[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87ftdb87jf.fsf@linux.ibm.com>
Date: Fri, 10 Apr 2020 14:28:20 -0500
From: Nathan Lynch <nathanl@...ux.ibm.com>
To: Leonardo Bras <leonardo@...ux.ibm.com>
Cc: linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org,
Michael Ellerman <mpe@...erman.id.au>,
Nicholas Piggin <npiggin@...il.com>,
Benjamin Herrenschmidt <benh@...nel.crashing.org>,
Paul Mackerras <paulus@...ba.org>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Thomas Gleixner <tglx@...utronix.de>,
Allison Randal <allison@...utok.net>,
"Gautham R. Shenoy" <ego@...ux.vnet.ibm.com>,
Nadav Amit <namit@...are.com>
Subject: Re: [PATCH 1/1] powerpc/rtas: Implement reentrant rtas call
Leonardo Bras <leonardo@...ux.ibm.com> writes:
> Implement rtas_call_reentrant() for reentrant rtas-calls:
> "ibm,int-on", "ibm,int-off",ibm,get-xive" and "ibm,set-xive".
>
> On LoPAPR Version 1.1 (March 24, 2016), from 7.3.10.1 to 7.3.10.4,
> items 2 and 3 say:
>
> 2 - For the PowerPC External Interrupt option: The * call must be
> reentrant to the number of processors on the platform.
> 3 - For the PowerPC External Interrupt option: The * argument call
> buffer for each simultaneous call must be physically unique.
>
> So, these rtas-calls can be called in a lockless way, if using
> a different buffer for each call.
>From the language in the spec it's clear that these calls are intended
to be reentrant with respect to themselves, but it's less clear to me
that they are safe to call simultaneously with respect to each other or
arbitrary other RTAS methods.
> This can be useful to avoid deadlocks in crashing, where rtas-calls are
> needed, but some other thread crashed holding the rtas.lock.
Are these calls commonly used in the crash-handling path? Is this
addressing a real issue you've seen?
> +/*
> + * Used for reentrant rtas calls.
> + * According to LoPAR documentation, only "ibm,int-on", "ibm,int-off",
> + * "ibm,get-xive" and "ibm,set-xive" are currently reentrant.
> + * Reentrant calls need their own rtas_args buffer, so not using rtas.args.
> + */
Please use kernel-doc format in new code.
> +int rtas_call_reentrant(int token, int nargs, int nret, int *outputs, ...)
> +{
> + va_list list;
> + struct rtas_args rtas_args;
> +
> + if (!rtas.entry || token == RTAS_UNKNOWN_SERVICE)
> + return -1;
> +
> + va_start(list, outputs);
> + va_rtas_call_unlocked(&rtas_args, token, nargs, nret, list);
> + va_end(list);
No, I don't think you can place the RTAS argument buffer on the stack:
7.2.7, Software Implementation Note:
| The OS must be aware that the effective address range for RTAS is 4
| GB when instantiated in 32-bit mode and the OS should not pass RTAS
| addresses or blocks of data which might fall outside of this range.
Powered by blists - more mailing lists