xenomai.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Johannes Kirchmair <johannes.kirchmair@sigmatek.at>,
	"xenomai@lists.linux.dev" <xenomai@lists.linux.dev>
Subject: Re: [PATCH 1/3] [POC] test implementaion of rt-signals
Date: Thu, 7 Sep 2023 15:39:38 +0200	[thread overview]
Message-ID: <87fce991-3883-4fdf-9d80-9a797f09db29@siemens.com> (raw)
In-Reply-To: <VE1PR08MB490971F4934FF3D73406070392E9A@VE1PR08MB4909.eurprd08.prod.outlook.com>

On 04.09.23 08:55, Johannes Kirchmair wrote:
> Hi Jan,
> 
>> -----Original Message-----
>> From: Jan Kiszka <jan.kiszka@siemens.com>
>> Sent: Freitag, 1. September 2023 14:00
>> To: Johannes Kirchmair <johannes.kirchmair@sigmatek.at>;
>> xenomai@lists.linux.dev
>> Subject: Re: [PATCH 1/3] [POC] test implementaion of rt-signals
>>
>> CAUTION: External E-Mail !
>>
>> On 16.08.23 12:18, Johannes Kirchmair wrote:
>>> We implement rt signals to handle exceptions in rt stage.
>>>
>>> This is done using dovetail specific functions for setting up the signal
>>> frame.
>>>
>>> This can be used to handle fpe exceptions on the fly, like fixing
>>> division by zero. An other use case are breakpoints, implemented using the
>>> illegal opcode exception. The real time handling of the breakpoints would
>>> be handy for conditional breakpoints or also for stopping watchdogs and
>>> other tasks in time.
>>>
>>> Signed-off-by: Johannes Kirchmair <johannes.kirchmair@sigmatek.at>
>>> ---
>>>  include/cobalt/kernel/ppd.h                   |  3 +
>>>  include/cobalt/kernel/thread.h                |  2 +
>>>  include/cobalt/signal.h                       |  2 +
>>>  include/cobalt/uapi/signal.h                  |  1 +
>>>  include/cobalt/uapi/syscall.h                 |  6 ++
>>>  kernel/cobalt/arch/x86/Makefile               |  2 +-
>>>  .../arch/x86/include/asm/xenomai/thread.h     | 13 ++++
>>>  kernel/cobalt/arch/x86/signal_ia32.c          | 75 +++++++++++++++++++
>>>  kernel/cobalt/arch/x86/signal_ia64.c          | 37 +++++++++
>>>  kernel/cobalt/dovetail/kevents.c              |  5 ++
>>>  kernel/cobalt/posix/process.c                 |  3 +-
>>>  kernel/cobalt/posix/syscall.c                 | 28 +++++++
>>>  kernel/cobalt/posix/syscall32.c               | 16 ++++
>>>  kernel/cobalt/thread.c                        | 39 ++++++++++
>>>  lib/cobalt/arch/x86/Makefile.am               |  2 +-
>>>  lib/cobalt/arch/x86/sigreturn.c               | 36 +++++++++
>>>  lib/cobalt/internal.h                         |  2 +
>>>  lib/cobalt/signal.c                           | 13 ++++
>>>  18 files changed, 282 insertions(+), 3 deletions(-)
>>>  create mode 100644 kernel/cobalt/arch/x86/signal_ia32.c
>>>  create mode 100644 kernel/cobalt/arch/x86/signal_ia64.c
>>>  create mode 100644 lib/cobalt/arch/x86/sigreturn.c
>>>
>>> diff --git a/include/cobalt/kernel/ppd.h b/include/cobalt/kernel/ppd.h
>>> index f0079fe6e..fb2f682da 100644
>>> --- a/include/cobalt/kernel/ppd.h
>>> +++ b/include/cobalt/kernel/ppd.h
>>> @@ -22,6 +22,7 @@
>>>  #include <linux/types.h>
>>>  #include <linux/atomic.h>
>>>  #include <linux/rbtree.h>
>>> +#include <linux/signal.h>
>>>  #include <cobalt/kernel/heap.h>
>>>
>>>  struct cobalt_umm {
>>> @@ -32,6 +33,8 @@ struct cobalt_umm {
>>>
>>>  struct cobalt_ppd {
>>>       struct cobalt_umm umm;
>>> +     void __user *sighand[_NSIG];
>>> +     void __user *sigrestorer;
>>>       atomic_t refcnt;
>>>       char *exe_path;
>>>       struct rb_root fds;
>>> diff --git a/include/cobalt/kernel/thread.h b/include/cobalt/kernel/thread.h
>>> index b79cb8429..33d468419 100644
>>> --- a/include/cobalt/kernel/thread.h
>>> +++ b/include/cobalt/kernel/thread.h
>>> @@ -574,6 +574,8 @@ static inline void
>> xnthread_propagate_schedparam(struct xnthread *curr)
>>>               __xnthread_propagate_schedparam(curr);
>>>  }
>>>
>>> +int xnthread_handle_rt_signals(unsigned int trapnr, struct pt_regs *regs);
>>> +
>>>  extern struct xnthread_personality xenomai_personality;
>>>
>>>  /** @} */
>>> diff --git a/include/cobalt/signal.h b/include/cobalt/signal.h
>>> index 62694f93a..3d6540aff 100644
>>> --- a/include/cobalt/signal.h
>>> +++ b/include/cobalt/signal.h
>>> @@ -54,6 +54,8 @@ COBALT_DECL(int, kill(pid_t pid, int sig));
>>>  COBALT_DECL(int, sigqueue(pid_t pid, int sig,
>>>                         const union sigval value));
>>>
>>> +int cobalt_rt_signal(int sig, void (*handler)(int, siginfo_t *, void *));
>>> +
>>>  #ifdef __cplusplus
>>>  }
>>>  #endif
>>> diff --git a/include/cobalt/uapi/signal.h b/include/cobalt/uapi/signal.h
>>> index 8a7ea15a4..1afb6050a 100644
>>> --- a/include/cobalt/uapi/signal.h
>>> +++ b/include/cobalt/uapi/signal.h
>>> @@ -68,6 +68,7 @@
>>>  #define SIGDEBUG_RESCNT_IMBALANCE    7
>>>  #define SIGDEBUG_LOCK_BREAK          8
>>>  #define SIGDEBUG_MUTEX_SLEEP         9
>>> +#define SIGDEBUG_SIGRESTOR           10
>>>
>>>  #define COBALT_DELAYMAX                      2147483647U
>>>
>>> diff --git a/include/cobalt/uapi/syscall.h b/include/cobalt/uapi/syscall.h
>>> index 3e65efaab..f14bd8ffe 100644
>>> --- a/include/cobalt/uapi/syscall.h
>>> +++ b/include/cobalt/uapi/syscall.h
>>> @@ -142,6 +142,12 @@
>>>  #define sc_cobalt_timerfd_gettime64          119
>>>  #define sc_cobalt_pselect64                  120
>>>
>>> +/*
>>> + * Sigmatek specific syscalls
>>> + */
>>> +#define sc_cobalt_sigreturn                  121
>>> +#define sc_cobalt_sigaction                  122
>>> +
>>>  #define __NR_COBALT_SYSCALLS                 128 /* Power of 2 */
>>>
>>>  #endif /* !_COBALT_UAPI_SYSCALL_H */
>>> diff --git a/kernel/cobalt/arch/x86/Makefile b/kernel/cobalt/arch/x86/Makefile
>>> index 93929b645..e725afbff 100644
>>> --- a/kernel/cobalt/arch/x86/Makefile
>>> +++ b/kernel/cobalt/arch/x86/Makefile
>>> @@ -1,5 +1,5 @@
>>>
>>>  obj-$(CONFIG_XENOMAI) += xenomai.o
>>> -xenomai-y := machine.o smi.o c1e.o
>>> +xenomai-y := machine.o smi.o c1e.o signal_ia32.o signal_ia64.o
>>>
>>>  ccflags-y := -I$(srctree)/arch/x86/xenomai/include -
>> I$(srctree)/include/xenomai
>>> diff --git a/kernel/cobalt/arch/x86/include/asm/xenomai/thread.h
>> b/kernel/cobalt/arch/x86/include/asm/xenomai/thread.h
>>> index 745c32467..4d004680b 100644
>>> --- a/kernel/cobalt/arch/x86/include/asm/xenomai/thread.h
>>> +++ b/kernel/cobalt/arch/x86/include/asm/xenomai/thread.h
>>> @@ -28,5 +28,18 @@
>>>  #define xnarch_fault_bp_p(__nr)              ((current->ptrace & PT_PTRACED) &&
>> \
>>>                                        ((__nr) == X86_TRAP_DB || (__nr) == X86_TRAP_BP))
>>>  #define xnarch_fault_notify(__nr)    (!xnarch_fault_bp_p(__nr))
>>> +#define xnarch_fault_code(__regs)            ((__regs)->orig_ax)
>>> +int xnarch_setup_trap_info(unsigned int vector, struct pt_regs *regs,
>>> +                        long errcode, int *sig, struct kernel_siginfo *info);
>>> +
>>> +int xnarch_setup_rt_frame_ia32(int sig, void *handler, struct kernel_siginfo
>> *si,
>>> +                       struct pt_regs *regs, void __user *restorer);
>>> +
>>> +int xnarch_rt_sigreturn_ia32(struct pt_regs *regs);
>>> +
>>> +int xnarch_setup_rt_frame_ia64(int sig, void *handler, struct kernel_siginfo
>> *si,
>>> +                       struct pt_regs *regs, void __user *restorer);
>>> +
>>> +int xnarch_rt_sigreturn_ia64(struct pt_regs *regs);
>>>
>>>  #endif /* !_COBALT_X86_ASM_THREAD_H */
>>> diff --git a/kernel/cobalt/arch/x86/signal_ia32.c
>> b/kernel/cobalt/arch/x86/signal_ia32.c
>>> new file mode 100644
>>> index 000000000..140016460
>>> --- /dev/null
>>> +++ b/kernel/cobalt/arch/x86/signal_ia32.c
>>> @@ -0,0 +1,75 @@
>>> +#include <linux/signal.h>
>>> +#include <linux/uaccess.h>
>>> +#include <cobalt/kernel/thread.h>
>>> +
>>> +#include <asm/sigframe.h>
>>> +#include <asm/sighandling.h>
>>> +#include <asm/fpu/signal.h>
>>> +
>>> +int xnarch_setup_trap_info(unsigned int vector, struct pt_regs *regs,
>>> +                        long errcode, int *sig, struct kernel_siginfo *info)
>>
>> Why is this function in file that suggests to handle only 32-bit? It's
>> shared by both 32 and 64 bit.
> Did not changed it yet?
> Should I add an distinct signal.c file for the function?

Yes, that would be logical in this case.

> 
>>
>>> +{
>>> +     switch (vector) {
>>> +     case 0: /* divide_error */
>>> +             *sig = SIGFPE;
>>> +             info->si_signo = *sig;
>>> +             info->si_errno = 0;
>>> +             info->si_code = FPE_INTDIV;
>>> +             info->si_addr = (void __user *)regs->ip;
>>> +             return 0;
>>> +     case 1: /* trap_error */ {
>>> +             unsigned long condition;
>>> +             get_debugreg(condition, 6);
>>> +             set_debugreg(0, 7);
>>> +             *sig = SIGTRAP;
>>> +             info->si_signo = *sig;
>>> +             info->si_errno = errcode;
>>> +             info->si_code = get_si_code(condition);
>>> +             info->si_addr = (void __user *)regs->ip;
>>> +             return 0;
>>> +     }
>>> +     case 3: /* trap_error */
>>> +             *sig = SIGTRAP;
>>> +             info->si_signo = *sig;
>>> +             info->si_errno = errcode;
>>> +             info->si_code = SI_KERNEL;
>>> +             info->si_addr = (void __user *)regs->ip;
>>> +             return 0;
>>> +     case 6: /* invalid_op */
>>> +             *sig = SIGILL;
>>> +             info->si_signo = *sig;
>>> +             info->si_errno = 0;
>>> +             info->si_code = ILL_ILLOPN;
>>> +             info->si_addr = (void __user *)regs->ip;
>>> +             return 0;
>>> +     case 16: { /* coprocessor_error */
>>> +             *sig = SIGFPE;
>>> +
>>> +             info->si_signo = *sig;
>>> +             info->si_errno = 0;
>>> +             info->si_code = 0;
>>> +             info->si_addr = (void __user *)regs->ip;
>>> +             return 0;
>>> +     }
>>> +     default:
>>> +             break;
>>> +     }
>>> +
>>> +     return -ENOSYS;
>>> +}
>>> +
>>> +int xnarch_rt_sigreturn_ia32(struct pt_regs *regs)
>>> +{
>>> +     int ret;
>>> +
>>> +     ret = dovetail_restore_rt_signal_frame(regs);
>>> +     if (ret < 0)
>>> +             goto badframe;
>>> +
>>> +     return regs->ax;
>>> +
>>> +badframe:
>>> +     xnthread_call_mayday(xnthread_current(), SIGDEBUG_SIGRESTOR);
>>> +     return -1;
>>> +}
>>> +
>>> diff --git a/kernel/cobalt/arch/x86/signal_ia64.c
>> b/kernel/cobalt/arch/x86/signal_ia64.c
>>> new file mode 100644
>>> index 000000000..3b8cd3330
>>> --- /dev/null
>>> +++ b/kernel/cobalt/arch/x86/signal_ia64.c
>>> @@ -0,0 +1,37 @@
>>> +// SPDX-License-Identifier: GPL-2.0
>>> +/*
>>> + *  Copyright (C) 1991, 1992  Linus Torvalds
>>> + *  Copyright (C) 2000, 2001, 2002 Andi Kleen SuSE Labs
>>> + *
>>> + *  1997-11-28  Modified for POSIX.1b signals by Richard Henderson
>>> + *  2000-06-20  Pentium III FXSR, SSE support by Gareth Hughes
>>> + *  2000-2002   x86-64 support by Andi Kleen
>>> + */
>>> +
>>> +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
>>> +
>>> +
>>> +#include <linux/signal.h>
>>> +#include <linux/uaccess.h>
>>> +#include <cobalt/kernel/thread.h>
>>> +
>>> +#include <asm/sigframe.h>
>>> +#include <asm/sighandling.h>
>>> +#include <asm/fpu/signal.h>
>>> +
>>> +int xnarch_rt_sigreturn_ia64(struct pt_regs *regs)
>>> +{
>>> +     int ret;
>>> +
>>> +     ret = dovetail_restore_rt_signal_frame(regs);
>>> +     if (ret < 0)
>>> +             goto badframe;
>>> +
>>> +     return regs->ax;
>>> +
>>> +badframe:
>>> +     xnthread_call_mayday(xnthread_current(), SIGDEBUG_SIGRESTOR);
>>
>> I'm not sure if this is the right way to react. Mayday will translate to
>> SIGDEBUG, but we need a SIGSEGV.
>>
>>> +     return -1;
>>> +
>>> +}
>>> +
>>> diff --git a/kernel/cobalt/dovetail/kevents.c b/kernel/cobalt/dovetail/kevents.c
>>> index 4da4f51b7..61417717b 100644
>>> --- a/kernel/cobalt/dovetail/kevents.c
>>> +++ b/kernel/cobalt/dovetail/kevents.c
>>> @@ -57,6 +57,9 @@ void handle_oob_trap_entry(unsigned int trapnr, struct
>> pt_regs *regs)
>>>               xnsched_run();
>>>       }
>>>
>>> +     if (xnthread_handle_rt_signals(trapnr, regs) == 0)
>>> +             return;
>>> +
>>>       /*
>>>        * If we experienced a trap on behalf of a shadow thread
>>>        * running in primary mode, move it to the Linux domain,
>>> @@ -88,6 +91,8 @@ void handle_oob_trap_entry(unsigned int trapnr, struct
>> pt_regs *regs)
>>>               xnstat_counter_inc(&thread->stat.pf);
>>>
>>>       xnthread_relax(xnarch_fault_notify(trapnr), SIGDEBUG_MIGRATE_FAULT);
>>> +
>>> +     return;
>>
>> Unrelated and unneeded change.
>>
>>>  }
>>>
>>>  static inline int handle_setaffinity_event(struct dovetail_migration_data *d)
>>> diff --git a/kernel/cobalt/posix/process.c b/kernel/cobalt/posix/process.c
>>> index 1abc86f37..2069129cb 100644
>>> --- a/kernel/cobalt/posix/process.c
>>> +++ b/kernel/cobalt/posix/process.c
>>> @@ -738,9 +738,10 @@ void cobalt_unregister_debugged_thread(struct
>> xnthread *thread)
>>>               cobalt_resume_debugged_process(process);
>>>  }
>>>
>>> +#ifdef CONFIG_SMP
>>> +
>>>  int cobalt_handle_setaffinity_event(struct task_struct *task)
>>>  {
>>> -#ifdef CONFIG_SMP
>>
>> Unrelated and bogus change.
>>
>>>       struct xnthread *thread;
>>>       spl_t s;
>>>
>>> diff --git a/kernel/cobalt/posix/syscall.c b/kernel/cobalt/posix/syscall.c
>>> index 46c4998e4..b4bd4c587 100644
>>> --- a/kernel/cobalt/posix/syscall.c
>>> +++ b/kernel/cobalt/posix/syscall.c
>>> @@ -277,6 +277,34 @@ static COBALT_SYSCALL(serialdbg, current,
>>>       return 0;
>>>  }
>>>
>>> +static COBALT_SYSCALL(sigreturn, current, (void))
>>> +{
>>> +     struct pt_regs *regs = task_pt_regs(current);
>>> +
>>> +     if (regs->cs == __USER_CS)
>>> +             xnarch_rt_sigreturn_ia64(regs);
>>> +     if (regs->cs == __USER32_CS)
>>> +             xnarch_rt_sigreturn_ia32(regs);
>>> +
>>> +     return __xn_reg_rval(regs);
>>> +}
>>> +
>>> +static COBALT_SYSCALL(sigaction, current, (int sig, void __user *handler,
>>> +                   void __user *restorer))
>>> +{
>>> +     struct cobalt_ppd *sys_ppd = cobalt_ppd_get(0);
>>> +
>>> +     if (sig < 0 || sig >= _NSIG)
>>> +             return -EINVAL;
>>> +
>>> +     sys_ppd->sighand[sig] = handler;
>>> +
>>> +     if (!sys_ppd->sigrestorer)
>>> +             sys_ppd->sigrestorer = restorer;
>>> +
>>> +     return 0;
>>> +}
>>> +
>>>  static void stringify_feature_set(unsigned long fset, char *buf, int size)
>>>  {
>>>       unsigned long feature;
>>> diff --git a/kernel/cobalt/posix/syscall32.c b/kernel/cobalt/posix/syscall32.c
>>> index 780d276b1..7c858f904 100644
>>> --- a/kernel/cobalt/posix/syscall32.c
>>> +++ b/kernel/cobalt/posix/syscall32.c
>>> @@ -705,6 +705,22 @@ COBALT_SYSCALL32emu(sigqueue, conforming,
>>>       return ret ?: __cobalt_sigqueue(pid, sig, &val);
>>>  }
>>>
>>> +COBALT_SYSCALL32emu(sigaction, current,
>>> +                 (int sig, void __user *handler, void __user *restorer))
>>> +{
>>> +     struct cobalt_ppd *sys_ppd = cobalt_ppd_get(0);
>>> +
>>> +     if (sig < 0 || sig >= _NSIG)
>>> +             return -EINVAL;
>>> +
>>> +     sys_ppd->sighand[sig] = handler;
>>> +
>>> +     if (!sys_ppd->sigrestorer)
>>> +             sys_ppd->sigrestorer = restorer;
>>> +
>>> +     return 0;
>>> +}
>>> +
>>>  COBALT_SYSCALL32emu(monitor_wait, nonrestartable,
>>>                   (struct cobalt_monitor_shadow __user *u_mon,
>>>                    int event, const struct old_timespec32 __user *u_ts,
>>> diff --git a/kernel/cobalt/thread.c b/kernel/cobalt/thread.c
>>> index 41804b24f..71f97c481 100644
>>> --- a/kernel/cobalt/thread.c
>>> +++ b/kernel/cobalt/thread.c
>>> @@ -25,6 +25,7 @@
>>>  #include <linux/signal.h>
>>>  #include <linux/pid.h>
>>>  #include <linux/sched.h>
>>> +#include <asm/sighandling.h>
>>>  #include <uapi/linux/sched/types.h>
>>>  #include <cobalt/kernel/sched.h>
>>>  #include <cobalt/kernel/timer.h>
>>> @@ -43,6 +44,7 @@
>>>  #include <pipeline/inband_work.h>
>>>  #include <pipeline/sched.h>
>>>  #include <trace/events/cobalt-core.h>
>>> +#include "posix/process.h"
>>>  #include "debug.h"
>>>
>>>  static DECLARE_WAIT_QUEUE_HEAD(join_all);
>>> @@ -2520,6 +2522,43 @@ int xnthread_killall(int grace, int mask)
>>>  }
>>>  EXPORT_SYMBOL_GPL(xnthread_killall);
>>>
>>> +int xnthread_handle_rt_signals(unsigned int trapnr, struct pt_regs *regs)
>>> +{
>>> +     struct ksignal ksig;
>>> +
>>> +     unsigned int vector = trapnr;
>>> +     unsigned int code = xnarch_fault_code(regs);
>>> +     struct cobalt_ppd *sys_ppd;
>>> +     int sig, ret = 0;
>>> +     struct kernel_siginfo si;
>>> +
>>> +     code = xnarch_fault_code(regs);
>>> +     ret = xnarch_setup_trap_info(vector, regs, code, &sig, &si);
>>> +     if (ret || sig == 0)
>>> +             return 1;
>>> +
>>> +     sys_ppd = cobalt_ppd_get(0);
>>> +     if (sig >= _NSIG ||
>>> +         sys_ppd->sighand[sig] == NULL ||
>>> +         sys_ppd->sighand[sig] == SIG_DFL)
>>> +             return 1;
>>> +
>>> +     if (sys_ppd->sigrestorer == NULL)
>>> +             return 1;
>>> +
>>> +     ksig.sig = sig;
>>> +     memcpy(&ksig.info, &si, sizeof(si));
>>> +     ksig.ka.sa.sa_flags = SA_SIGINFO | SA_RESTORER;
>>> +     ksig.ka.sa.sa_restorer = sys_ppd->sigrestorer;
>>> +     ksig.ka.sa.sa_handler = sys_ppd->sighand[sig];
>>> +
>>> +     ret = dovetail_setup_rt_signal_frame(&ksig, regs);
>>
>> All this is called with interrupts off on x86, and that makes dovetail
>> unhappy:
>>
>> [   17.051995] 9pnet: Limiting 'msize' to 512000 as this is the maximum supported
>> by transport virtio
>> [   37.268218] ------------[ cut here ]------------
>> [   37.268223] WARNING: CPU: 2 PID: 1402 at ../mm/memory.c:5857
>> __might_fault+0x95/0xa0
>> [   37.268237] Modules linked in: 9p netfs rt_e1000 rt_e1000_new rtnet
>> [   37.268252] CPU: 2 PID: 1402 Comm: rt-task Not tainted 6.5.0+ #40
>> [   37.268259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-
>> 1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014
>> [   37.268262] IRQ stage: Xenomai
>> [   37.268265] RIP: 0010:__might_fault+0x95/0xa0
>> [   37.268271] Code: b8 a0 01 00 00 e8 cb bf e3 ff 48 8b bb e8 04 00 00 48 8b 5d
>> f8 48 c7 c6 6b 29 2d 81 58 c9 48 81 c7 a0 01 00 00 e9 2b bc e3 ff <0f> 0b eb 86
>> 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90
>> [   37.268277] RSP: 0000:ffffc900007f3cd0 EFLAGS: 00010046
>> [   37.268283] RAX: 0000000000000006 RBX: 00007f5aa94016b8 RCX:
>> ffffc900007f3d70
>> [   37.268287] RDX: 00007f5aa9401cc4 RSI: 00000000000000a7 RDI:
>> ffffffff82962a10
>> [   37.268291] RBP: ffffc900007f3cd8 R08: 0000000000000444 R09:
>> 0000000000000000
>> [   37.268295] R10: 0000000000000000 R11: 0000000000000000 R12:
>> 0000000000000000
>> [   37.268298] R13: ffff888009e6e700 R14: 0000000000000000 R15:
>> 00000000000299a0
>> [   37.268302] FS:  00007f5aa9402700(0000) GS:ffff88803ed00000(0000)
>> knlGS:0000000000000000
>> [   37.268313] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [   37.268317] CR2: 0000560ba8044008 CR3: 000000000981a004 CR4:
>> 0000000000370ee0
>> [   37.268321] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
>> 0000000000000000
>> [   37.268324] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
>> 0000000000000400
>> [   37.268328] Call Trace:
>> [   37.268332]  <TASK>
>> [   37.268339]  ? __warn+0x81/0x180
>> [   37.268350]  ? __might_fault+0x95/0xa0
>> [   37.268363]  ? report_bug+0x10b/0x200
>> [   37.268406]  ? handle_bug+0x50/0xc0
>> [   37.268417]  ? exc_invalid_op+0xc7/0xe0
>> [   37.268427]  ? asm_exc_invalid_op+0x16/0x20
>> [   37.268467]  ? __might_fault+0x95/0xa0
>> [   37.268485]  copy_fpstate_to_sigframe+0x74/0x430
>> [   37.268496]  ? ___xnsched_run+0x223/0x590
>> [   37.268515]  ? __pfx____xnsched_run+0x10/0x10
>> [   37.268541]  get_sigframe+0xea/0x2b0
>> [   37.268562]  x64_setup_rt_frame+0x68/0x2f0
>> [   37.268583]  xnthread_handle_rt_signals+0xf8/0x130
>> [   37.268633]  handle_oob_trap_entry+0xaa/0x3a0
>> [   37.268640]  ? __pfx_CoBaLt_sigaction+0x10/0x10
>> [   37.268666]  __oob_trap_notify+0x27/0x30
>> [   37.268674]  do_error_trap+0x162/0x1d0
>> [   37.268695]  exc_divide_error+0x35/0x50
>> [   37.268707]  asm_exc_divide_error+0x16/0x20
>> [   37.268713] RIP: 0033:0x400e68
>>
>> I'm currently scratching my head if we can safely enable hard interrupts
>> here to resolve this (and the underlying latency source).
> Not sure what is the right way. Have some problems understanding, what has to be protected for the setup to work correct.
> 

I have a working dovetail patch locally will share it later.

>>
>> We will also need pagefault_disable in our dovetail functions, already
>> playing with that.
> Could you explain to me, what pagefault_disable does and by we need it.

For us, it primarily signals to the might_sleep() check that we don't
expect any waiting due to not yet mapped memory - accesses under that
protection are supposed to succeed or fail immediately. The kernel
writes: "If disabled, it will not take any locks and go straight to the
fixup table."

Jan

-- 
Siemens AG, Technology
Linux Expert Center


  reply	other threads:[~2023-09-07 13:39 UTC|newest]

Thread overview: 30+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-08-16 10:18 [PATCH 1/3] [POC] test implementaion of rt-signals Johannes Kirchmair
2023-08-16 10:18 ` [PATCH 2/3] [POC] Add rt_signal test Johannes Kirchmair
2023-08-16 10:18 ` [PATCH 3/3] [POC] add a tool to measure rt_signal latency Johannes Kirchmair
2023-08-16 11:24 ` [PATCH 1/3] [POC] test implementaion of rt-signals Florian Bezdeka
2023-08-16 11:36   ` Jan Kiszka
2023-08-16 11:59     ` Johannes Kirchmair
2023-09-07 10:48   ` Johannes Kirchmair
2023-09-11  8:41     ` Florian Bezdeka
2023-09-01 12:00 ` Jan Kiszka
2023-09-01 13:38   ` Jan Kiszka
2023-09-04  6:55   ` Johannes Kirchmair
2023-09-07 13:39     ` Jan Kiszka [this message]
2023-09-07 13:58       ` Johannes Kirchmair
2023-09-01 13:51 ` Jan Kiszka
2023-09-01 14:11   ` Jan Kiszka
2023-09-04  7:04     ` Johannes Kirchmair
2024-03-05 15:54 ` Richard Weinberger
2024-03-05 17:05   ` Jan Kiszka
2024-03-05 17:14     ` Richard Weinberger
  -- strict thread matches above, loose matches on Subject: below --
2023-09-08 10:50 Johannes Kirchmair
2023-09-08 10:54 ` Johannes Kirchmair
2023-09-09 11:35 ` Jan Kiszka
2023-05-09 13:13 Johannes Kirchmair
2023-05-09 13:17 ` Johannes Kirchmair
2023-05-12 17:38   ` Jan Kiszka
2023-05-15  6:50     ` Johannes Kirchmair
2023-05-15 10:38       ` Jan Kiszka
2023-05-16  6:46         ` Johannes Kirchmair
2023-05-16  6:52           ` Jan Kiszka
2023-08-09  9:50   ` Schaffner, Tobias

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87fce991-3883-4fdf-9d80-9a797f09db29@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=johannes.kirchmair@sigmatek.at \
    --cc=xenomai@lists.linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).