Message ID | 20250514174339.1834871-9-ardb+git@google.com |
---|---|
Headers | show
Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C182727FD45 for <linux-efi@vger.kernel.org>; Wed, 14 May 2025 17:43:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1747244638; cv=none; b=g+5VJP7dBUitmHJtNHjYFF79+v3wdmmtmo0gpRDGmMlbSqE/PB+uPYHA2yHnPc3njhYXyMjq7WfE7H2buwHyteulVIO484mG11kZqFbb60UFbjHVPN9UCtl7tBeHP4ghkZ3NQPuEoNVBvzQgH7NQMH50bViAjh+DT4098LwTQM4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1747244638; c=relaxed/simple; bh=yhMpWCUXqTLvUsjh7Gmyr11MSo4dZ5QBtyUVoVF4eJU=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=DQwXtrFMat5icVw09DCCRUUuQbrXBvqkrICaSSDJKerjBhxNo0JiitwUEmO/XBomEYWyKC4QNn7dCyEkJBV21c5dt+A1A3mx6PfCiV/mhvJYEkfmM2Ccoa9iwluJWsd+NJFx3t7c+GWyWyHJK9+nuaXvbfebJd5Ys7kyiHXDO88= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=1Vx4bAIe; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="1Vx4bAIe" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-43d209dc2d3so365485e9.3 for <linux-efi@vger.kernel.org>; Wed, 14 May 2025 10:43:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1747244635; x=1747849435; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=jkJfwo8xpBpJbrVIx6UOqAm0kur6+ObopwN4A021JGU=; b=1Vx4bAIe1786Li8F/q2gHPfen8ctxlT8TmgxCVFew2zKtTWr8U9tbIZIVOh7lAaBiy jQjNTOqn+i6C1JiQIWHFhotSsprNdrvtaj9YnIL9QYzFAl56uGO29o/B5hINOuIce3fE fIk1bkpu5QS9VwXwut48AQtf0oWbv0ZSDlOUKfYSmOL94fkSNVeKyNz/43H3upW8xT65 tRdGVZk8/+h9R4jz2WeitKs3JzvMgNo8z0qAPLkusX3ugR9ZEqYxxJq9BiS7W3CQ0opR hARQqhOvQb2X3//GaCYL8jNRL36lVOyb1PagxoxMluoWxFuMVAPTXD0zHgP4eTmW+jUc x7ZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747244635; x=1747849435; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=jkJfwo8xpBpJbrVIx6UOqAm0kur6+ObopwN4A021JGU=; b=IoekpCVbGzUNxjnx0bkCbq680Sp/vlJfySr6iEFdTSd2KIDqRMfULg8Db9mvZSJnk+ OfQYucgmAofNYfbUa18a+4b18hoEfzkOGHyVwHVHKgXDqQCL1T/Ib30P/UKZ9eoCjv8+ yEGra+IKJMnmQUXNlmjhsfjUwLqtukWojECITR9tSBLls9Dm5PEBk0PRlqJ/nL98MfmQ d03ZXI++DlWr84qabb3gvglsJ8BgW+KVlYz8GNl8OJHNR90SqQ4MjyASBwMr2aBYB9kr wocj7VbCeXPUrlb1piSA6KvclHCONqNxIb9y+0VXFAJoiglClWFDi4RKWWaubvW735RG ApNA== X-Gm-Message-State: AOJu0YwwH1pw7kWPYDbThENvN22GfDI/yPTwc9taFr6WOk/5F6iErBA+ eq9uakPB/3lX/wRNYbdjgnWxQWOrAnYzLvljSSQYfXPQE4UfujoVncL+6fTIEa1B6qTZd0Fs3eS jc0zsxss/4nUy96M3wEUun+Y1hnqcV/x6dcaapz71HElTniJU+HqRNClqPCKQ78xPuq7Dh2KmFi Q8jUBaiH9bMOL7lAC9rcjELXYHEw== X-Google-Smtp-Source: AGHT+IGadySak7rBVDWqJCLGSxkPkZ2SIdOa3WalcC/ytBQcEahJVGu+EdIXS9X2q6vXYOUEx7HQqf+B X-Received: from wmben12.prod.google.com ([2002:a05:600c:828c:b0:43d:1f28:b8bf]) (user=ardb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600d:d:b0:442:f44f:65b with SMTP id 5b1f17b1804b1-442f44f09a9mr28697025e9.32.1747244635236; Wed, 14 May 2025 10:43:55 -0700 (PDT) Date: Wed, 14 May 2025 19:43:40 +0200 Precedence: bulk X-Mailing-List: linux-efi@vger.kernel.org List-Id: <linux-efi.vger.kernel.org> List-Subscribe: <mailto:linux-efi+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-efi+unsubscribe@vger.kernel.org> Mime-Version: 1.0 X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=3009; i=ardb@kernel.org; h=from:subject; bh=K7cxMrEeOi5MLsm9UXTEEGQ2PJi6zRJCdveu0RXcm6U=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIUPlmk908a2ewi2NlRcOfrzbEr36wZqdbZ3PEpNTpiy60 K6i4buto5SFQYyDQVZMkUVg9t93O09PlKp1niULM4eVCWQIAxenAEzkHDPD/zy39z+f8TwJtWj2 Pjj/75SX7elf5hawnNNtq9IT3sr9kZ3hn8ndvqiO38aGxc+NSk4ytGereTr6HWhKlPLfyFm5Nqa RFwA= X-Mailer: git-send-email 2.49.0.1101.gccaa498523-goog Message-ID: <20250514174339.1834871-9-ardb+git@google.com> Subject: [RFC PATCH 0/7] arm64: Make EFI calls preemptible From: Ard Biesheuvel <ardb+git@google.com> To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Ard Biesheuvel <ardb@kernel.org>, Will Deacon <will@kernel.org>, Mark Rutland <mark.rutland@arm.com>, Sebastian Andrzej Siewior <bigeasy@linutronix.de>, Peter Zijlstra <peterz@infradead.org> Content-Type: text/plain; charset="UTF-8" |
Series |
arm64: Make EFI calls preemptible
|
expand
|
From: Ard Biesheuvel <ardb@kernel.org> The arm64 port permits the use of the baseline FP/SIMD register file in kernel mode, and no longer requires preemption to be disabled. Now that the EFI spec is being clarified to state that EFI runtime services may only use baseline FP/SIMD, the fact that EFI may code may use FP/SIMD registers (while executing at the same privilege level as the kernel) is no longer a reason to disable preemption when invoking them. This means that the only remaining reason for disabling preemption is the fact that the active mm is swapped out and replaced with efi_mm in a way that is hidden from the scheduler, and so scheduling is not supported currently. However, given that virtually all (*) EFI runtime calls are made from the efi_rts_wq workqueue, the efi_mm can simply be loaded into the workqueue worker kthread while the call is in progress, and this does not require preemption to be disabled. Note that this is only a partial solution in terms of RT guarantees, given that the runtime services execute at the same privilege level as the kernel, and can therefore disable interrupts (and therefore preemption) directly. But it should prevent scheduling latency spikes for EFI calls that simply take a long time to run to completion. (*) only efi_reset_system() and EFI pstore invoke EFI runtime services without going through the workqueue, and the latter only when saving a kernel oops log to the EFI varstore Cc: Will Deacon <will@kernel.org> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Sebastian Andrzej Siewior <bigeasy@linutronix.de> Cc: Peter Zijlstra <peterz@infradead.org> Ard Biesheuvel (7): efi: Add missing static initializer for efi_mm::cpus_allowed_lock efi/runtime: Return success/failure from arch_efi_call_virt_setup() efi/runtime: Deal with arch_efi_call_virt_setup() returning failure arm64/fpsimd: Don't warn when EFI execution context is preemptible arm64/efi: Use a semaphore to protect the EFI stack and FP/SIMD state arm64/efi: Move uaccess en/disable out of efi_set_pgd() arm64/efi: Call EFI runtime services without disabling preemption arch/arm/include/asm/efi.h | 2 +- arch/arm64/include/asm/efi.h | 5 +-- arch/arm64/kernel/efi.c | 34 ++++++++++++++++---- arch/arm64/kernel/fpsimd.c | 4 +-- arch/loongarch/include/asm/efi.h | 2 +- arch/riscv/include/asm/efi.h | 2 +- arch/x86/include/asm/efi.h | 2 +- arch/x86/platform/efi/efi_32.c | 3 +- arch/x86/platform/efi/efi_64.c | 3 +- arch/x86/platform/uv/bios_uv.c | 3 +- drivers/firmware/efi/efi.c | 3 ++ drivers/firmware/efi/riscv-runtime.c | 3 +- drivers/firmware/efi/runtime-wrappers.c | 20 ++++++++---- include/linux/efi.h | 8 ++--- 14 files changed, 63 insertions(+), 31 deletions(-) base-commit: e04796c8b5980700c78f2fd1b29724afd80dcc62