Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp2978434rwl; Tue, 27 Dec 2022 02:31:40 -0800 (PST) X-Google-Smtp-Source: AMrXdXuB+QHmZnZxBVUJJ90h02JVTJeO3IgaoymKI2fO1+xzOaLK1LsUlUTVsTA2IEpqHfejHmqx X-Received: by 2002:a05:6a20:8e1e:b0:b2:637a:2b78 with SMTP id y30-20020a056a208e1e00b000b2637a2b78mr36949183pzj.32.1672137099817; Tue, 27 Dec 2022 02:31:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672137099; cv=none; d=google.com; s=arc-20160816; b=S8ncCpQRcGRThP1yPh3gX8s6pd8UrfL4x/6iKyBXCVW/I1KnO/WUHLI79Yq9NKf6SA UET6dRQpKCv0RAY/RIcu1U6y0/sIPT37Ex+zJmhRtyBX1MdNrR9g6LOTfg6y2OJzmlJq /UXxURlntKK0TYC1IfuRdrbr/TspPcA/2hqEvFJklxjhbkR7sUBtmk06KcoMrtdaqqBH dswIHJRTv0WYRPhzpWaMyzC+kwp31QjFeyxvvLScrG9kN7yNGa/ifYC01U7SAAoBCQpr Gt1swLf24Vco2HsrQ2ZF9Oi0vi0lJo8aQAc9MJKNZX8tEupKrkt6vsc0gPx6HShrCV+O 1MfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=o+f8ECv2fLcQAiPQx/XaNIp6lJLTkuABISguAWaap1I=; b=uHZAQimPnwToIUyaA/St43M524lmkG0e7NeicCBXU7Jnh58Fn8D/CSB5xEZc6k6lmf QMTnaHrF9q92ic8c5IcXu5HSrACuiSFYdPxvdNIRZ6fupUyvQs+b4QKfsji7Prh1Cp3k TSjhU8MBVE0CU/9Sud6XtDN7pbYs0ExDN0wvBjM8xxyPP/2eKIBhvlLVb564rPMrZ+wp YH6zjM8hajWeyofoPMCTWuWekFzd/UPDCEVqRjlSR1P6ET2me+RQQaUXPPJjuD/yx0x7 IFS/dvFdJizohqqYvADWJmo6WwG1f0Eg/XGUHQlYXS9+c+g+CuuTz8S9GHlnxGUW5Gyo G2Zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e13-20020a63370d000000b00476e640ddfesi13922343pga.80.2022.12.27.02.31.30; Tue, 27 Dec 2022 02:31:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229593AbiL0KLI (ORCPT + 67 others); Tue, 27 Dec 2022 05:11:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38698 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229445AbiL0KLG (ORCPT ); Tue, 27 Dec 2022 05:11:06 -0500 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 17A1826E8 for ; Tue, 27 Dec 2022 02:11:00 -0800 (PST) Received: from loongson.cn (unknown [111.9.175.10]) by gateway (Coremail) with SMTP id _____8AxxvCyxKpjpdIIAA--.19166S3; Tue, 27 Dec 2022 18:10:59 +0800 (CST) Received: from [10.136.12.26] (unknown [111.9.175.10]) by localhost.localdomain (Coremail) with SMTP id AQAAf8DxbL6wxKpjXOENAA--.16519S3; Tue, 27 Dec 2022 18:10:58 +0800 (CST) Subject: Re: [PATCH] LoongArch: Fix irq enable in exception handlers To: Huacai Chen , Qi Hu Cc: WANG Xuerui , Tiezhu Yang , loongarch@lists.linux.dev, linux-kernel@vger.kernel.org References: <20221221074238.6699-1-hejinyang@loongson.cn> <8eaea09e-67b0-5e51-4632-2c31a4c56a3e@loongson.cn> From: Jinyang He Message-ID: <1c578efd-ae8a-2d80-e505-a09b1a2f7eaa@loongson.cn> Date: Tue, 27 Dec 2022 18:10:56 +0800 User-Agent: Mozilla/5.0 (X11; Linux loongarch64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-CM-TRANSID: AQAAf8DxbL6wxKpjXOENAA--.16519S3 X-CM-SenderInfo: pkhmx0p1dqwqxorr0wxvrqhubq/ X-Coremail-Antispam: 1Uk129KBjvJXoWxtF4fZF15ArWrGrW8XryDGFg_yoW7tFyDpF ZrCF48GFW8XF1xXanFqw1FvF9Iq3yvqF48ur4vya4fWan0vF98Xr1kXF4UWFyjvryDGr40 qryjya1S9a45JFUanT9S1TB71UUUUUJqnTZGkaVYY2UrUUUUj1kv1TuYvTs0mT0YCTnIWj qI5I8CrVACY4xI64kE6c02F40Ex7xfYxn0WfASr-VFAUDa7-sFnT9fnUUIcSsGvfJTRUUU bfAYFVCjjxCrM7AC8VAFwI0_Jr0_Gr1l1xkIjI8I6I8E6xAIw20EY4v20xvaj40_Wr0E3s 1l1IIY67AEw4v_JrI_Jryl8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xv wVC0I7IYx2IY67AKxVWUCVW8JwA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwA2z4 x0Y4vEx4A2jsIE14v26r4UJVWxJr1l84ACjcxK6I8E87Iv6xkF7I0E14v26r4UJVWxJr1l n4kS14v26r1Y6r17M2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12xvs2x26I8E6x ACxx1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1Y6r17McIj6I8E 87Iv67AKxVWUJVW8JwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IY64vIr41lc7I2V7IY0V AS07AlzVAYIcxG8wCF04k20xvY0x0EwIxGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwCFI7km 07C267AKxVWUAVWUtwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE14v26r106r 1rMI8E67AF67kF1VAFwI0_JF0_Jw1lIxkGc2Ij64vIr41lIxAIcVC0I7IYx2IY67AKxVWU JVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF04k26cxKx2IYs7xG6r 1j6r1xMIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Jr0_GrUv cSsGvfC2KfnxnUUI43ZEXa7IU8fsqJUUUUU== X-Spam-Status: No, score=-3.0 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-12-27 17:52, Huacai Chen wrote: > On Tue, Dec 27, 2022 at 5:30 PM Jinyang He wrote: >> >> On 2022-12-27 15:37, Huacai Chen wrote: >>> Hi, Jinyang, >>> >>> Move die_if_kernel to irq disabled context to solve what? >> For more strict logical. If the code flow go to die in die_if_kernel(), >> its interrupt state is enable, that means it may cause schedule. >> So I think it is better to call die_if_kernel() firstly. > die_if_kernel is called with irq enabled in old kernels for several > years, and has no problems. I think because it never call die() in die_if_kernel(). What I do emphasize is that there needs to be more strict logic here than it worked well in the past. I bet if die_if_kernel() was removed, it will still work well in the future. > >> >>> And LBT is >>> surely allowed to be triggered in kernel context. >> I'm not familar with lbt, I just not see any lbt codes in kernel. Plz, >> how lbt exception triggered, and how kernel trigger lbt exception? > You can ask Huqi for more details, and this was discussed publicly last week. To: Qi Hu Hi, We really need some help. Can you give us some ideas? Thanks, Jinyang > Huacai >> >> Thanks, >> >> Jinyang >> >> >>> Huacai >>> >>> On Wed, Dec 21, 2022 at 3:43 PM Jinyang He wrote: >>>> The interrupt state can be got by regs->csr_prmd. Once previous >>>> interrupt state is disable, we shouldn't enable interrupt if we >>>> triggered exception which can be triggered in kernel mode. So >>>> conditionally enable interrupt. For those do_\exception which >>>> can not triggered in kernel mode but need enable interrupt, call >>>> die_if_kernel() firstly. And for do_lsx, do_lasx and do_lbt cannot >>>> triggered in kernel mode, too. >>>> >>>> Signed-off-by: Jinyang He >>>> --- >>>> arch/loongarch/kernel/traps.c | 19 ++++++++++--------- >>>> 1 file changed, 10 insertions(+), 9 deletions(-) >>>> >>>> diff --git a/arch/loongarch/kernel/traps.c b/arch/loongarch/kernel/traps.c >>>> index 1ea14f6c18d3..3ac7b32d1e15 100644 >>>> --- a/arch/loongarch/kernel/traps.c >>>> +++ b/arch/loongarch/kernel/traps.c >>>> @@ -340,9 +340,9 @@ asmlinkage void noinstr do_fpe(struct pt_regs *regs, unsigned long fcsr) >>>> >>>> /* Clear FCSR.Cause before enabling interrupts */ >>>> write_fcsr(LOONGARCH_FCSR0, fcsr & ~mask_fcsr_x(fcsr)); >>>> - local_irq_enable(); >>>> >>>> die_if_kernel("FP exception in kernel code", regs); >>>> + local_irq_enable(); >>>> >>>> sig = SIGFPE; >>>> fault_addr = (void __user *) regs->csr_era; >>>> @@ -432,7 +432,8 @@ asmlinkage void noinstr do_bp(struct pt_regs *regs) >>>> unsigned long era = exception_era(regs); >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> - local_irq_enable(); >>>> + if (regs->csr_prmd & CSR_PRMD_PIE) >>>> + local_irq_enable(); >>>> current->thread.trap_nr = read_csr_excode(); >>>> if (__get_inst(&opcode, (u32 *)era, user)) >>>> goto out_sigsegv; >>>> @@ -514,7 +515,8 @@ asmlinkage void noinstr do_ri(struct pt_regs *regs) >>>> unsigned int __user *era = (unsigned int __user *)exception_era(regs); >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> - local_irq_enable(); >>>> + if (regs->csr_prmd & CSR_PRMD_PIE) >>>> + local_irq_enable(); >>>> current->thread.trap_nr = read_csr_excode(); >>>> >>>> if (notify_die(DIE_RI, "RI Fault", regs, 0, current->thread.trap_nr, >>>> @@ -606,8 +608,8 @@ asmlinkage void noinstr do_fpu(struct pt_regs *regs) >>>> { >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> - local_irq_enable(); >>>> die_if_kernel("do_fpu invoked from kernel context!", regs); >>>> + local_irq_enable(); >>>> BUG_ON(is_lsx_enabled()); >>>> BUG_ON(is_lasx_enabled()); >>>> >>>> @@ -623,13 +625,13 @@ asmlinkage void noinstr do_lsx(struct pt_regs *regs) >>>> { >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> + die_if_kernel("do_lsx invoked from kernel context!", regs); >>>> local_irq_enable(); >>>> if (!cpu_has_lsx) { >>>> force_sig(SIGILL); >>>> goto out; >>>> } >>>> >>>> - die_if_kernel("do_lsx invoked from kernel context!", regs); >>>> BUG_ON(is_lasx_enabled()); >>>> >>>> preempt_disable(); >>>> @@ -645,14 +647,13 @@ asmlinkage void noinstr do_lasx(struct pt_regs *regs) >>>> { >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> + die_if_kernel("do_lasx invoked from kernel context!", regs); >>>> local_irq_enable(); >>>> if (!cpu_has_lasx) { >>>> force_sig(SIGILL); >>>> goto out; >>>> } >>>> >>>> - die_if_kernel("do_lasx invoked from kernel context!", regs); >>>> - >>>> preempt_disable(); >>>> init_restore_lasx(); >>>> preempt_enable(); >>>> @@ -666,6 +667,7 @@ asmlinkage void noinstr do_lbt(struct pt_regs *regs) >>>> { >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> + die_if_kernel("do_lbt invoked from kernel context!", regs); >>>> local_irq_enable(); >>>> force_sig(SIGILL); >>>> local_irq_disable(); >>>> @@ -677,7 +679,6 @@ asmlinkage void noinstr do_reserved(struct pt_regs *regs) >>>> { >>>> irqentry_state_t state = irqentry_enter(regs); >>>> >>>> - local_irq_enable(); >>>> /* >>>> * Game over - no way to handle this if it ever occurs. Most probably >>>> * caused by a fatal error after another hardware/software error. >>>> @@ -685,8 +686,8 @@ asmlinkage void noinstr do_reserved(struct pt_regs *regs) >>>> pr_err("Caught reserved exception %u on pid:%d [%s] - should not happen\n", >>>> read_csr_excode(), current->pid, current->comm); >>>> die_if_kernel("do_reserved exception", regs); >>>> + local_irq_enable(); >>>> force_sig(SIGUNUSED); >>>> - >>>> local_irq_disable(); >>>> >>>> irqentry_exit(regs, state); >>>> -- >>>> 2.34.3 >>>> >>