lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200225224719.950376311@linutronix.de>
Date:   Tue, 25 Feb 2020 23:47:19 +0100
From:   Thomas Gleixner <tglx@...utronix.de>
To:     LKML <linux-kernel@...r.kernel.org>
Cc:     x86@...nel.org, Steven Rostedt <rostedt@...dmis.org>,
        Brian Gerst <brgerst@...il.com>,
        Juergen Gross <jgross@...e.com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Arnd Bergmann <arnd@...db.de>
Subject: [patch 00/15] x86/entry: Consolidation - Part V

Hi!

This is the fifthh batch of a 73 patches series which consolidates the x86
entry code. The larger explanation is in the part I cover letter:

 https://lore.kernel.org/r/20200225213636.689276920@linutronix.de

I applies on top of part IV which can be found here:

 https://lore.kernel.org/r/20200225223321.231477305@linutronix.de

This is the last step of _this_ consolidation work:

  - Get rid of the odd vector number transport via pt_regs for do_IRQ() and
    spurious interrupt handlers by pushing the plain vector number into the
    error code location and providing it as second argument to the C
    functions. This also gets rid of thehistorical adjustment of the vector
    number into the -0x80 to 0x7f range which does not make any sense for
    at least 15 years but still survived until today

  - Get rid of the special entry code for device interrupts which just can
    use the common idtentry mechanisms as all other exceptions do.

  - Convert all the system vectors to the IDTENTRY mechanism and get rid of
    the pointless difference in evicting them on 32 and 64 bit

  - Finally move the return from exception work (prepare return to user
    mode and kernel preemption) into C-code and get rid of the ASM gunk.

This applies on top of part three which is available here:

   git://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git entry-v1-part4

To get part 1 - 5 pull from here:

   git://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git entry-v1-part5

The diffstat for part V is appended below. The overall diffstat summary is:

 50 files changed, 1380 insertions(+), 1264 deletions(-)

but most importantly the overall diffstat for the ASM code is:

 3 files changed, 302 insertions(+), 759 deletions(-)

i.e. 457 lines of ASM gone...

and all idt entry points have now:

  - a central home in idtentry.h instead of being sprinkled aorund 10 files

  - a consistent naming scheme also vs. XEN/PV

  - the same entry/exit conventions and protections against all sorts of
    instrumentation which makes it harder to screw up for new entry points

This finally allows to move the sysall entry/exit work into a generic place
and fix the initial problem of moving POSIX CPu tiemrs hevay lifting into
thread context. But that's going to be another 25 patches which are coming
once this is resolved.

Thanks,

	tglx

8<---------------
 arch/x86/include/asm/acrn.h             |   11 -
 arch/x86/include/asm/entry_arch.h       |   56 ------
 b/arch/x86/entry/common.c               |   56 ++++--
 b/arch/x86/entry/entry_32.S             |  123 ++-----------
 b/arch/x86/entry/entry_64.S             |  296 +++++---------------------------
 b/arch/x86/hyperv/hv_init.c             |    3 
 b/arch/x86/include/asm/hw_irq.h         |   22 --
 b/arch/x86/include/asm/idtentry.h       |  143 +++++++++++++++
 b/arch/x86/include/asm/irq.h            |    6 
 b/arch/x86/include/asm/irq_work.h       |    1 
 b/arch/x86/include/asm/mshyperv.h       |   14 -
 b/arch/x86/include/asm/traps.h          |   10 -
 b/arch/x86/include/asm/uv/uv_bau.h      |    6 
 b/arch/x86/kernel/apic/apic.c           |   28 ++-
 b/arch/x86/kernel/apic/msi.c            |    3 
 b/arch/x86/kernel/apic/vector.c         |    2 
 b/arch/x86/kernel/cpu/acrn.c            |    6 
 b/arch/x86/kernel/cpu/mce/amd.c         |    2 
 b/arch/x86/kernel/cpu/mce/therm_throt.c |    2 
 b/arch/x86/kernel/cpu/mce/threshold.c   |    2 
 b/arch/x86/kernel/cpu/mshyperv.c        |   18 +
 b/arch/x86/kernel/idt.c                 |   34 +--
 b/arch/x86/kernel/irq.c                 |   21 +-
 b/arch/x86/kernel/irq_work.c            |    3 
 b/arch/x86/kernel/smp.c                 |   10 -
 b/arch/x86/platform/uv/tlb_uv.c         |    2 
 b/arch/x86/xen/enlighten_hvm.c          |    6 
 b/drivers/xen/events/events_base.c      |    3 
 b/include/xen/events.h                  |    7 
 29 files changed, 350 insertions(+), 546 deletions(-)



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ