Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1390229pxa; Thu, 13 Aug 2020 07:39:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwP4ke4dBfZLxc5b0dTePk52r6V1Gk3cfxrunmPCPgJ0hRmddJcT/2mU8Ia+cDuX4Zj8xPO X-Received: by 2002:a17:906:a3d5:: with SMTP id ca21mr4969163ejb.453.1597329587929; Thu, 13 Aug 2020 07:39:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597329587; cv=none; d=google.com; s=arc-20160816; b=LHCARATrgew7NlPXFI8TTASlApbxmFPswYQTQCXIvr/cSOLqADvqDyosBFllSinnjD Wsbho2L6h6F7GfoQrtQ74B1YUlmYplPbjaQ0+XoPLM1ncZLK+23FRjZ2rTrTtrkp24UF i65shvYGU3ZMNEhlRu3M0dy5xr9hIHrXPuxWWh7CyWiX978rn7i6C1H/opqYvpDKAmz4 Ff6jVk3jHUljyTa6ID0h5skSy4VIwMUKEE/CqUYo30D6X6oAI0VKe55hR/sQI1/VXnjW VvJ4kkiEi0AsxWXyOcN0uMlv4ihROmNPO7J2nvY1IdVrf/qcI2zmSpNtufgflVAaJ1pa aaPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=y6e/nI0YX/Z0FZJ6qvQEpeo95aT0kvFqQguxS7NKbAA=; b=aVCtZjDUCevD5cFQOdY1bUgtvaFKkoGkUEe4Mal4CxZdpdCjjhYDXBcFMxI6XfvDzC 1Gc/NrIxZghLUIQHf4QoXhCcwiwrkuUT6f2p+UqUPgsMBN3VGnDufqpelJZlaMSSVNBf njZDA969Kh9xgMOrwM9d8rN8x1OjpkDoYYsKnibkogjLKSPkAEh4JnRFlUn6MS3QEFPp m+IaABS8bN4+kDwZT6dKDYbS+cMH3E1iV2iu2+xnJuji2c0WGE59aEiUUEFm2BHVOhBQ yrlRpKK1mBHShlpdLegqkJO77KtqpNGOcu7LmPQvHEhZBjKdviQTjKtCjas+9gtOoOn1 pgyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=UiI7Xafr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jr23si3283493ejb.572.2020.08.13.07.39.25; Thu, 13 Aug 2020 07:39:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=UiI7Xafr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726557AbgHMOiO (ORCPT + 99 others); Thu, 13 Aug 2020 10:38:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43750 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726606AbgHMOiM (ORCPT ); Thu, 13 Aug 2020 10:38:12 -0400 Received: from mail-vs1-xe43.google.com (mail-vs1-xe43.google.com [IPv6:2607:f8b0:4864:20::e43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 03AEFC061383 for ; Thu, 13 Aug 2020 07:38:12 -0700 (PDT) Received: by mail-vs1-xe43.google.com with SMTP id a1so3016790vsp.4 for ; Thu, 13 Aug 2020 07:38:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=y6e/nI0YX/Z0FZJ6qvQEpeo95aT0kvFqQguxS7NKbAA=; b=UiI7Xafr19bNrPmU8TEItSoYfoynx+8eUIqrC4pf6rjUTAZP5Rv3EWFear/qC7Z4ho 0J+zH1Z0Fqc5BkcXT10PVJwDigdH4q0eUsLvyNuNac3xaDKHKZ6CdkKXHBBgYz2loPGu 9H5gz+nvWgSfpQtiOSxHJM67YIMn+Sm9lb9ak= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=y6e/nI0YX/Z0FZJ6qvQEpeo95aT0kvFqQguxS7NKbAA=; b=Lo89Oeri9Ms+k4Lj1QRJ/edBNfs6PwTGu5dpkphEtcE/YXEirWuoWQwLgrJeU75aXo E/dZRg3i0UlTbwvKCGdPliRi/+px2iydkVol62FGopK40L014kplxwrkkxJ5EB8pXANU NtGbWbnddnC0CbR1coZJ3TWbs/47Uuf/JxFyn+zeaYOnNzvaNUWIUTdnd3zUdo7q2rvi ExB6fzAo+os3DDE820/KdGVZECxrucE2ZTFztPwgkei439bPB6auJGYogiASfANTGvrD l8g0PQWfPF8wd6a34K9F/7/HQAzVeAAQVn4wIoKxIWs8v6xmDssXDJEshms4NopiwiAK ogNQ== X-Gm-Message-State: AOAM531zMCyMjegaGlkQvj4p1ssl+KCkoJSUFnwFuJD7RoBmjY4n8E3J DQQab3Q69b9nMnA54Xux9Er/eicBuEw= X-Received: by 2002:a67:7782:: with SMTP id s124mr3507701vsc.112.1597329490424; Thu, 13 Aug 2020 07:38:10 -0700 (PDT) Received: from mail-ua1-f49.google.com (mail-ua1-f49.google.com. [209.85.222.49]) by smtp.gmail.com with ESMTPSA id p192sm716805vsd.23.2020.08.13.07.38.09 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 13 Aug 2020 07:38:09 -0700 (PDT) Received: by mail-ua1-f49.google.com with SMTP id x17so1704905uao.5 for ; Thu, 13 Aug 2020 07:38:09 -0700 (PDT) X-Received: by 2002:ab0:37d3:: with SMTP id e19mr3486210uav.64.1597329488557; Thu, 13 Aug 2020 07:38:08 -0700 (PDT) MIME-Version: 1.0 References: <1595333413-30052-1-git-send-email-sumit.garg@linaro.org> <1595333413-30052-3-git-send-email-sumit.garg@linaro.org> In-Reply-To: From: Doug Anderson Date: Thu, 13 Aug 2020 07:37:57 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC 2/5] serial: core: Add framework to allow NMI aware serial drivers To: Sumit Garg Cc: Greg Kroah-Hartman , Daniel Thompson , linux-serial@vger.kernel.org, kgdb-bugreport@lists.sourceforge.net, Jiri Slaby , Russell King - ARM Linux , Jason Wessel , LKML , Linux ARM Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Thu, Aug 13, 2020 at 7:19 AM Sumit Garg wrote: > > On Thu, 13 Aug 2020 at 05:29, Doug Anderson wrote: > > > > Hi, > > > > On Tue, Jul 21, 2020 at 5:11 AM Sumit Garg wrote: > > > > > > Add NMI framework APIs in serial core which can be leveraged by serial > > > drivers to have NMI driven serial transfers. These APIs are kept under > > > CONFIG_CONSOLE_POLL as currently kgdb initializing uart in polling mode > > > is the only known user to enable NMI driven serial port. > > > > > > The general idea is to intercept RX characters in NMI context, if those > > > are specific to magic sysrq then allow corresponding handler to run in > > > NMI context. Otherwise defer all other RX and TX operations to IRQ work > > > queue in order to run those in normal interrupt context. > > > > > > Also, since magic sysrq entry APIs will need to be invoked from NMI > > > context, so make those APIs NMI safe via deferring NMI unsafe work to > > > IRQ work queue. > > > > > > Signed-off-by: Sumit Garg > > > --- > > > drivers/tty/serial/serial_core.c | 120 ++++++++++++++++++++++++++++++++++++++- > > > include/linux/serial_core.h | 67 ++++++++++++++++++++++ > > > 2 files changed, 185 insertions(+), 2 deletions(-) > > > > > > diff --git a/drivers/tty/serial/serial_core.c b/drivers/tty/serial/serial_core.c > > > index 57840cf..6342e90 100644 > > > --- a/drivers/tty/serial/serial_core.c > > > +++ b/drivers/tty/serial/serial_core.c > > > @@ -3181,8 +3181,14 @@ static bool uart_try_toggle_sysrq(struct uart_port *port, unsigned int ch) > > > return true; > > > } > > > > > > +#ifdef CONFIG_CONSOLE_POLL > > > + if (in_nmi()) > > > + irq_work_queue(&port->nmi_state.sysrq_toggle_work); > > > + else > > > + schedule_work(&sysrq_enable_work); > > > +#else > > > schedule_work(&sysrq_enable_work); > > > - > > > +#endif > > > > It should be a very high bar to have #ifdefs inside functions. I > > don't think this meets it. Instead maybe something like this > > (untested and maybe slightly wrong syntax, but hopefully makes > > sense?): > > > > Outside the function: > > > > #ifdef CONFIG_CONSOLE_POLL > > #define queue_port_nmi_work(port, work_type) > > irq_work_queue(&port->nmi_state.work_type) > > #else > > #define queue_port_nmi_work(port, work_type) > > #endif > > > > ...and then: > > > > if (IS_ENABLED(CONFIG_CONSOLE_POLL) && in_nmi()) > > queue_port_nmi_work(port, sysrq_toggle_work); > > else > > schedule_work(&sysrq_enable_work); > > > > --- > > > > The whole double-hopping is really quite annoying. I guess > > schedule_work() can't be called from NMI context but can be called > > from IRQ context? So you need to first transition from NMI context to > > IRQ context and then go and schedule the work? Almost feels like we > > should just fix schedule_work() to do this double-hop for you if > > called from NMI context. Seems like you could even re-use the list > > pointers in the work_struct to keep the queue of people who need to be > > scheduled from the next irq_work? Worst case it seems like you could > > add a schedule_work_nmi() that would do all the hoops for you. ...but > > I also know very little about NMI so maybe I'm being naive. > > > > Thanks for this suggestion and yes indeed we could make > schedule_work() NMI safe and in turn get rid of all this #ifdefs. Have > a look at below changes: > > diff --git a/include/linux/workqueue.h b/include/linux/workqueue.h > index 26de0ca..1daf1b4 100644 > --- a/include/linux/workqueue.h > +++ b/include/linux/workqueue.h > @@ -14,6 +14,7 @@ > #include > #include > #include > +#include > > struct workqueue_struct; > > @@ -106,6 +107,7 @@ struct work_struct { > #ifdef CONFIG_LOCKDEP > struct lockdep_map lockdep_map; > #endif > + struct irq_work iw; Hrm, I was thinking you could just have a single queue per CPU then you don't need to add all this extra data to every single "struct work_struct". I was thinking you could use the existing list node in the "struct work_struct" to keep track of the list of things. ...but maybe my idea this isn't actually valid because the linked list might be in use if we're scheduling work that's already pending / running? In any case, I worry that people won't be happy with the extra overhead per "struct work_struct". Can we reduce it at all? It still does feel like you could get by with a single global queue and thus you wouldn't need to store the function pointer and flags with every "struct work_struct", right? So all you'd need is a single pointer for the linked list? I haven't actually tried implementing this, though, so I could certainly be wrong. -Doug