Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp297167pxa; Fri, 14 Aug 2020 04:42:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzr1SH1pA1xjWme13yibEZLnZVijUL2jFsEX3JcoDQWgNBfgs8e/tG8Id0BBxZzLKoHGPYy X-Received: by 2002:a05:6402:3193:: with SMTP id di19mr1856279edb.224.1597405341061; Fri, 14 Aug 2020 04:42:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597405341; cv=none; d=google.com; s=arc-20160816; b=ZgHjjlsVntgXJsRuxlcCna/ubESJKcyWYLU0ubVSYTJ+ldnCbgrqei5qX2xak/+Q9W QryTutMDOJpDto+Ka0sDfnLLkCWzrT/+LuS2uTcGVj2JcXZtxWE+3kD6IdhLSG1zVhSB te3R3IH+KpmspRm2ohAYmfwUjx+GU1Kr/rqzHtT81AtHt9wYBsx6bQb6qBCNM+XEDO3N 4ueZk6kaqWAteG7FQgfnKaNBsTwn2S0LtSh8lWCPjL/aBMk2yTMnNF3E0speH+mQ5Lmk ESHuQQ5NafjCcVGG+LT39JArxKJvTS+bnVY38wgS/Yt4TKtgzotk/dMDOnDLIbrXkQOF YSog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=QBokjrRyuPxSNRuukuJ5elSpQbNeU0sbZvuVGq71ROs=; b=V6tV19A8CI58tb7Npf5umIQ9bVcmHD41/Ny/452oW3f62de0Q8Bl8qj/rVnV/27pFN H/W8Mx0OCacnZls5RVCWuYFnv00a1vmI1CKQRRxSwb5PkCRzAtXanujPltUxgqqKRv5Y JbCevYOWTz6pR0FufDAEZWPdpuCeFU3GgnNAx0RImOKCbdKTqvEcmV9/tuSaNWNCpr9i dzfWVgmumeB7ipbcDUcgqM2W6TPOabNc+B+NWvUAVv0fQ5SmVD65vOP5I7rEU2K4EKot LhRORKewp405wyJ0pVoHf9sNVNczZtQMHqRSS4nntGaQGeWoGCAAqeNU5kH4+jUezxCj /dlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="BVi+wkP/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc15si5031131ejb.658.2020.08.14.04.41.58; Fri, 14 Aug 2020 04:42:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="BVi+wkP/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727063AbgHNLR0 (ORCPT + 99 others); Fri, 14 Aug 2020 07:17:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36232 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727008AbgHNLRZ (ORCPT ); Fri, 14 Aug 2020 07:17:25 -0400 Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com [IPv6:2a00:1450:4864:20::141]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 553DCC061385 for ; Fri, 14 Aug 2020 04:17:25 -0700 (PDT) Received: by mail-lf1-x141.google.com with SMTP id b11so4612429lfe.10 for ; Fri, 14 Aug 2020 04:17:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QBokjrRyuPxSNRuukuJ5elSpQbNeU0sbZvuVGq71ROs=; b=BVi+wkP/aHwJX/9qZTfOp50mf43546GYOOKWZKAKnm7qPuw5JWv3fnZKxx37/NtSEI XEUFQy2ct9Dj5t1Pg7fsg+txAQ2mGMmJu0yCBCf6j/h0ixEPYTm6Kh0Hu5YNwT+HOqPN MkPAdT8v1bDaAEQaikl+N8kQDvmXWVk9gP1X8Ju1oyiC1uoHlDUylfMBnmq6Kh1y/x1I MdAwEKeCwJuvO+U/Be0+vLlWjih8UrJtOqfI5OPJgJzRymp/Ns+kCxYXJ1+ANZYMvwtX aHCmhNOBuo+5r0iVwEdLgNafxhNQhIGWKZnuAzwoqC3Vp3bhKJLtq4JAVZMkNeQFZFiC J+BQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QBokjrRyuPxSNRuukuJ5elSpQbNeU0sbZvuVGq71ROs=; b=b7VzN62najM6wuRovbz3VopKrJ09TFxDVC9F9O470gzcixw5rS4EYE11MKoytmzClm O7tMZ8rSZUb0OI1x6sYx9s05eB9AtwnVuXze/ZFA3E79jmfyjnJtY6xQ4L8Ozr4hV052 5Oj9d1HoCbFbZVrzDkJJGlp1o2FLei7CtobPCdlMe931C3tCPDej8GJ4Tg2zwDhDXpJw xEfd9fSH85x7RiHSbW2rwMfPa9kzIwQKBzao+10jwQyjlxaz0CBI4JqVuNhXvZqMiKcH /zu4sgebqye3KQVWRfZqms0fIXUl84FqZTt+walZkq8bcQYTQXo431hhO4GuftYGchJn HrTw== X-Gm-Message-State: AOAM531kR5QxnQndDRYB5wB1BZTeGNwuTo9Rv3bYFHhnxcuKSL/dCIqB jC5kBwYemWMqDo9iqUmQ9qwQQIjrAe4BmSxoapPA0g== X-Received: by 2002:a19:bcc:: with SMTP id 195mr1009134lfl.160.1597403843391; Fri, 14 Aug 2020 04:17:23 -0700 (PDT) MIME-Version: 1.0 References: <1595333413-30052-1-git-send-email-sumit.garg@linaro.org> <1595333413-30052-3-git-send-email-sumit.garg@linaro.org> In-Reply-To: From: Sumit Garg Date: Fri, 14 Aug 2020 16:47:11 +0530 Message-ID: Subject: Re: [RFC 2/5] serial: core: Add framework to allow NMI aware serial drivers To: Doug Anderson Cc: Greg Kroah-Hartman , Daniel Thompson , linux-serial@vger.kernel.org, kgdb-bugreport@lists.sourceforge.net, Jiri Slaby , Russell King - ARM Linux , Jason Wessel , LKML , Linux ARM Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 13 Aug 2020 at 20:08, Doug Anderson wrote: > > Hi, > > On Thu, Aug 13, 2020 at 7:19 AM Sumit Garg wrote: > > > > On Thu, 13 Aug 2020 at 05:29, Doug Anderson wrote: > > > > > > Hi, > > > > > > On Tue, Jul 21, 2020 at 5:11 AM Sumit Garg wrote: > > > > > > > > Add NMI framework APIs in serial core which can be leveraged by serial > > > > drivers to have NMI driven serial transfers. These APIs are kept under > > > > CONFIG_CONSOLE_POLL as currently kgdb initializing uart in polling mode > > > > is the only known user to enable NMI driven serial port. > > > > > > > > The general idea is to intercept RX characters in NMI context, if those > > > > are specific to magic sysrq then allow corresponding handler to run in > > > > NMI context. Otherwise defer all other RX and TX operations to IRQ work > > > > queue in order to run those in normal interrupt context. > > > > > > > > Also, since magic sysrq entry APIs will need to be invoked from NMI > > > > context, so make those APIs NMI safe via deferring NMI unsafe work to > > > > IRQ work queue. > > > > > > > > Signed-off-by: Sumit Garg > > > > --- > > > > drivers/tty/serial/serial_core.c | 120 ++++++++++++++++++++++++++++++++++++++- > > > > include/linux/serial_core.h | 67 ++++++++++++++++++++++ > > > > 2 files changed, 185 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/drivers/tty/serial/serial_core.c b/drivers/tty/serial/serial_core.c > > > > index 57840cf..6342e90 100644 > > > > --- a/drivers/tty/serial/serial_core.c > > > > +++ b/drivers/tty/serial/serial_core.c > > > > @@ -3181,8 +3181,14 @@ static bool uart_try_toggle_sysrq(struct uart_port *port, unsigned int ch) > > > > return true; > > > > } > > > > > > > > +#ifdef CONFIG_CONSOLE_POLL > > > > + if (in_nmi()) > > > > + irq_work_queue(&port->nmi_state.sysrq_toggle_work); > > > > + else > > > > + schedule_work(&sysrq_enable_work); > > > > +#else > > > > schedule_work(&sysrq_enable_work); > > > > - > > > > +#endif > > > > > > It should be a very high bar to have #ifdefs inside functions. I > > > don't think this meets it. Instead maybe something like this > > > (untested and maybe slightly wrong syntax, but hopefully makes > > > sense?): > > > > > > Outside the function: > > > > > > #ifdef CONFIG_CONSOLE_POLL > > > #define queue_port_nmi_work(port, work_type) > > > irq_work_queue(&port->nmi_state.work_type) > > > #else > > > #define queue_port_nmi_work(port, work_type) > > > #endif > > > > > > ...and then: > > > > > > if (IS_ENABLED(CONFIG_CONSOLE_POLL) && in_nmi()) > > > queue_port_nmi_work(port, sysrq_toggle_work); > > > else > > > schedule_work(&sysrq_enable_work); > > > > > > --- > > > > > > The whole double-hopping is really quite annoying. I guess > > > schedule_work() can't be called from NMI context but can be called > > > from IRQ context? So you need to first transition from NMI context to > > > IRQ context and then go and schedule the work? Almost feels like we > > > should just fix schedule_work() to do this double-hop for you if > > > called from NMI context. Seems like you could even re-use the list > > > pointers in the work_struct to keep the queue of people who need to be > > > scheduled from the next irq_work? Worst case it seems like you could > > > add a schedule_work_nmi() that would do all the hoops for you. ...but > > > I also know very little about NMI so maybe I'm being naive. > > > > > > > Thanks for this suggestion and yes indeed we could make > > schedule_work() NMI safe and in turn get rid of all this #ifdefs. Have > > a look at below changes: > > > > diff --git a/include/linux/workqueue.h b/include/linux/workqueue.h > > index 26de0ca..1daf1b4 100644 > > --- a/include/linux/workqueue.h > > +++ b/include/linux/workqueue.h > > @@ -14,6 +14,7 @@ > > #include > > #include > > #include > > +#include > > > > struct workqueue_struct; > > > > @@ -106,6 +107,7 @@ struct work_struct { > > #ifdef CONFIG_LOCKDEP > > struct lockdep_map lockdep_map; > > #endif > > + struct irq_work iw; > > Hrm, I was thinking you could just have a single queue per CPU then > you don't need to add all this extra data to every single "struct > work_struct". I was thinking you could use the existing list node in > the "struct work_struct" to keep track of the list of things. ...but > maybe my idea this isn't actually valid because the linked list might > be in use if we're scheduling work that's already pending / running? > > In any case, I worry that people won't be happy with the extra > overhead per "struct work_struct". Can we reduce it at all? It still > does feel like you could get by with a single global queue and thus > you wouldn't need to store the function pointer and flags with every > "struct work_struct", right? So all you'd need is a single pointer > for the linked list? I haven't actually tried implementing this, > though, so I could certainly be wrong. Let me try to elaborate here: Here we are dealing with 2 different layers of deferring work, one is irq_work (NMI safe) using "struct irq_work" and other is normal workqueue (NMI unsafe) using "struct work_struct". So when we are in NMI context, the only option is to use irq_work to defer work and need to pass reference to "struct irq_work". Now in following irq_work function: +void queue_work_nmi(struct irq_work *iw) +{ + struct work_struct *work = container_of(iw, struct work_struct, iw); + + queue_work(system_wq, work); +} +EXPORT_SYMBOL(queue_work_nmi); we can't find a reference to "struct work_struct" until there is 1:1 mapping with "struct irq_work". So we require a way to establish this mapping and having "struct irq_work" as part of "struct work_struct" tries to achieve that. If you have any better way to achieve this, I can use that instead. -Sumit > > > -Doug