lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201120164231.nmzxe5scwnfoyy3o@gilmour>
Date:   Fri, 20 Nov 2020 17:42:31 +0100
From:   Maxime Ripard <maxime@...no.tech>
To:     Wilken Gottwalt <wilken.gottwalt@...teo.net>
Cc:     linux-kernel@...r.kernel.org, Ohad Ben-Cohen <ohad@...ery.com>,
        Bjorn Andersson <bjorn.andersson@...aro.org>,
        Baolin Wang <baolin.wang7@...il.com>,
        Rob Herring <robh+dt@...nel.org>, Chen-Yu Tsai <wens@...e.org>,
        Jernej Skrabec <jernej.skrabec@...l.net>
Subject: Re: [PATCH 2/2] hwspinlock: add sunxi hardware spinlock support

Hi,

On Thu, Nov 19, 2020 at 11:13:43AM +0100, Wilken Gottwalt wrote:
> On Thu, 19 Nov 2020 08:15:23 +0100
> Maxime Ripard <maxime@...no.tech> wrote:
> > > can you help me here a bit? I still try to figure out how to do patch sets
> > > properly. Some kernel submitting documentation says everything goes into the
> > > coverletter and other documentation only tells how to split the patches. So
> > > what would be the right way? A quick example based on my patch set would be
> > > really helpful.
> > 
> > I mean, the split between your patches and so on is good, you got that right
> > 
> > The thing I wanted better details on is the commit log itself, so the
> > message attached to that patch.
> 
> Ah yes, I think I got it now. So basically add a nice summary of the coverletter
> there.

Yes, a bit more context as well. Eventually, this should be the
motivation on why this patch is useful. So what it can be used for, what
are the challenges, how it was tested, etc.

The cover letter is usually here more to provide some meta-context: what
you expect from the maintainers / reviewers if it's an RFC, if there's
any feature missing or that could be added later on, etc.

> > > > Most importantly, this hwspinlock is used to synchronize the ARM cores
> > > > and the ARISC. How did you test this driver?
> > > 
> > > Yes, you are right, I should have mentioned this. I have a simple test kernel
> > > module for this. But I must admit, testing the ARISC is very hard and I have
> > > no real idea how to do it. Testing the hwspinlocks in general seems to work
> > > with my test kernel module, but I'm not sure if this is really sufficient. I
> > > can provide the code for it if you like. What would be the best way? Github?
> > > Just mailing a patch?
> > > 
> > > The test module produces these results:
> > > 
> > > # insmod /lib/modules/5.9.8/kernel/drivers/hwspinlock/sunxi_hwspinlock_test.ko 
> > > [   45.395672] [init] sunxi hwspinlock test driver start
> > > [   45.400775] [init] start test locks
> > > [   45.404263] [run ] testing 32 locks
> > > [   45.407804] [test] testing lock 0 -----
> > > [   45.411652] [test] taking lock attempt #0 succeded
> > > [   45.416438] [test] try taken lock attempt #0
> > > [   45.420735] [test] unlock/take attempt #0
> > > [   45.424752] [test] taking lock attempt #1 succeded
> > > [   45.429556] [test] try taken lock attempt #1
> > > [   45.433823] [test] unlock/take attempt #1
> > > [   45.437862] [test] testing lock 1 -----
> > 
> > That doesn't really test for contention though, and dealing with
> > contention is mostly what this hardware is about. Could you make a small
> > test with crust to see if when the arisc has taken the lock, the ARM
> > cores can't take it?
> 
> So the best solution would be to write a bare metal program that runs on the
> arisc and can be triggered from the linux side (the test kernel module) to take
> a spinlock ... or at least take spinlocks periodically for a while and watch it
> on the linux side. Okay, I think I can do this. Though, I have to dig through
> all this new stuff first.

It doesn't have to be super complicated, just a loop that takes a lock,
sleeps for some time, and releases the lock should be enough to at least
validate that the lock is actually working

Maxime

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ