Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3599761imu; Fri, 30 Nov 2018 03:05:47 -0800 (PST) X-Google-Smtp-Source: AFSGD/XtJ2B1b+Wy5itXTikSoR25T4797p2WYZJJmNy5lo4OTMkm5VfLdpz0zQeUGAH8CrmwqPQR X-Received: by 2002:a63:554b:: with SMTP id f11mr4589676pgm.37.1543575947131; Fri, 30 Nov 2018 03:05:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543575947; cv=none; d=google.com; s=arc-20160816; b=aUrL8i6GThvkyyg03uAJPcpRZljmdPOYxpJi11vCqc1agtB/wqSkuMYhJA92eg4Nlx 67k8fgz9UiIdEZrQO7VAEktnHIofqciQ5Z9ujOZIFbcic/h4D5kvMyfg7ddUeIZ9jnkx PMi0yjStwg09ZejVA5SL09uuIA/IO99IBPC15CgMt7TAp1lNxs8yfaRhUqho5D0Zbt/H AwCZBFeyIT3FDdbPrRhNBeTzAsYugrKIelLzRClBIDdwprrilWQfyXDOBYuJv5EbFrug UHhY4Icqs1JrMiSp699qVLA6gsyXwOK0jkT2whWPsDZ2fPUWwJH6YZzTCvz3xPamSRDk CYqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=cTY4BoUopD7CHzoClbC6dBfe/PcDJOaeS+mrfDKOdIM=; b=LXiUL42VRJ+gRMW6QOyOt8XJ1jOU1nVxT66Yq3RVFFWyz8iRVA1A0JM3uAa9A6Bcda QIP5EEyHGtnuiW4brGF8x1vLq0xjQdfz51XowvEiiKbyDwmDaOj69Zp5Pfu0gU1NIyeQ QPS4hJztLt3jqqLr287jP+gQMOHD9PzbzGwChZ0uyQ1y/3sCct+WUT/bANmOW+N7cEHI xMgMycjFHpPfKJFixwd/A1kPoQGztYl7ygdU1pPEkV4Y5IMGYJm/we1t3mpyfKqxg1j6 Ept0fmvLPQPdq0yl5hNXAt/wRSdZzLRPmZegtZCpUxetnGjN000to9V7h/9xcpCcKfJy YPig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p187-v6si5189408pfb.127.2018.11.30.03.05.28; Fri, 30 Nov 2018 03:05:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726729AbeK3WM2 (ORCPT + 99 others); Fri, 30 Nov 2018 17:12:28 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:54488 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726473AbeK3WM1 (ORCPT ); Fri, 30 Nov 2018 17:12:27 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B17CA80D; Fri, 30 Nov 2018 03:03:32 -0800 (PST) Received: from [10.1.197.36] (e112298-lin.cambridge.arm.com [10.1.197.36]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C742E3F59C; Fri, 30 Nov 2018 03:03:30 -0800 (PST) Subject: Re: [PATCH v6 06/24] arm64: ptrace: Provide definitions for PMR values To: Daniel Thompson Cc: Mark Rutland , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, joel@joelfernandes.org, marc.zyngier@arm.com, christoffer.dall@arm.com, james.morse@arm.com, catalin.marinas@arm.com, will.deacon@arm.com, Oleg Nesterov References: <1542023835-21446-1-git-send-email-julien.thierry@arm.com> <1542023835-21446-7-git-send-email-julien.thierry@arm.com> <20181129164013.qmmwhbygjkh5lwx5@lakrids.cambridge.arm.com> <79145359-3594-3dac-1123-cec552c2b13e@arm.com> <20181130103811.lushdja552xevghm@holly.lan> From: Julien Thierry Message-ID: <01c117c9-2236-6cb6-d555-09298ef5dfd2@arm.com> Date: Fri, 30 Nov 2018 11:03:29 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20181130103811.lushdja552xevghm@holly.lan> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30/11/18 10:38, Daniel Thompson wrote: > On Fri, Nov 30, 2018 at 08:53:47AM +0000, Julien Thierry wrote: >> >> >> On 29/11/18 16:40, Mark Rutland wrote: >>> On Mon, Nov 12, 2018 at 11:56:57AM +0000, Julien Thierry wrote: >>>> Introduce fixed values for PMR that are going to be used to mask and >>>> unmask interrupts by priority. These values are chosent in such a way >>> >>> Nit: s/chosent/chosen/ >>> >>>> that a single bit (GIC_PMR_UNMASKED_BIT) encodes the information whether >>>> interrupts are masked or not. >>> >>> There's no GIC_PMR_UNMASKED_BIT in this patch. Should that be >>> GIC_PRIO_STATUS_BIT? >>> >> >> Yep, forgot to update the commit message when renaming, thanks. >> >>>> Signed-off-by: Julien Thierry >>>> Suggested-by: Daniel Thompson >>>> Cc: Oleg Nesterov >>>> Cc: Catalin Marinas >>>> Cc: Will Deacon >>>> --- >>>> arch/arm64/include/asm/ptrace.h | 6 ++++++ >>>> 1 file changed, 6 insertions(+) >>>> >>>> diff --git a/arch/arm64/include/asm/ptrace.h b/arch/arm64/include/asm/ptrace.h >>>> index fce22c4..ce6998c 100644 >>>> --- a/arch/arm64/include/asm/ptrace.h >>>> +++ b/arch/arm64/include/asm/ptrace.h >>>> @@ -25,6 +25,12 @@ >>>> #define CurrentEL_EL1 (1 << 2) >>>> #define CurrentEL_EL2 (2 << 2) >>>> >>>> +/* PMR values used to mask/unmask interrupts */ >>>> +#define GIC_PRIO_IRQON 0xf0 >>>> +#define GIC_PRIO_STATUS_SHIFT 6 >>>> +#define GIC_PRIO_STATUS_BIT (1 << GIC_PRIO_STATUS_SHIFT) >>>> +#define GIC_PRIO_IRQOFF (GIC_PRIO_IRQON ^ GIC_PRIO_STATUS_BIT) >>> >>> Could you elaborate on the GIC priority logic a bit? >>> >> >> Yes, I'll give details below. >> >>> Are lower numbers higher priority? >>> >> >> Yes, that is the case. >> >>> Are there restrictions on valid PMR values? >>> >> >> Yes, there are at most 8 priority bits but implementations are free to >> implement a number of priority bits: >> - between 5 and 8 when GIC runs two security states (bits [7:3] always >> being implemented and [2:0] being optional), but non-secure side is >> always deprived or the lowest implemented bit >> - between 4 and 8 when GIC runs only one security state (bits [7:4] >> implemented, bits [3:0] optional) >> >> This is detailed in section 4.8 "Interrupt prioritization" of the GICv3 >> architecture specification. >> >> So Linux should always be able to see bits [7:4]. >> >>> IIUC GIC_PRIO_IRQOFF is 0xb0 (aka 0b10110000), which seems a little >>> surprising. I'd have expected that we'd use the most signficant bit. >>> >> >> So, re-reading the GICv3 spec, I believe this sparked from a confusion... >> >> The idea was that the GICv3 specification would recommend to keep >> non-secure group-1 interrupts at a lower priority that group-0 (and >> secure group-1 interrupts) interrupts, and to do so the idea was to >> always keep bit[7] == 1 for non-secure group-1. >> >> So, we would need to have priority bit[7] == 1 for both normal >> interrupts and pseudo-NMIs, and using the most significant bit to mask >> would mean masking pseudo-NMIs as well. >> >> However, I only find mention of this in the notes of section 4.8.6 >> "Software accesses of interrupt priority". The section only applies to >> GIC with two security states, and the recommendation of writing >> non-secure group-1 priorities with bit[7] == 1 is only directed at >> writes from the secure side. From the non-secure side, the GIC already >> does some magic to enforce that the value kept in the distributor has >> bit[7] == 1. >> >> So, I believe that from the non-secure point of view, we could define >> pseudo-NMI priority as e.g. 0x40 (which the GIC will convert to 0xa0) >> and use the most significant bit of PMR to mask normal interrupts which >> would be more intuitive. >> >> Marc, as GIC expert do you agree with this? Or is there a reason we >> should keep bit[7] == 1 for non-secure group-1 priorities? > > I think selecting bit 6 dates back to when I was working on this. > > I originally used bit 7 but switched due to problems on the FVP at the > time (my memory is a little hazy here but it felt like it wasn't > doing the magic shift properly when running in non-secure mode). > If you were using boot-wrapper, that might have been the case as SCR_EL3.FIQ is not getting set. The fun bit is that under this configuration the magic bit still happens for non-secure accesses to priorities configured in the distributor/redistributor, but it disables the magic for non-secure PMR and RPR accesses. So you can easily end up masking too much stuff when writting to PMR when SCR_EL1.FIQ is cleared if you don't realize that what non-secure sees in the distributor is not aligned with what will be masked by PMR or presented in RPR. > Once the patchset was running on real hardware I kept on with bit 6 > figuring that, given the magic shift from non-secure mode is a little > odd, it would remain furtile soil for future silicon bugs (I was > watching a lot of patches go past on the ML working round bugs in > non-Arm GIC implementations and ended up feeling rather paranoid > about things like that). > > > Daniel. > -- Julien Thierry