Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3756315imu; Fri, 30 Nov 2018 05:38:24 -0800 (PST) X-Google-Smtp-Source: AFSGD/WOV24trqNsTmodfkUKKVLV3bHzhsur14OBtko/ytXrOG8zdE9+g/zVb7+e60TAS6F2Q4KX X-Received: by 2002:a62:5486:: with SMTP id i128mr5521016pfb.215.1543585104568; Fri, 30 Nov 2018 05:38:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543585104; cv=none; d=google.com; s=arc-20160816; b=jp0iyY3UpPFAfZketZ6HnNMrUqn9NKGzxJkoSuOlV+81JspETAiVQVeddFMMh0/V8X +o/fBciWz8tY/PLz1FUGYBe4cHv+/BUxwMS7jl3/fEmam4BNwRZvPxtrS+Tjpa+EN1lV EACSDXjF8m3W7m6wPna1HJ04EboyQOwJ311jVYWVVS8Cq2hUWJzKdLnMlyvKSWKCkds8 I6TheQTpDCsHpk+f9jbyMDm0WyE1ygoyvgbLDSVSjzmLiTOhmePnpLQhCtdM+qXzwoCS oYfISZUTO0QNH77ctw7BEC2Nc4kpskPROZPaMa4n5PhX3rJjcxhS9nctqhC1MJOHPVGB uJLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=cI2XHIV4e+JjduncGZmulhYpSk/l47kzAbF6F4P48bA=; b=ntZnlHbM4SryyaKFmd9PzEd064smzf0NIClaSRncnNjCh5/s6wgcR5rpLCrzN1UFQ/ 43dQ7yoUL8XrWpC4ru1VBcVXOaoJeSjvmRz6u8GhCGkFegRzxygKJov4LgEYFtxbkvvM cT3jdnCy/NeI0GX7rPQOcEsoHh4FtM/872J/OFzsxVMbV7NlZkwHXwq7F5aAoa9819Bn D13xrasuKMz8JFOWACcthStoTQg+QYBRvVFpzN8vRLfkTBcfVQ9nF/MMmMX9gRX5P6ER uV5tElPl1oeBw0rOIO4b4sqKP761+jZheWlXG7QramTtT+Nq154a7JkhmOtjgb7nQa2b Li/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f63si5027724pgc.473.2018.11.30.05.38.08; Fri, 30 Nov 2018 05:38:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726609AbeLAAqs (ORCPT + 99 others); Fri, 30 Nov 2018 19:46:48 -0500 Received: from foss.arm.com ([217.140.101.70]:57138 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726270AbeLAAqs (ORCPT ); Fri, 30 Nov 2018 19:46:48 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5AE52A78; Fri, 30 Nov 2018 05:37:26 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8D9563F5A0; Fri, 30 Nov 2018 05:37:24 -0800 (PST) Date: Fri, 30 Nov 2018 13:37:19 +0000 From: Mark Rutland To: Julien Thierry Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, daniel.thompson@linaro.org, joel@joelfernandes.org, marc.zyngier@arm.com, christoffer.dall@arm.com, james.morse@arm.com, catalin.marinas@arm.com, will.deacon@arm.com Subject: Re: [PATCH v6 08/24] arm64: Unmask PMR before going idle Message-ID: <20181130133719.zw7wcklqayiebgap@lakrids.cambridge.arm.com> References: <1542023835-21446-1-git-send-email-julien.thierry@arm.com> <1542023835-21446-9-git-send-email-julien.thierry@arm.com> <20181129174436.avqjydyzvv6ubnjd@lakrids.cambridge.arm.com> <9f157e6c-531f-8316-c326-27ff013a489e@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9f157e6c-531f-8316-c326-27ff013a489e@arm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 30, 2018 at 10:55:47AM +0000, Julien Thierry wrote: > On 29/11/18 17:44, Mark Rutland wrote: > > On Mon, Nov 12, 2018 at 11:56:59AM +0000, Julien Thierry wrote: > >> + mov x2, #GIC_PRIO_IRQON > >> + msr_s SYS_ICC_PMR_EL1, x2 // unmask PMR > >> dsb sy // WFI may enter a low-power mode > > > > Is the DSB SY sufficient and necessary to synchronise the update of > > SYS_ICC_PMR_EL1? We don't need an ISB too? > > DSB SY is necessary when we unmask interrupts to make sure that the > redistributor sees the update to PMR before we do WFI. My understanding > is that the resdistributor is free to stop forwarding interrupts to the > CPU interface if from its point of view those interrupts don't have a > high enough priority. > > As for the ISB, I don't think we need one because writes to PMR are > self-synchronizing, so the write to PMR should be seen before DSB SY and > wfi. Having looked at ARM IHI 0069D, 8.1.6 "Observability of the effects of accesses to the GIC registers", I think I agree. My specific concern was that a CPU might complete the DSB before the MSR, but I think it's clear per the GIC spec it's clear that an ISB is not expected between the MSR and DSB, even if that's unusual. > >> wfi > >> + msr_s SYS_ICC_PMR_EL1, x1 // restore PMR > > > > Likewise, we don't need any barriers here before we poke DAIF? > > Here we don't need DSB SY because the value being restored is either: > - GIC_PRIO_IRQON which is the same as the current value, the > redistributor is already aware of it. > - GIC_PRIO_IRQOFF and the self-synchronization of PMR ensures that no > interrupts with priorities lower than the value of PMR can be taken > (this does not require to be seen by the redistributor). > > For the ISB, I have this small doubt about whether it is needed between > WFI and MSR PMR. But there is this bit in the ARM ARM section D12.1.3 > "General behavior of accesses to the AArch64 System registers", > subsection "Synchronization requirements for AArch64 System registers": > > "Direct writes using the instructions in Table D11-2 on page D11-2660 > require synchronization before software can rely on the effects of > changes to the System registers to affect instructions appearing in > program order after the direct write to the System register. Direct > writes to these registers are not allowed to affect any instructions > appearing in program order before the direct write." > > ICC_PMR_EL1 is part of the mentioned table. I think that's a defect in the ARM ARM, given it disagrees with the GIC spec. > And reordering the direct write to PMR before the WFI would definitely > affect the WFI instruction, so my interpretation is that this would > not be allowed by the architecture. So I don't think we need the ISB > either, but my understanding could be wrong. We already assume that a DSB can't be re-ordered w.r.t. the WFI, so as long as the DSB can't complete before the MSR, I think we're good. > > > >> + msr daif, x0 // restore I bit > >> ret > >> ENDPROC(cpu_do_idle) > > > > If we build without CONFIG_ARM64_PSEUDO_NMI surely we don't want to emit > > the alternative? > > > > How about we move this to C, and have something like the below? > > > > For the !CONFIG_ARM64_PSEUDO_NMI case it generates identical assembly to the > > existing cpu_do_idle(). Note that I've assumed we don't need barriers, which > > (as above) I'm not certain of. > > > > Thanks, > > Mark. > > > > ---->8---- > > diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c > > index 7f1628effe6d..ccd2ad8c5e2f 100644 > > --- a/arch/arm64/kernel/process.c > > +++ b/arch/arm64/kernel/process.c > > @@ -73,6 +73,40 @@ EXPORT_SYMBOL_GPL(pm_power_off); > > > > void (*arm_pm_restart)(enum reboot_mode reboot_mode, const char *cmd); > > > > +static inline void __cpu_do_idle(void) > > +{ > > + /* WFI may enter a low-power mode */ > > + dsb(sy); > > + wfi(); > > +} > > + > > +/* > > + * When using priority masking we need to take extra care, etc. > > + */ > > +static inline void __cpu_do_idle_irqprio(void) > > +{ > > + unsigned long flags = arch_local_irq_save(); > > The issue with this is that in patch 10, arch_local_irq_* functions > toggle PMR rather than PSR.I. > > I could use local_daif_mask but I don't think disabling debug and async > is good. Otherwise and can do a small bit of inline assembly and have > something like: Can we factor out the existing arch_local_irq_save() somehow? Thanks, Mark.