Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp1610318lqg; Sun, 3 Mar 2024 19:43:36 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWFLdkpxY9rL5bm5GwF0z0jrIoDXtSocWU9G5pH0oBZRPtO854RTy/YYkYCzgbJ+nNOQM6lFqAP3wnbKvGF1B/1dX5DAFpp5UEih4PD3A== X-Google-Smtp-Source: AGHT+IHqlKlBv0zpw9b5TjD6OzSqlvZbfTQA/rV8p/N8NfH0fwe6OVUu5aVu2/A5DzpTPe7o49dQ X-Received: by 2002:a05:6870:dc4b:b0:21f:f485:6b71 with SMTP id nr11-20020a056870dc4b00b0021ff4856b71mr10915456oab.8.1709523816075; Sun, 03 Mar 2024 19:43:36 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709523816; cv=pass; d=google.com; s=arc-20160816; b=khW4HBO17dhp2NrUOiH4+p0Vj8jwGv6+2HcQrhTN3yVd4mU5jGJXC61IY9mH/HymEa AVZ0sazvDl8bscfK7OjQXT0MsUgGTIFkpXm08IxVM8i95BxlUcyVR1cOszOigTWjRX6B 5j9bZNZpA4qFkFagMsFo9Md1Ap82T1mDAQ0UaATreDwLgDETasvOsAx60KR//du5U/8I 382d2BIY6EppiR2ZXVyNciSVL1E8HRVggJOVRYttgZwbNydSYOP3GVP31z0zQ5pmkcyb 3rfeLiZQkd5Qq3at/Pmkfv6dOyGF7AiMYEusYbzVRHcf7gu5nNlfGmslzSEX/9mk04ZH AGGg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:autocrypt:from:references:cc :to:content-language:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature:dkim-filter; bh=kxK3n3B02k0LufS4sQ2boXcylT29zMPGAu21KJsxq+w=; fh=V6+ciZq7QRYzKQeN/7NpYFaJPoZ2oBLdwzIx0DTJlUw=; b=jP+gFz7qtzTB6iAFBXm+s5uOHZFvZlcqaZzW4Ey6iVLNQ6UqUdUG7QiDt9QORd+/HS kguzCvAgS+Cn9SxZsCTyPQlKqu407Qv/vpvAzOiNPTKo0N8s8EIcpYFZ5Xx1j/juiikZ cpF/RcTtxgCM47JxA83Y5x+r7CUCap5oOgoyvSGg4u0gAxL9JRT/CjFBGr8hl1AFjkBB vQqVYJjEdI84PYGKGVYuD+WRwBEuyC1rFeHprkcWiP/87fKwvfhzoUkrncfkYYv8P1ge ecANWbcRIMv8S/8MirYHMVjMHu2zaUSjbBdC5k0ZJoArzZ4BTni52y2zmBYcamlP/GCS 02pA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@zytor.com header.s=2024021201 header.b=MYYwUZT7; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-90029-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90029-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id m2-20020a056a00080200b006e62522d2d5si822936pfk.47.2024.03.03.19.43.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Mar 2024 19:43:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-90029-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2024021201 header.b=MYYwUZT7; arc=pass (i=1 spf=pass spfdomain=zytor.com dkim=pass dkdomain=zytor.com dmarc=pass fromdomain=zytor.com); spf=pass (google.com: domain of linux-kernel+bounces-90029-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90029-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 0E0ABB20D70 for ; Mon, 4 Mar 2024 03:43:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AA83B53A6; Mon, 4 Mar 2024 03:43:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="MYYwUZT7" Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D89A34A34 for ; Mon, 4 Mar 2024 03:43:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709523806; cv=none; b=d3DKW63zs+qPui/JPtYWUxRIOgnxq/l2bibi7B/PFvvBWz0ceZ68aUh9ALIMU8wYtXIM5cv+y0BOMyRIwQ0AWXhjRV5xkBSvABZBkTHeugGq1UV40OEUuWpirGfZh10k1gionT7Pixws82QZOkD+cGlXu+PgicSkvmCZ+uJzG4I= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709523806; c=relaxed/simple; bh=WQdAjRAvd8yoUf68adlmp9MGoVa20z28kX5tHVe7lqo=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=pt4zr3wN3GSftv7KGxP4AhJsny2SN3Pw4py22raXbo95uONoxxKRlIwW5INkeQanrC4CVBkxLrh69ZbG/SHtLnA6+f4Wp+Gy7aFUgDKpwgFVn8b/uQ6M3WoJCn4Nvs/pWUNTfioxarQ7uq2p2iqjVkom1UJrWY44nqgITWFqJWk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=MYYwUZT7; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Received: from [192.168.7.187] ([71.202.166.45]) (authenticated bits=0) by mail.zytor.com (8.17.2/8.17.1) with ESMTPSA id 4243gVoE348953 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Sun, 3 Mar 2024 19:42:31 -0800 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 4243gVoE348953 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2024021201; t=1709523752; bh=kxK3n3B02k0LufS4sQ2boXcylT29zMPGAu21KJsxq+w=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=MYYwUZT7OL67/hxy3KZBJ31D6Hai+1BwyQP3xEzwDmx33eOA05S5wkQIhYo94FiyX MH3Fldufn0+SFQkhyL8MYA31pVXi8Fa7gnr0/jEyJP7iGehmJmk1C91ZIpKEabUPLE UJme0Gyvn5ZfBylOYTBWk4TsoooBQpNmnHHzpuWSO50HPAtQ/ISWCUrpjmNyMVv7DM fsMyxw4WWe+J61faEY2QBOKl4Tr7KRc/FMEM4vyggGza2qo/LRyPEAn6xsd1iNuvjT uhXrb6IxmOJD8SyQIcxzaBOeLvZgOd6sZJC4SzrsOdRkpL7A0HEFM4Ql9ySOcGvlyt 6uyR5BhdVNrsA== Message-ID: <382e966b-4cac-4e28-a230-53ac52f91bf9@zytor.com> Date: Sun, 3 Mar 2024 19:42:30 -0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v1 1/1] x86/fred: Fix init_task thread stack pointer initialization Content-Language: en-US To: Brian Gerst Cc: linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com References: <20240301084046.3370376-1-xin@zytor.com> From: Xin Li Autocrypt: addr=xin@zytor.com; keydata= xsDNBGUPz1cBDACS/9yOJGojBFPxFt0OfTWuMl0uSgpwk37uRrFPTTLw4BaxhlFL0bjs6q+0 2OfG34R+a0ZCuj5c9vggUMoOLdDyA7yPVAJU0OX6lqpg6z/kyQg3t4jvajG6aCgwSDx5Kzg5 Rj3AXl8k2wb0jdqRB4RvaOPFiHNGgXCs5Pkux/qr0laeFIpzMKMootGa4kfURgPhRzUaM1vy bsMsL8vpJtGUmitrSqe5dVNBH00whLtPFM7IbzKURPUOkRRiusFAsw0a1ztCgoFczq6VfAVu raTye0L/VXwZd+aGi401V2tLsAHxxckRi9p3mc0jExPc60joK+aZPy6amwSCy5kAJ/AboYtY VmKIGKx1yx8POy6m+1lZ8C0q9b8eJ8kWPAR78PgT37FQWKYS1uAroG2wLdK7FiIEpPhCD+zH wlslo2ETbdKjrLIPNehQCOWrT32k8vFNEMLP5G/mmjfNj5sEf3IOKgMTMVl9AFjsINLHcxEQ 6T8nGbX/n3msP6A36FDfdSEAEQEAAc0WWGluIExpIDx4aW5Aenl0b3IuY29tPsLBDQQTAQgA NxYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89XBQkFo5qAAhsDBAsJCAcFFQgJCgsFFgID AQAACgkQa70OVx2uN1HUpgv/cM2fsFCQodLArMTX5nt9yqAWgA5t1srri6EgS8W3F+3Kitge tYTBKu6j5BXuXaX3vyfCm+zajDJN77JHuYnpcKKr13VcZi1Swv6Jx1u0II8DOmoDYLb1Q2ZW v83W55fOWJ2g72x/UjVJBQ0sVjAngazU3ckc0TeNQlkcpSVGa/qBIHLfZraWtdrNAQT4A1fa sWGuJrChBFhtKbYXbUCu9AoYmmbQnsx2EWoJy3h7OjtfFapJbPZql+no5AJ3Mk9eE5oWyLH+ QWqtOeJM7kKvn/dBudokFSNhDUw06e7EoVPSJyUIMbYtUO7g2+Atu44G/EPP0yV0J4lRO6EA wYRXff7+I1jIWEHpj5EFVYO6SmBg7zF2illHEW31JAPtdDLDHYcZDfS41caEKOQIPsdzQkaQ oW2hchcjcMPAfyhhRzUpVHLPxLCetP8vrVhTvnaZUo0xaVYb3+wjP+D5j/3+hwblu2agPsaE vgVbZ8Fx3TUxUPCAdr/p73DGg57oHjgezsDNBGUPz1gBDAD4Mg7hMFRQqlzotcNSxatlAQNL MadLfUTFz8wUUa21LPLrHBkUwm8RujehJrzcVbPYwPXIO0uyL/F///CogMNx7Iwo6by43KOy g89wVFhyy237EY76j1lVfLzcMYmjBoTH95fJC/lVb5Whxil6KjSN/R/y3jfG1dPXfwAuZ/4N cMoOslWkfZKJeEut5aZTRepKKF54T5r49H9F7OFLyxrC/uI9UDttWqMxcWyCkHh0v1Di8176 jjYRNTrGEfYfGxSp+3jYL3PoNceIMkqM9haXjjGl0W1B4BidK1LVYBNov0rTEzyr0a1riUrp Qk+6z/LHxCM9lFFXnqH7KWeToTOPQebD2B/Ah5CZlft41i8L6LOF/LCuDBuYlu/fI2nuCc8d m4wwtkou1Y/kIwbEsE/6RQwRXUZhzO6llfoN96Fczr/RwvPIK5SVMixqWq4QGFAyK0m/1ap4 bhIRrdCLVQcgU4glo17vqfEaRcTW5SgX+pGs4KIPPBE5J/ABD6pBnUUAEQEAAcLA/AQYAQgA JhYhBIUq/WFSDTiOvUIqv2u9DlcdrjdRBQJlD89ZBQkFo5qAAhsMAAoJEGu9DlcdrjdR4C0L /RcjolEjoZW8VsyxWtXazQPnaRvzZ4vhmGOsCPr2BPtMlSwDzTlri8BBG1/3t/DNK4JLuwEj OAIE3fkkm+UG4Kjud6aNeraDI52DRVCSx6xff3bjmJsJJMb12mWglN6LjdF6K+PE+OTJUh2F dOhslN5C2kgl0dvUuevwMgQF3IljLmi/6APKYJHjkJpu1E6luZec/lRbetHuNFtbh3xgFIJx 2RpgVDP4xB3f8r0I+y6ua+p7fgOjDLyoFjubRGed0Be45JJQEn7A3CSb6Xu7NYobnxfkwAGZ Q81a2XtvNS7Aj6NWVoOQB5KbM4yosO5+Me1V1SkX2jlnn26JPEvbV3KRFcwV5RnDxm4OQTSk PYbAkjBbm+tuJ/Sm+5Yp5T/BnKz21FoCS8uvTiziHj2H7Cuekn6F8EYhegONm+RVg3vikOpn gao85i4HwQTK9/D1wgJIQkdwWXVMZ6q/OALaBp82vQ2U9sjTyFXgDjglgh00VRAHP7u1Rcu4 l75w1xInsg== In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 3/2/2024 5:20 AM, Brian Gerst wrote: > On Fri, Mar 1, 2024 at 11:18 PM Xin Li wrote: >> >> On 3/1/2024 5:15 AM, Brian Gerst wrote: >>> On Fri, Mar 1, 2024 at 3:41 AM Xin Li (Intel) wrote: >>> There is another spot in head_64.S that also needs this offset: >> >> I checked all references to __end_init_task before sending out this >> patch, and I doubt we need to make more similar changes. >> >> First of all, "movq TASK_threadsp(%rcx), %rsp" you added in >> 3adee777ad0d ("x86/smpboot: Remove initial_stack on 64-bit") is exactly >> what we need to set up %rsp for the init task. >> >>> /* Set up the stack for verify_cpu() */ >>> leaq (__end_init_task - PTREGS_SIZE)(%rip), %rsp >> >> As the comment says, it's a _temporary_ stack for calling verify_cpu() >> (but only for BSP, as APs use a different bring up stack), at which >> stage the concept of "task" has not formed. I'm thinking maybe it's >> better to do: >> >> /* Set up the stack for verify_cpu() */ >> leaq __end_init_task(%rip), %rsp >> >> Previously it was "leaq (__end_init_task - FRAME_SIZE)(%rip), %rsp", >> but the kernel unwinder goes up only to secondary_startup_64_no_verify() >> after the new way you introduced to set up %rsp for the init task, and >> it seems to me that there is no point to subtract FRAME_SIZE or >> PTREGS_SIZE. >> >> On the other hand, TOP_OF_KERNEL_STACK_PADDING is required for x86_32, >> but probably not for x86_64 (defined as 0 before FRED). The most >> important usage of TOP_OF_KERNEL_STACK_PADDING is to get the pt_regs >> pointer for a task, i.e., task_pt_regs(task), which assumes a fixed >> offset from the top of a task stack, but also limits the space that >> could be used by future hardware above the pt_regs structure. Thus I >> prefer to limit the usage of TOP_OF_KERNEL_STACK_PADDING on x86_64. > > The point is to keep consistency with other kernel threads, which have > the pt_regs area cleared (see copy_thread()). In particular, the CS > field can't have junk in it or else user_mode(regs) could return the > wrong result. So the stack needs to start below pt_regs, or we need > to explicitly zero pt_regs later. Okay, I will add TOP_OF_KERNEL_STACK_PADDING to the spot in arch/x86/kernel/head_64.S, plus another spot in arch/x86/xen/xen-head.S. However, I still think it would be better to not have TOP_OF_KERNEL_STACK_PADDING in these spots, instead we should explicitly zero pt_regs later; any *implicit* protocol is NOT welcome. I will find a timer later to check with the x86 maintainers :) > Ideally, the load from thread->sp should just shift RSP by phys_base, > pointing to the same memory location in the virtual mapping. I prefer to do this explicitly as what's done now; it may be easier to understand for future kernel developers. Thanks! Xin