Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1511930ybv; Thu, 20 Feb 2020 22:09:49 -0800 (PST) X-Google-Smtp-Source: APXvYqw63I9FHbrFwVeTwBC9eLJYEqfdAvmGjMZlsibKhjrLdIpKdwkv6DcljVZo/QmuQWNpkLuc X-Received: by 2002:aca:c514:: with SMTP id v20mr726794oif.62.1582265388873; Thu, 20 Feb 2020 22:09:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582265388; cv=none; d=google.com; s=arc-20160816; b=rxLrcf/gSdm00g89txX99Bu09HLncaWPPQ5nLSsHWF2PSy93PdgUNkTa170Vux4rdV CyczMmgomsil7JgtZADuwYwrUCa7Al+G1rWWxkWifdOqNbzlZYJlB9A05SNNvYub3dFp hgP2rxaAvlDH5BvH/XYUcZ7y6wRS0xZPmLxUlzdYhgT/re1nClv5K5Upx1lTNJe2VL/m uykNC5ARIxuzJrx5TzMqRv90ytXmYjoCophsExzcvtFrxtqvADm1GwpPywEfm8t07tas X8ssYjcMTzgzsU72ualw7J6JplCN330MT1XMKkzrl13BWgt/M3dLsS3KPQDi9AYe+c6E pnHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=+DwU++sw/f/4B9UKmm6rljMvzT1XBNTBLFmYj+swUEY=; b=YR0N8UoDNWq8GRLOnGZzWVjzzd1yoxwzNK2jCtB1jZjFNjDtWrsWD3iJYrlu0IWrVK mUIm2eMzNrJ2PsWj0JTKtJsTz93Wehc0hSVWvOtJzqo9PqLVOrudySK0Mt9zzQcLp7/d +c8Hu/YikoLgrnxW0ZKzhpaeBL2qgR5hy5ugOiJUUOvRz69dvkl+iLsx99LwM7ydtvUK mAcjGcFTHEW8h1Y6kQJhn8qoSVZrAStx4egIFsbffH+HgSkl7QgAHg3/JqxP493UqfV2 XcqEC5R0uP5NR3BDMcWJ0qHiApGspt/1zbRWKpjD8P6hW2gRPbJUtxWNizMU20NceJHm 1Lyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brainfault-org.20150623.gappssmtp.com header.s=20150623 header.b=aUcK9oUn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j25si325789oij.242.2020.02.20.22.09.36; Thu, 20 Feb 2020 22:09:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brainfault-org.20150623.gappssmtp.com header.s=20150623 header.b=aUcK9oUn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726561AbgBUGIi (ORCPT + 99 others); Fri, 21 Feb 2020 01:08:38 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:46889 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725800AbgBUGIi (ORCPT ); Fri, 21 Feb 2020 01:08:38 -0500 Received: by mail-wr1-f65.google.com with SMTP id z7so599434wrl.13 for ; Thu, 20 Feb 2020 22:08:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brainfault-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+DwU++sw/f/4B9UKmm6rljMvzT1XBNTBLFmYj+swUEY=; b=aUcK9oUnzDGT60usz5spz3Oz0Mcvchlr9eMvEhnAgtw8EG62aF7dtl5EkgWeilflBX rC7TePMZcJiysCoxGuVco6D4dPQq80fNY27yXiKfJ3fAXQUD0/5RRT+XyFGKPGKPpB1B F52qZXlZ6xTacT/wncc82kXoiiUbMmJDVC1STWOz02cHjhi8MY/lkvF8okMJW8MPZ7Z4 1/PpsN9J8IiTZ/Qw2maiUTjex6IKMxUqt9DyCxp1n2MtQGSX9GUhvIaCaOhhtJ9NohId pcJJd2J5B6Mf6z/Jb//NzN8p8exseENhYamH9HCKbht8k+4GTiwgIDByBb6RC0iwO59g 1bDw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+DwU++sw/f/4B9UKmm6rljMvzT1XBNTBLFmYj+swUEY=; b=sZ2H9qA9fk0ZO9g7rkHS6MPROrLtH6PnwxeP+x0XHCaKLmkMTGOFR1GU1dRzugO/Ri NzyWjUWRMZeJrp3KFOyyJ8ipofFKlKCeZMHyTiwcAJC++ddW0vVpBwidKoHm1XCKZkXH xY3+sjqryxO/rIEPEYFdw6K+IsERH6YkDq6gE83djjuMtDojgns8KZGI4N8MqQTdd95i 13OF+KmUqqOOoSBCysIjr29Ii7U4AiZdHlyBhcA2atPSZUKRi3DhwPjmxYBVf/KS1sTO elx5HWsLD7Y/2pLgjl3/uMZ9fB96cYoviDiNnuaKqKg/jthqGLG19IKHvaDR3vIGJrhU JKhQ== X-Gm-Message-State: APjAAAUXMD7X/opP4WKgb1CId8m9cdHu6LKsiqtF9+xxf8dSnxartqNg gXuM7idWrclcGTJApZr1EL2gmPwCW5zjS2CnUPOgIg== X-Received: by 2002:a5d:5345:: with SMTP id t5mr49673354wrv.0.1582265314802; Thu, 20 Feb 2020 22:08:34 -0800 (PST) MIME-Version: 1.0 References: <20200221004413.12869-1-atish.patra@wdc.com> <20200221004413.12869-11-atish.patra@wdc.com> In-Reply-To: <20200221004413.12869-11-atish.patra@wdc.com> From: Anup Patel Date: Fri, 21 Feb 2020 11:38:23 +0530 Message-ID: Subject: Re: [PATCH v9 10/12] RISC-V: Add supported for ordered booting method using HSM To: Atish Patra Cc: "linux-kernel@vger.kernel.org List" , Albert Ou , Borislav Petkov , Daniel Lezcano , "Eric W. Biederman" , Geert Uytterhoeven , Greg Kroah-Hartman , Heiko Carstens , Jason Cooper , Kees Cook , linux-riscv , Mao Han , Marc Zyngier , Mike Rapoport , Nick Hu , Palmer Dabbelt , Paul Walmsley , "Rafael J. Wysocki" , Thomas Gleixner , Vincent Chen Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 21, 2020 at 6:14 AM Atish Patra wrote: > > Currently, all harts have to jump Linux in RISC-V. This complicates the > multi-stage boot process as every transient stage also has to ensure all > harts enter to that stage and jump to Linux afterwards. It also obstructs > a clean Kexec implementation. > > SBI HSM extension provides alternate solutions where only a single hart > need to boot and enter Linux. The booting hart can bring up secondary > harts one by one afterwards. > > Add SBI HSM based cpu_ops that implements an ordered booting method in > RISC-V. This change is also backward compatible with older firmware not > implementing HSM extension. If a latest kernel is used with older > firmware, it will continue to use the default spinning booting method. > > Signed-off-by: Atish Patra > --- > arch/riscv/kernel/Makefile | 3 ++ > arch/riscv/kernel/cpu_ops.c | 10 +++- > arch/riscv/kernel/cpu_ops_sbi.c | 81 +++++++++++++++++++++++++++++++++ > arch/riscv/kernel/head.S | 26 +++++++++++ > arch/riscv/kernel/smpboot.c | 2 +- > arch/riscv/kernel/traps.c | 2 +- > 6 files changed, 121 insertions(+), 3 deletions(-) > create mode 100644 arch/riscv/kernel/cpu_ops_sbi.c > > diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile > index f81a6ff88005..a0be34b96846 100644 > --- a/arch/riscv/kernel/Makefile > +++ b/arch/riscv/kernel/Makefile > @@ -44,5 +44,8 @@ obj-$(CONFIG_PERF_EVENTS) += perf_event.o > obj-$(CONFIG_PERF_EVENTS) += perf_callchain.o > obj-$(CONFIG_HAVE_PERF_REGS) += perf_regs.o > obj-$(CONFIG_RISCV_SBI) += sbi.o > +ifeq ($(CONFIG_RISCV_SBI), y) > +obj-$(CONFIG_SMP) += cpu_ops_sbi.o > +endif > > clean: > diff --git a/arch/riscv/kernel/cpu_ops.c b/arch/riscv/kernel/cpu_ops.c > index e950ae5bee9c..afa90f711a2b 100644 > --- a/arch/riscv/kernel/cpu_ops.c > +++ b/arch/riscv/kernel/cpu_ops.c > @@ -18,6 +18,7 @@ const struct cpu_operations *cpu_ops[NR_CPUS] __ro_after_init; > void *__cpu_up_stack_pointer[NR_CPUS]; > void *__cpu_up_task_pointer[NR_CPUS]; > > +extern const struct cpu_operations cpu_ops_sbi; > extern const struct cpu_operations cpu_ops_spinwait; > > void cpu_update_secondary_bootdata(unsigned int cpuid, > @@ -34,5 +35,12 @@ void cpu_update_secondary_bootdata(unsigned int cpuid, > > void __init cpu_set_ops(int cpuid) > { > - cpu_ops[cpuid] = &cpu_ops_spinwait; > +#if IS_ENABLED(CONFIG_RISCV_SBI) > + if (sbi_probe_extension(SBI_EXT_HSM) > 0) { > + if (!cpuid) > + pr_info("SBI v0.2 HSM extension detected\n"); > + cpu_ops[cpuid] = &cpu_ops_sbi; > + } else > +#endif > + cpu_ops[cpuid] = &cpu_ops_spinwait; > } > diff --git a/arch/riscv/kernel/cpu_ops_sbi.c b/arch/riscv/kernel/cpu_ops_sbi.c > new file mode 100644 > index 000000000000..70d02dfe0ab8 > --- /dev/null > +++ b/arch/riscv/kernel/cpu_ops_sbi.c > @@ -0,0 +1,81 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * HSM extension and cpu_ops implementation. > + * > + * Copyright (c) 2020 Western Digital Corporation or its affiliates. > + */ > + > +#include > +#include > +#include > +#include > +#include > + > +extern char secondary_start_sbi[]; > +const struct cpu_operations cpu_ops_sbi; > + > +static int sbi_hsm_hart_start(unsigned long hartid, unsigned long saddr, > + unsigned long priv) > +{ > + struct sbiret ret; > + > + ret = sbi_ecall(SBI_EXT_HSM, SBI_EXT_HSM_HART_START, > + hartid, saddr, priv, 0, 0, 0); > + if (ret.error) > + return sbi_err_map_linux_errno(ret.error); > + else > + return 0; > +} > + > +#ifdef CONFIG_HOTPLUG_CPU > +static int sbi_hsm_hart_stop(void) > +{ > + struct sbiret ret; > + > + ret = sbi_ecall(SBI_EXT_HSM, SBI_EXT_HSM_HART_STOP, 0, 0, 0, 0, 0, 0); > + > + if (ret.error) > + return sbi_err_map_linux_errno(ret.error); > + else > + return 0; > +} > + > +static int sbi_hsm_hart_get_status(unsigned long hartid) > +{ > + struct sbiret ret; > + > + ret = sbi_ecall(SBI_EXT_HSM, SBI_EXT_HSM_HART_STATUS, > + hartid, 0, 0, 0, 0, 0); > + if (ret.error) > + return sbi_err_map_linux_errno(ret.error); > + else > + return ret.value; > +} > +#endif > + > +static int sbi_cpu_start(unsigned int cpuid, struct task_struct *tidle) > +{ > + int rc; > + unsigned long boot_addr = __pa_symbol(secondary_start_sbi); > + int hartid = cpuid_to_hartid_map(cpuid); > + > + cpu_update_secondary_bootdata(cpuid, tidle); > + rc = sbi_hsm_hart_start(hartid, boot_addr, 0); > + > + return rc; > +} > + > +static int sbi_cpu_prepare(unsigned int cpuid) > +{ > + if (!cpu_ops_sbi.cpu_start) { > + pr_err("cpu start method not defined for CPU [%d]\n", cpuid); > + return -ENODEV; > + } > + return 0; > +} > + > +const struct cpu_operations cpu_ops_sbi = { > + .name = "sbi", > + .cpu_prepare = sbi_cpu_prepare, > + .cpu_start = sbi_cpu_start, > +}; > diff --git a/arch/riscv/kernel/head.S b/arch/riscv/kernel/head.S > index b85376d84098..ac5b0e0a02f6 100644 > --- a/arch/riscv/kernel/head.S > +++ b/arch/riscv/kernel/head.S > @@ -99,11 +99,37 @@ relocate: > ret > #endif /* CONFIG_MMU */ > #ifdef CONFIG_SMP > + .global secondary_start_sbi > +secondary_start_sbi: > + /* Mask all interrupts */ > + csrw CSR_IE, zero > + csrw CSR_IP, zero > + > + /* Load the global pointer */ > + .option push > + .option norelax > + la gp, __global_pointer$ > + .option pop > + > + /* > + * Disable FPU to detect illegal usage of > + * floating point in kernel space > + */ > + li t0, SR_FS > + csrc CSR_STATUS, t0 > + > /* Set trap vector to spin forever to help debug */ > la a3, .Lsecondary_park > csrw CSR_TVEC, a3 > > slli a3, a0, LGREG > + la a4, __cpu_up_stack_pointer > + la a5, __cpu_up_task_pointer > + add a4, a3, a4 > + add a5, a3, a5 > + REG_L sp, (a4) > + REG_L tp, (a5) > + > .global secondary_start_common > secondary_start_common: > > diff --git a/arch/riscv/kernel/smpboot.c b/arch/riscv/kernel/smpboot.c > index e89396a2a1af..4e9922790f6e 100644 > --- a/arch/riscv/kernel/smpboot.c > +++ b/arch/riscv/kernel/smpboot.c > @@ -143,7 +143,7 @@ void __init smp_cpus_done(unsigned int max_cpus) > /* > * C entry point for a secondary processor. > */ > -asmlinkage __visible void __init smp_callin(void) > +asmlinkage __visible void smp_callin(void) > { > struct mm_struct *mm = &init_mm; > > diff --git a/arch/riscv/kernel/traps.c b/arch/riscv/kernel/traps.c > index ffb3d94bf0cc..8e13ad45ccaa 100644 > --- a/arch/riscv/kernel/traps.c > +++ b/arch/riscv/kernel/traps.c > @@ -147,7 +147,7 @@ int is_valid_bugaddr(unsigned long pc) > } > #endif /* CONFIG_GENERIC_BUG */ > > -void __init trap_init(void) > +void trap_init(void) > { > /* > * Set sup0 scratch register to 0, indicating to exception vector > -- > 2.25.0 > Looks good to me. Reviewed-by: Anup Patel Regards, Anup