On Wed, Mar 18, 2015 at 02:20:21PM +0000, Daniel Thompson wrote: > This patchset provides a pseudo-NMI for arm64 kernels by reimplementing > the irqflags macros to modify the GIC PMR (the priority mask register is > accessible as a system register on GICv3 and later) rather than the > PSR. The pseudo-NMI changes are support by a prototype implementation of > arch_trigger_all_cpu_backtrace that allows the new code to be exercised.
Hi there, Interesting series -- I've not gone into all the code in detail yet, but I have some high-level comments and questions first. > > In addition to the arm64 changes I've bundled in a few patches from > other patchsets to make the patchset self-contained. Of particular note > of the serial break emulation patch which allows ^B^R^K to be used > instead of a serial break to trigger SysRq-L (FVP UART sockets don't > seem to support serial breaks). This makes it easy to run > arch_trigger_all_cpu_backtrace from an IRQ handler (i.e. somewhere with > interrupts masked so we are forced to preempt and take the NMI). > > The code works-for-me (tm) but there are currently some pretty serious > limitations. > > 1. Exercised only on the foundation model with gicv3 support. It has > not been exercised on real silicon or even on the more advanced > ARM models. > > 2. It has been written without any documentation describing GICv3 > architecture (which has not yet been released by ARM). I've been > guessing about the behaviour based on the ARMv8 and GICv2 > architecture specs. The code works on the foundation model but > I cannot check that it conforms architecturally. Review is the best way to approact that for now. If the code can be demonstrated on the model, that's a good start. > 3. Requires GICv3+ hardware together with firmware support to enable > GICv3 features at EL3. If CONFIG_USE_ICC_SYSREGS_FOR_IRQFLAGS is > enabled the kernel will not boot on older hardware. It will be hard > to diagnose because we will crash very early in the boot (i.e. > before the call to start_kernel). Auto-detection might be possible > but the performance and code size cost of adding conditional code to > the irqflags macros probably makes it impractical. As such it may > never be possible to remove this limitation (although it might be > possible to find a way to survive long enough to panic and show the > results on the console). This can (and should) be done via patching -- otherwise we risk breaking single kernel image for GICv2+v3. > 4. No benchmarking (see #1 above). Unlike the PSR, updates to the PMR > do not self synchronize which requires me to sprinkle isb > instructions fairly liberally. I've been told the cost of isb varies > from almost-free (A53) to somewhat costly (A57) thus we export this > code to reduce kernel performance. However this needs to be > quantified and I am currently unable to do this. I'd really like to > but don't have any suitable hardware. > > 5. There is no code in el1_irq to detect NMI and switch from IRQ to NMI > handling. This means all the irq handling machinary is re-entered in > order to handle the NMI. This not safe and deadlocks are likely. > This is a severe limitation although, in this proof-of-concept > work, NMI can only be triggered by SysRq-L or severe kernel damage. > This means we just about get away with it for simple test (lockdep > detects that we are doing wrong and shows a backtrace). This is > definitely the first thing that needs to be tackled to take this > code further. Indeed, and this does look a bit weird at present... it took me a while to figure out where NMIs could possibly be coming from in this series. > Note also that alternative approaches to implementing a pseudo-NMI on > arm64 are possible but only through runtime cooperation with other > software components in the system, potentially both those running at EL3 > and at secure EL1. I should like to explore these options in future but, For the KVM case, vFIQ is an obvious choice, but you're correct that all other scenarios would require cooperation from a separate hypervisor/ firmware etc. Ideally, we should avoid having multiple ways of implementing the same thing. > as far as I know, this is the only sane way to provide NMI-like features > whilst being implementable entirely in non-secure EL1[1] > > [1] Except for a single register write to ICC_SRE_EL3 by the EL3 > firmware (and already implemented by ARM trusted firmware). Even that would require more of the memory-mapped GIC CPU interface to be NS-accessible than is likely to be the case on product platforms. Note also that the memory-mapped interface is not mandated for GICv3, so some platforms may simply not have it. Some other generalities that don't seem to be addressed yet: * How are NMIs prioritised with respect to other interrupts and exceptions? This needs to be concretely specified. A sensible answer would probably be that the effect is to split the existing single-priority IRQ into two bands: ordinary IRQs and NMIs. Prioritisation against FIQ and other exceptions would be unaffected. I think this is effectively what you've implemented so far. * Should it be possible to map SPIs as NMIs? How would they be configured/registed? Should it be possible to register multiple interrupts as NMIs? * What about interrupt affinity? Some other points: * I feel uneasy about using reserved SPSR fields to store information. This is probably OK for now, but it might be cleaner simply to save/restore the PMR directly. Providing that the affected bit is cleared before writing to the SPSR (as you do already in kernel_exit) looks workable, but wonder whether the choice of bit should be UAPI -- it may have to change in the future. * You can probably thin out the ISBs. I believe that the via the system register interface, the GICC PMR is intended to be self-synchronising. * The value BPR resets to is implementation-dependent. It should be initialised on each CPU if we are going to rely on its value, on all platforms. This isn't specific to FVP. * Is ICC_CTLR_EL1.CBPR set correctly? Cheers ---Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/