sjTyFXgDjglgh00VRAHP7u1Rcu4 l75w1xInsg== In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 3/1/2024 5:15 AM, Brian Gerst wrote: > On Fri, Mar 1, 2024 at 3:41 AM Xin Li (Intel) wrote: > There is another spot in head_64.S that also needs this offset: I checked all references to __end_init_task before sending out this patch, and I doubt we need to make more similar changes. First of all, "movq TASK_threadsp(%rcx), %rsp" you added in 3adee777ad0d ("x86/smpboot: Remove initial_stack on 64-bit") is exactly what we need to set up %rsp for the init task. > /* Set up the stack for verify_cpu() */ > leaq (__end_init_task - PTREGS_SIZE)(%rip), %rsp As the comment says, it's a _temporary_ stack for calling verify_cpu() (but only for BSP, as APs use a different bring up stack), at which stage the concept of "task" has not formed. I'm thinking maybe it's better to do: /* Set up the stack for verify_cpu() */ leaq __end_init_task(%rip), %rsp Previously it was "leaq (__end_init_task - FRAME_SIZE)(%rip), %rsp", but the kernel unwinder goes up only to secondary_startup_64_no_verify() after the new way you introduced to set up %rsp for the init task, and it seems to me that there is no point to subtract FRAME_SIZE or PTREGS_SIZE. On the other hand, TOP_OF_KERNEL_STACK_PADDING is required for x86_32, but probably not for x86_64 (defined as 0 before FRED). The most important usage of TOP_OF_KERNEL_STACK_PADDING is to get the pt_regs pointer for a task, i.e., task_pt_regs(task), which assumes a fixed offset from the top of a task stack, but also limits the space that could be used by future hardware above the pt_regs structure. Thus I prefer to limit the usage of TOP_OF_KERNEL_STACK_PADDING on x86_64. Thanks! Xin