From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C3E75C433DF for ; Wed, 5 Aug 2020 08:19:01 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 8BA522177B for ; Wed, 5 Aug 2020 08:19:01 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="AUge8Oxf"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="LNmVdMgP" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8BA522177B Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Type: Content-Transfer-Encoding:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:Message-ID:References:In-Reply-To:Subject:To:From: Date:MIME-Version:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=TtZ5iaxEn/U+Ckf3N6IhKr3ywHeERTcYPNUGkcKh8Xg=; b=AUge8OxfJMrAN1FQYkyAVefyI Zaa0M4XKOQFxE8s2P6scOJVIKfwXh83UIYuojaMYHcMJ06tHCgmzE2FWWp1+qV1OeBUawuUqYQvwW U7m7jjrLV6fW08/Waey6zhofIxhtONwF/Wfzqt8vPmbeVevYkNJK0ksz31TmpspQaxKnSoxvXKelh uW3QulI6jSqAOS5swGLktW05Rfork5qQohsKP83sEYDtJvnlFuSMjchx8sEu+qboEmYJpY66jJt86 S2lCh+pfKmOm7fNIErWrqAX3jdiy7iKYvFg+y2w7VFrpnaIk4qeuilHiTyn0HNuOE8TZ9gSFwx0zF KuRUKT4FA==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1k3EcI-0006NL-PP; Wed, 05 Aug 2020 08:17:42 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1k3EcH-0006Mh-03 for linux-arm-kernel@lists.infradead.org; Wed, 05 Aug 2020 08:17:42 +0000 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EC3CC2177B; Wed, 5 Aug 2020 08:17:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596615460; bh=fBIZ+07voJ5mA4Q+oIks8HZTfxMoCxKnjLdomoswCiE=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LNmVdMgP9dnBzMwE3R2Qt3Z5f0nw/WEl6H+7rATUKvjo/E1KXimkb2ybpGPTgsPxD Km67DSoRx3pcVIGBcAyt2hfnrlYtHzBPze1IPDizc/9JEwfXcmECG/S8194QvEEXTs urbfW+Q/eWUopzJs56IuSARxIxvCHcqpkWBxvuEs= Received: from disco-boy.misterjones.org ([51.254.78.96] helo=www.loen.fr) by disco-boy.misterjones.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1k3EcE-00Ha7e-CN; Wed, 05 Aug 2020 09:17:38 +0100 MIME-Version: 1.0 Date: Wed, 05 Aug 2020 09:17:38 +0100 From: Marc Zyngier To: Jason Liu Subject: Re: [PATCH 1/1] arm64: kexec: no need to do irq_chip->irq_mask if it already masked In-Reply-To: References: <20200804085657.10776-1-jason.hui.liu@nxp.com> <20200804113850.GB15199@bogus> User-Agent: Roundcube Webmail/1.4.5 Message-ID: <3c63ae0cc3a7b5bad5d4638a9870340e@kernel.org> X-Sender: maz@kernel.org X-SA-Exim-Connect-IP: 51.254.78.96 X-SA-Exim-Rcpt-To: jason.hui.liu@nxp.com, sudeep.holla@arm.com, catalin.marinas@arm.com, will@kernel.org, sashal@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200805_041741_193442_4AC72F2A X-CRM114-Status: GOOD ( 35.43 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: sashal@kernel.org, catalin.marinas@arm.com, linux-kernel@vger.kernel.org, Sudeep Holla , will@kernel.org, linux-arm-kernel@lists.infradead.org Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 2020-08-05 07:31, Jason Liu wrote: >> -----Original Message----- >> From: Sudeep Holla >> Sent: Tuesday, August 4, 2020 7:39 PM >> To: Marc Zyngier >> Cc: Jason Liu ; catalin.marinas@arm.com; >> will@kernel.org; linux-kernel@vger.kernel.org; Sudeep Holla >> ; linux-arm-kernel@lists.infradead.org >> Subject: Re: [PATCH 1/1] arm64: kexec: no need to do >> irq_chip->irq_mask if it >> already masked >> >> On Tue, Aug 04, 2020 at 11:58:47AM +0100, Marc Zyngier wrote: >> > On 2020-08-04 09:56, Jason Liu wrote: >> > > No need to do the irq_chip->irq_mask() if it already masked. >> > > BTW, unconditionally do the irq_chip->irq_mask() will also bring >> > > issues when the irq_chip in the runtime PM suspend. Accessing >> > > registers of the irq_chip will bring in the exceptions. For example on the >> i.MX: >> > > >> > > root@imx8qmmek:~# echo c > /proc/sysrq-trigger [ 177.796182] sysrq: >> > > Trigger a crash [ 177.799596] Kernel panic - not syncing: sysrq >> > > triggered crash [ 177.875616] SMP: stopping secondary CPUs [ >> > > 177.891936] Internal error: synchronous external abort: 96000210 >> > > [#1] PREEMPT SMP [ 177.899429] Modules linked in: crct10dif_ce >> > > mxc_jpeg_encdec [ 177.905018] CPU: 1 PID: 944 Comm: sh Kdump: >> > > loaded Not tainted [ 177.913457] Hardware name: Freescale i.MX8QM >> > > MEK (DT) [ 177.918517] pstate: a0000085 (NzCv daIf -PAN -UAO) [ >> > > 177.923318] pc : imx_irqsteer_irq_mask+0x50/0x80 [ 177.927944] lr : >> > > imx_irqsteer_irq_mask+0x38/0x80 [ 177.932561] sp : ffff800011fe3a50 >> > > [ 177.935880] x29: ffff800011fe3a50 x28: ffff0008f7708e00 [ >> > > 177.941196] x27: 0000000000000000 x26: 0000000000000000 [ >> > > 177.946513] x25: ffff800011a30c80 x24: 0000000000000000 [ >> > > 177.951830] x23: ffff800011fe3af8 x22: ffff0008f24469d4 [ >> > > 177.957147] x21: ffff0008f2446880 x20: ffff0008f25f5658 [ >> > > 177.962463] x19: ffff800012611004 x18: 0000000000000001 [ >> > > 177.967780] x17: 0000000000000000 x16: 0000000000000000 [ >> > > 177.973097] x15: ffff0008f7709270 x14: 0000000060000085 [ >> > > 177.978414] x13: ffff800010177570 x12: ffff800011fe3ab0 [ >> > > 177.983730] x11: ffff80001017749c x10: 0000000000000040 [ >> > > 177.989047] x9 : ffff8000119f1c80 x8 : ffff8000119f1c78 [ >> > > 177.994364] x7 : ffff0008f46bedf8 x6 : 0000000000000000 [ >> > > 177.999681] x5 : ffff0008f46beda0 x4 : 0000000000000000 [ >> > > 178.004997] x3 : ffff0008f24469d4 x2 : ffff800012611000 [ >> > > 178.010314] x1 : 0000000000000080 x0 : 0000000000000080 [ >> > > 178.015630] Call trace: >> > > [ 178.018077] imx_irqsteer_irq_mask+0x50/0x80 [ 178.022352] >> > > machine_crash_shutdown+0xa8/0x100 [ 178.026802] >> > > __crash_kexec+0x6c/0x118 [ 178.030464] panic+0x19c/0x324 [ >> > > 178.033524] sysrq_handle_reboot+0x0/0x20 [ 178.037537] >> > > __handle_sysrq+0x88/0x180 [ 178.041290] >> > > write_sysrq_trigger+0x8c/0xb0 [ 178.045389] >> > > proc_reg_write+0x78/0xb0 [ 178.049055] __vfs_write+0x18/0x40 [ >> > > 178.052461] vfs_write+0xdc/0x1c8 [ 178.055779] >> > > ksys_write+0x68/0xf0 [ 178.059098] __arm64_sys_write+0x18/0x20 [ >> > > 178.063027] el0_svc_common.constprop.0+0x68/0x160 >> > > [ 178.067821] el0_svc_handler+0x20/0x80 [ 178.071573] >> > > el0_svc+0x8/0xc [ 178.074463] Code: 93407e73 91001273 aa0003e1 >> > > 8b130053 (b9400260) [ 178.080567] ---[ end trace 652333f6c6d6b05d >> > > ]--- >> > > >> > > Signed-off-by: Jason Liu >> > > Cc: >> > > Cc: Catalin Marinas >> > > Cc: Will Deacon >> > > Cc: Sasha Levin >> > > --- >> > > arch/arm64/kernel/machine_kexec.c | 2 +- >> > > 1 file changed, 1 insertion(+), 1 deletion(-) >> > > >> > > diff --git a/arch/arm64/kernel/machine_kexec.c >> > > b/arch/arm64/kernel/machine_kexec.c >> > > index a0b144cfaea7..8ab263c733bf 100644 >> > > --- a/arch/arm64/kernel/machine_kexec.c >> > > +++ b/arch/arm64/kernel/machine_kexec.c >> > > @@ -236,7 +236,7 @@ static void machine_kexec_mask_interrupts(void) >> > > chip->irq_eoi) >> > > chip->irq_eoi(&desc->irq_data); >> > > >> > > - if (chip->irq_mask) >> > > + if (chip->irq_mask && !irqd_irq_masked(&desc->irq_data)) >> > > chip->irq_mask(&desc->irq_data); >> > > >> > > if (chip->irq_disable && !irqd_irq_disabled(&desc->irq_data)) >> > >> > This is pretty dodgy. irq_mask() should be an idempotent action >> > (masking twice must not be harmful). >> > >> >> That was my understanding too, but was not totally against adding it >> here. > > Yes, masking twice at least a time of waste and really no need to do > it. If you look at the common API mask_irq > There did avoid the unnecessary twice or multiple mask. Keep in mind > that there are many irqs, so it will > waste time to do the things which is not necessary. So, from this > point, IMO, this patch is fine. Let's be serious. You are doing a *kexec*. Rebooting the entire system. Another 10 or 1000 accesses are completely invisible here. > > void mask_irq(struct irq_desc *desc) > { > if (irqd_irq_masked(&desc->irq_data)) > return; > > if (desc->irq_data.chip->irq_mask) { > desc->irq_data.chip->irq_mask(&desc->irq_data); > irq_state_set_masked(desc); > } > } > >> >> > Even more, it really isn't obvious to me how this can work at all, as >> > even if the interrupt isn't masked, the irqsteer could well be >> > suspended. >> > >> >> Indeed, the runtime PM ops in that driver looks dodgy. Any calls to >> mask_irq >> from drivers or anywhere with irqchip suspended with just blows up the >> system. > > If you look at the chip->irq_mask implementation on different > platforms, almost > all with directly access the register of the irqchip including > irqsteer. There are fine due to > driver will use the common mask_irq API. > >> >> > So as is, this change is just papering over a much deeper issue in >> > your driver. >> > >> >> Thanks for confirming > > No, this patch is not papering over a much deeper issue in the driver. > This is just to make things better for the ARM64 kexec. Yes, I'm sure it is... However: request_irq() if (chip->irq_mask && !irqd_irq_masked(&desc->irq_data)) This is because the PM in the irqsteer driver is completely busted: request_irq() should get a reference on the driver to prevent it from being suspended. Since you don't implement it correctly, this doesn't happen and your "improvement" doesn't help at all. M. -- Jazz is not dead. It just smells funny... _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel