Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7402462pxb; Thu, 18 Feb 2021 09:09:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJxVT1Mf/vBDhYVH2SzCob6RBMZwOcFCQKW4sHPggMOSgIIc91vvD6PXhzPCg/p0u9jrcdIF X-Received: by 2002:aa7:cb53:: with SMTP id w19mr5058221edt.324.1613668150147; Thu, 18 Feb 2021 09:09:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613668150; cv=none; d=google.com; s=arc-20160816; b=zxXl/gEx1P2S29/eDWafCXZtoruughwqXOhvQ9nHIezGqXCTt04w52zefhqOUvPGgN 57pXCvJ70sgyK53DCv3a7OIVfvWp/+GLjU0HRqDWyZ2vZSaDOTObPdSxRbGnknRCJnUz PlH4PhcQGk5KCPkjTHP2VqXtnLlNHjPptPrfkQccTaNzlQVhMS/TbB4TtVXjalAPQqOB Fs1D2Ip1e2e5SuS3nxhGwugrzrxIksmTh5GEdMEU/9VxDjERjkTLkX68/VTMNRS53LCd 3m6dimtZnXET5E0B4S7vo/1Qz/wUDa9uLvsIo8u5noeJiW64+u3/Rd2kDm29L/iCwsya Wwaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=5oMfcpUh4h3ZKgn+j5E8cpOBjgb+Ro3qqhckdAFkDpg=; b=QwXdAf3HgKbO5c1Fy2kJFL8Hmq6xDsyhxMQhA7GEYdDqa2xn7qrKw8clIn+towbOGL f/mh7eR9qoIw9hf4DqXpUA1z3smtuh0cTfFVKB5swUvu8uDFsP80ZzpYhDxi68U3tiOP D3S2vEVDVDrFLBH5Y2t3lbCqhbLokTfX/gWw10/5if3PYhTIoGOeoOJwOhy7WaBzzXWT scvC2jSNkojF6OTJ+k/aQdZmtdLbORt82YQZmpom5bzKO+KU0N4ZB/S8JbZOW7Dt9pfo 7CK0XvqInES84fY4BiGZvh4j4Coi8rDm7ZCOSxb6geEF/OnR5maMm/0rKtpLBCm/rXV0 XeKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j17si4462594edw.10.2021.02.18.09.08.42; Thu, 18 Feb 2021 09:09:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231821AbhBRRGn (ORCPT + 99 others); Thu, 18 Feb 2021 12:06:43 -0500 Received: from foss.arm.com ([217.140.110.172]:51682 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233751AbhBROW7 (ORCPT ); Thu, 18 Feb 2021 09:22:59 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 28640ED1; Thu, 18 Feb 2021 06:22:12 -0800 (PST) Received: from C02TD0UTHF1T.local (unknown [10.57.48.237]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AE8663F73B; Thu, 18 Feb 2021 06:22:08 -0800 (PST) Date: Thu, 18 Feb 2021 14:22:05 +0000 From: Mark Rutland To: Hector Martin Cc: Arnd Bergmann , Rob Herring , Tony Lindgren , Marc Zyngier , Linus Walleij , linux-kernel@vger.kernel.org, Krzysztof Kozlowski , devicetree@vger.kernel.org, Alexander Graf , Olof Johansson , Mohamed Mediouni , Stan Skowronek , Will Deacon , linux-arm-kernel@lists.infradead.org, Mark Kettenis Subject: Re: [PATCH v2 08/25] arm64: Always keep DAIF.[IF] in sync Message-ID: <20210218142205.GB89209@C02TD0UTHF1T.local> References: <20210215121713.57687-1-marcan@marcan.st> <20210215121713.57687-9-marcan@marcan.st> <20210217122200.GC5556@C02TD0UTHF1T.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 18, 2021 at 09:51:40PM +0900, Hector Martin wrote: > On 17/02/2021 21.22, Mark Rutland wrote: > > > Root irqchip drivers can discriminate between IRQs and FIQs by checking > > > the ISR_EL1 system register. > > > > I think we can remove this note for now. If we go with seperate handlers > > this won't be necessary, and if not this would be better placed on a > > commit adding the FIQ handling capability. > > Indeed, this doesn't make sense any more. Changed for v3. > > > Judging by `git grep -Wi daif -- arch/arm64`, with this patch applied, > > we'll also need fixups in: > > > > * gic_arch_enable_irqs() in arch/arm64/include/asm/arch_gicv3.h > > * save_and_disable_irq() in arch/arm64/include/asm/assembler.h (noted below) > > * local_daif_save_flags() in arch/arm64/include/asm/daifflags.h > > (the fake DAIF should have F set too) > > * __cpu_do_idle_irqprio() in arch/arm64/kernel/process.c > > Good catches. A few of those are irrelevant for M1 but need to be done now > that we're making this change globally, others I just missed from the > beginning. Sure; my general view is that we should aim for consistency, and should ensure that DAIF.F==DAIF.I at all times on all platforms unless we have a strong reason to violate that rule. That generally makes it easier to reason about the code and avoid accidentally breaking M1/non-M1 if/when we refactor masking logic. > There's also an incorrect comment in entry.S: > > /* > * DA_F were cleared at start of handling. If anything is set in > * DAIF, we come back from an NMI, so skip preemption > */ > mrs x0, daif > orr x24, x24, x0 > > Now only DA__ are cleared. This actually pairs with gic_arch_enable_irqs() > and begs the question: in priority masking systems, do we unmask both IRQ > and FIQ (the gic_arch_enable_irqs change), or do we leave FIQ masked (which > instead would need an AND in that part of entry.S so as to not consider FIQ > masked as meaning we're coming back from an NMI)? I think that for consistency we always want to keep IRQ and FIQ in-sync, even when using GIC priorities. So when handling a pseudo-NMI we should unmask DAIF.DA and leave DAIF.IF masked. > And a minor related one: should init_gic_priority_masking() WARN if FIQ is > masked too? This probably goes with the above. I think it should, yes. > Either way, this was nontrivial to make sense of, so I'll make that entry.S > comment clearer while I'm touching it. Sounds good; thanks! > > I think save_and_diable_irq below needs to be updated too, since it > > only sets DAIF.I and leaves DAIF.F as-is. > > Totally missed this one! Fixed for v3. > > > > - * FIQ is never expected, but we mask it when we disable debug exceptions, and > > > - * unmask it at all other times. > > > + * FIQ is never expected on most platforms, but we keep it synchronized > > > + * with the IRQ mask status. On platforms that do not expect FIQ, that vector > > > + * triggers a kernel panic. On platforms that do, the FIQ vector is unified > > > + * with the IRQ vector. > > > */ > > > > Can we please delete this bit, though? Now that we say IRQ and FIQ are > > masked/unmasked together, I don't think the rest is necessary to > > understand the masking logic, and it's one less thing to keep in sync > > with changes to the entry code. > > Gone :) Thanks, Mark.