From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755856AbbCYPDz (ORCPT ); Wed, 25 Mar 2015 11:03:55 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47184 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753692AbbCYPDy (ORCPT ); Wed, 25 Mar 2015 11:03:54 -0400 Message-ID: <5512CE55.6040802@redhat.com> Date: Wed, 25 Mar 2015 16:03:49 +0100 From: Denys Vlasenko User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0 MIME-Version: 1.0 To: Ingo Molnar , Andy Lutomirski CC: Brian Gerst , Denys Vlasenko , Linus Torvalds , Steven Rostedt , Borislav Petkov , "H. Peter Anvin" , Oleg Nesterov , Frederic Weisbecker , Alexei Starovoitov , Will Drewry , Kees Cook , X86 ML , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] x86: vdso32/syscall.S: do not load __USER32_DS to %ss References: <1427129240-15543-1-git-send-email-dvlasenk@redhat.com> <20150324063430.GB26302@gmail.com> <55116FC1.1020400@redhat.com> <5511C641.7000700@redhat.com> <20150325092845.GA1809@gmail.com> In-Reply-To: <20150325092845.GA1809@gmail.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/25/2015 10:28 AM, Ingo Molnar wrote: > > * Andy Lutomirski wrote: > >> Now we can do a fun hack on top. On Intel, we have >> sysenter/sysexitl and, on AMD, we have syscall/sysretl. But, if I >> read the docs right, Intel has sysretl, too. So we can ditch >> sysexit entirely, since this mechanism no longer has any need to >> keep the entry and exit conventions matching. > > So this only affects 32-bit vdsos, because on 64-bit both Intel and > AMD have and use SYSCALL/SYSRET. > > So my question would be: what's the performance difference between > INT80 and sysenter entries on 32-bit, on modern CPUs? > > If it's not too horrible (say below 100 cycles) then we could say that > we start out the simplification and robustification by switching Intel > over to INT80 + SYSRET on 32-bit, and once we know the 32-bit SYSRET > and all the other simplifications work fine we implement the > SYSENTER-hack on top of that? int 0x80 is about 250 cycles slower than syscall/sysenter. (I mean, the instruction per se, not the full round-trip). This looks too horrible to ignore :( > Is there any user-space code that relies on being able to execute an > open coded SYSENTER, or are we shielded via the vDSO? Userspace can't use open-coded sysenter. It will return to a different address. Userspace _can_ do this: my_sysenter: push %ecx push %edx push %ebp movl %esp,%ebp sysenter /* end of my_sysenter() */ ... ... ... call my_sysenter but this depends on matching stack layout with one used by vDSO.