From: Philippe Gerum <rpm@xenomai.org>
To: Jan Kiszka <jan.kiszka@siemens.com>,
Gilles Chanteperdrix <gilles.chanteperdrix@xenomai.org>
Cc: Xenomai <xenomai@xenomai.org>
Subject: Re: [Xenomai] [RFC] Consolidated exception prologue/epiloge for x86 and ARM
Date: Tue, 03 Mar 2015 09:31:49 +0100 [thread overview]
Message-ID: <54F57175.5030606@xenomai.org> (raw)
In-Reply-To: <54F4B750.6070201@siemens.com>
On 03/02/2015 08:17 PM, Jan Kiszka wrote:
> On 2015-03-02 19:53, Philippe Gerum wrote:
>> On 03/02/2015 06:39 PM, Jan Kiszka wrote:
>>> On 2015-02-27 22:24, Gilles Chanteperdrix wrote:
>>>> On Fri, Feb 27, 2015 at 10:21:30PM +0100, Gilles Chanteperdrix wrote:
>>>>> On Fri, Feb 27, 2015 at 09:37:45PM +0100, Jan Kiszka wrote:
>>>>>> On 2015-02-27 21:27, Gilles Chanteperdrix wrote:
>>>>>>> On Fri, Feb 27, 2015 at 09:12:14PM +0100, Jan Kiszka wrote:
>>>>>>>> Hi,
>>>>>>>>
>>>>>>>> just pushed a first implementation of the general model that I proposed
>>>>>>>> for exception handling. You can find it at
>>>>>>>>
>>>>>>>> http://git.xenomai.org/ipipe-jki.git/log/?h=queues/trap-rework
>>>>>>>
>>>>>>> Also, the clean way to pass virtual + physical flags is to use
>>>>>>> arch_mangle_bits. Using two longs (potentially 128 bits then) is
>>>>>>> completely useless since one of the longs simply has one significant
>>>>>>> bit.
>>>>>>
>>>>>> The costs of mangling is higher than using two regs for passing that
>>>>>> data as-is, both binary and LOC-wise (tried it). Plus the code is more
>>>>>> readable.
>>>>>
>>>>> That is false on ARM. On ARM gcc does not pass structs by values in
>>>>> registers. The values get passed on stack.
>>>>
>>>> Sorry, misread the assembler. They are passed by registers, however
>>>> the registers get uselessly saved on stack, then restored to other
>>>> registers.
>>>>
>>>> struct foo {
>>>> int x;
>>>> int y;
>>>> };
>>>>
>>>> int f(struct foo f)
>>>> {
>>>> return f.x + f.y;
>>>> }
>>>>
>>>> Gives, with -Os:
>>>> 00000000 <f>:
>>>> 0: b082 sub sp, #8
>>>> 2: ab02 add r3, sp, #8
>>>> 4: e903 0003 stmdb r3, {r0, r1}
>>>> 8: e89d 0009 ldmia.w sp, {r0, r3}
>>>> c: 4418 add r0, r3
>>>> e: b002 add sp, #8
>>>> 10: 4770 bx lr
>>>>
>>>
>>> Ouch. I missed that this sneaked in.
>>>
>>> The complications with the existing mangle functions are that they do
>>> not play well with what I need for the existing
>>> ipipe_restore_root_nosync. I can open-code the latter (size increases),
>>
>> Unless this is part of a heavily used static inline, this increase
>> should be negligible.
>>
>>> extend the former to alternatively return architectural flags (instead
>>> of boolean), or provide another wrapper to convert the virt bit into flags.
>>>
>>> Hmm, or - and that's probably cleanest - I simply align
>>> ipipe_restore_root_nosync to ipipe_restore_root argument-wise. The
>>> latter takes "x" (stall) as boolean, the former as architectural flags.
>>> That's highly confusing anyway. And it seems there are no users to break
>>> in Xenomai, despite that it is exported to modules.
>>>
>>
>> It is exported because it was called from some static inline helper
>> which was part of an obsolete interface, not because client code should
>> use it.
>>
>> The cleanest approach is not to use ipipe_restore_root_nosync() at all.
>> There are only a very few occasions when no syncing the interrupt log
>> ever makes sense, and all are now open-coded to make it clear that we
>> are doing something very unusual.
>
> Hmm, I still seeing it called by both x86 and ARM.
>
Yes, but it is wrong. The issue with the interrupt log not being synced
for the root domain prior to returning from a trap.
>>
>> ipipe_restore_root_nosync() is confusing enough that people tend to use
>> it the wrong way, introducing nasty bugs, so I definitely plan to get
>> rid of it.
>
> Indeed.
>
> I'm currently re-analyzing x86 in this regard. It is called there after
> every exception - but what if Linux didn't enable IRQs while handling
> the exception and, thus, didn't flush the log. We could have some
> interrupts pending, no?
For the bug to bite, hardware interrupts must be re-enabled when the
root domain is stalled by the ipipe preparation code to fault handling.
In this case, using _nosync to restore the root state is broken, 100%.
On the other hand, if the root domain was stalled as a result of a
kernel code taking a trap while running inside a (virtually) masked
section, the unstall operation will/must happen when execution is back
to that code at some point anyway, flushing the pending IRQs. Userland
over the root domain is in essence not a problem, since this domain
won't be stalled in this case.
>
> The alternative - already lived in ARM's ipipe_fault_exit today - is
> taking Linux interrupts at that point. If that is always OK is another
> question...
>
ARM has to follow the same pattern than any other architecture with
respect to this. We should never enable hw interrupts when handling a
trap unless, alternatively:
- the root domain is currently unstalled
- the interrupt log gets flushed when unstalling the root domain we
stalled in the preparation code (i.e. no _nosync).
- the regular linux trap handling codes wants it and therefore unstalls
the root domain in the same move (e.g. local_irq_enable() <- do_page_fault).
Now, as we all mentioned a couple of times already, whether this is
legit to re-enable linux IRQs (virtually) from within the ipipe
preparation code to fault handling essentially depends on the assembly
trampoline code doing the early trap handling. This must be a
per-architecture decision, so a common fault handling pattern should not
assume anything regarding this aspect.
--
Philippe.
prev parent reply other threads:[~2015-03-03 8:31 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-02-27 20:12 [Xenomai] [RFC] Consolidated exception prologue/epiloge for x86 and ARM Jan Kiszka
2015-02-27 20:24 ` Gilles Chanteperdrix
2015-02-27 20:37 ` Jan Kiszka
2015-02-27 20:39 ` Gilles Chanteperdrix
2015-02-27 20:47 ` Jan Kiszka
2015-02-27 20:50 ` Gilles Chanteperdrix
2015-03-02 17:40 ` Jan Kiszka
2015-03-02 17:42 ` Gilles Chanteperdrix
2015-02-27 20:27 ` Gilles Chanteperdrix
2015-02-27 20:37 ` Jan Kiszka
2015-02-27 21:21 ` Gilles Chanteperdrix
2015-02-27 21:24 ` Gilles Chanteperdrix
2015-03-02 17:39 ` Jan Kiszka
2015-03-02 17:41 ` Gilles Chanteperdrix
2015-03-02 17:45 ` Jan Kiszka
2015-03-02 17:47 ` Gilles Chanteperdrix
2015-03-02 17:49 ` Jan Kiszka
2015-03-02 17:53 ` Gilles Chanteperdrix
2015-03-02 18:53 ` Philippe Gerum
2015-03-02 19:17 ` Jan Kiszka
2015-03-02 20:31 ` Jan Kiszka
2015-03-03 14:26 ` Philippe Gerum
2015-03-03 14:34 ` Philippe Gerum
2015-03-03 8:31 ` Philippe Gerum [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=54F57175.5030606@xenomai.org \
--to=rpm@xenomai.org \
--cc=gilles.chanteperdrix@xenomai.org \
--cc=jan.kiszka@siemens.com \
--cc=xenomai@xenomai.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.