[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <874klqac40.fsf@nanos.tec.linutronix.de>
Date: Sun, 15 Nov 2020 16:11:43 +0100
From: Thomas Gleixner <tglx@...utronix.de>
To: "Eric W. Biederman" <ebiederm@...ssion.com>,
Bjorn Helgaas <helgaas@...nel.org>
Cc: linux-pci@...r.kernel.org, kernelfans@...il.com,
andi@...stfloor.org, hpa@...or.com, bhe@...hat.com, x86@...nel.org,
okaya@...nel.org, mingo@...hat.com, jay.vosburgh@...onical.com,
dyoung@...hat.com, gavin.guo@...onical.com,
"Guilherme G. Piccoli" <gpiccoli@...onical.com>, bp@...en8.de,
bhelgaas@...gle.com, shan.gavin@...ux.alibaba.com,
"Rafael J. Wysocki" <rjw@...ysocki.net>, kernel@...ccoli.net,
kexec@...ts.infradead.org, linux-kernel@...r.kernel.org,
ddstreet@...onical.com, lukas@...ner.de, vgoyal@...hat.com
Subject: Re: [PATCH 1/3] x86/quirks: Scan all busses for early PCI quirks
On Sun, Nov 15 2020 at 08:29, Eric W. Biederman wrote:
> ebiederm@...ssion.com (Eric W. Biederman) writes:
> For ordinary irqs you can have this with level triggered irqs
> and the kernel has code that will shutdown the irq at the ioapic
> level. Then the kernel continues by polling the irq source.
>
> I am still missing details but my first question is can our general
> solution to screaming level triggered irqs apply?
No.
> How can edge triggered MSI irqs be screaming?
>
> Is there something we can do in enabling the APICs or IOAPICs that
> would allow this to be handled better. My memory when we enable
> the APICs and IOAPICs we completely clear the APIC entries and so
> should be disabling sources.
Yes, but MSI has nothing to do with APIC/IOAPIC
> Is the problem perhaps that we wind up using an APIC entry that was
> previously used for the MSI interrupt as something else when we
> reprogram them? Even with this why doesn't the generic code
> to stop screaming irqs apply here?
Again. No. The problem cannot be solved at the APIC level. The APIC is
the receiving end of MSI and has absolutely no control over it.
An MSI interrupt is a (DMA) write to the local APIC base address
0xfeexxxxx which has the target CPU and control bits encoded in the
lower bits. The written data is the vector and more control bits.
The only way to stop that is to shut it up at the PCI device level.
Assume the following situation:
- PCI device has MSI enabled and a valid target vector assigned
- Kernel crashes
- Kdump kernel starts
- PCI device raises interrupts which result in the MSI write
- Kdump kernel enables interrupts and the pending vector is raised in
the CPU.
- The CPU has no interrupt descriptor assigned to the vector
and does not even know where the interrupt originated from. So it
treats it like any other spurious interrupt to an unassigned vector,
emits a ratelimited message and ACKs the interrupt at the APIC.
- PCI device behaves stupid and reraises the interrupt for whatever
reason.
- Lather, rinse and repeat.
Unfortunately there is no way to tell the APIC "Mask vector X" and the
dump kernel does neither know which device it comes from nor does it
have enumerated PCI completely which would reset the device and shutup
the spew. Due to the interrupt storm it does not get that far.
Thanks,
tglx
Powered by blists - more mailing lists