Received: by 10.192.165.148 with SMTP id m20csp4539519imm; Tue, 24 Apr 2018 04:37:25 -0700 (PDT) X-Google-Smtp-Source: AIpwx49hGK6OPe99JJs+IN2bhlIbFd78LudYWhnsNrOESUVi61ScqhxVuxMU8RexLz3t+rzKvuXL X-Received: by 10.99.179.6 with SMTP id i6mr20026465pgf.434.1524569845850; Tue, 24 Apr 2018 04:37:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524569845; cv=none; d=google.com; s=arc-20160816; b=FTbyXFXNG/iq13Tzgjba7MrgY7btGjH7ByGqzULduJ+Ntj409L6OgzvgIZsU7kZdSL 140V2zYzFMJaVU7VcI3N/rEe8EPC7ZtG5BIcgkp6HtsO7BMWuEhY0JF2WPUB3DxoEVtD 5j1ys22wIeuW8BmvQIq2wQ/xr36qw+Q68tIHTbatzjopHk0gEhGyCIEyWQCdKe5QxOvO DW+VU+uOg8hTlOFtfbYR+rK79CU8/0hKookDl0gjuxErjkbuFP4cM5/uYH8KyFVpX6X7 nTa9ZQTlxsjcCUbbt7AofPcSmcGS5IWVGsJVpMDzXfqrlmWlRXD4ztGYNBK+6c+4/t2a ahTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:from:cc:references:to :subject:arc-authentication-results; bh=O5Tol8zKXIVanEk4zA3zIuiCHpCD9I0zR1mUfaIpQks=; b=foNx03avqXaxigHlFUgKDvnQLITh2+ZJJAtGa859OKWG853rmsesHJIl5aHkThhk/Q Mrh63QXAToD0JRz3VQJMhm+8M+YK5kyCXrP+cvMTCnxW2EguCTbveNIpctAMU9mNMRRt 8FwCNdRkm2u7nRqSeLhDeODDjTB2epMY+r2+FXukNmJNfpWis84c1f653R4X68Vq+QWl pf5QprhJwTNOTSLelNtRYIPlV9BsEoFWDbys9e4NOjbCBZW9/iT3r+TmhuOjqK8lRidU 9b11n+7ZEmx1/t+JUNnhTKj9T118gTQcpDEx+37BBS2JxnIgpmg+EjPMNCxUzRQQiSpi wBkg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g9si12986114pfi.113.2018.04.24.04.37.10; Tue, 24 Apr 2018 04:37:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932854AbeDXKrm (ORCPT + 99 others); Tue, 24 Apr 2018 06:47:42 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:47730 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932589AbeDXKrk (ORCPT ); Tue, 24 Apr 2018 06:47:40 -0400 Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3OAjUrX120471 for ; Tue, 24 Apr 2018 06:47:40 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0b-001b2d01.pphosted.com with ESMTP id 2hj2re904e-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 24 Apr 2018 06:47:39 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 24 Apr 2018 11:47:37 +0100 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Tue, 24 Apr 2018 11:47:33 +0100 Received: from d06av24.portsmouth.uk.ibm.com (d06av24.portsmouth.uk.ibm.com [9.149.105.60]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w3OAlWXM7602574; Tue, 24 Apr 2018 10:47:32 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1DC4E4204C; Tue, 24 Apr 2018 11:38:56 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 16B6C4203F; Tue, 24 Apr 2018 11:38:54 +0100 (BST) Received: from oc4502181600.ibm.com (unknown [9.124.35.76]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Tue, 24 Apr 2018 11:38:53 +0100 (BST) Subject: Re: [PATCH] cpufreq: powernv: Fix the hardlockup by synchronus smp_call in timer interrupt To: Nicholas Piggin References: <1524544906-31512-1-git-send-email-shilpa.bhat@linux.vnet.ibm.com> <20180424160034.6e9d2274@roar.ozlabs.ibm.com> <20180424173147.7bcd86c5@roar.ozlabs.ibm.com> Cc: rjw@rjwysocki.net, viresh.kumar@linaro.org, benh@kernel.crashing.org, mpe@ellerman.id.au, linux-pm@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, ppaidipe@linux.vnet.ibm.com, svaidy@linux.vnet.ibm.com From: Shilpasri G Bhat Date: Tue, 24 Apr 2018 16:17:29 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.7.0 MIME-Version: 1.0 In-Reply-To: <20180424173147.7bcd86c5@roar.ozlabs.ibm.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18042410-0044-0000-0000-0000054B882C X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18042410-0045-0000-0000-0000288BBC43 Message-Id: <98cbf9e4-2116-5cd4-ff90-666ec37ebcab@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-24_02:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804240107 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/24/2018 01:01 PM, Nicholas Piggin wrote: > On Tue, 24 Apr 2018 12:47:32 +0530 > Shilpasri G Bhat wrote: > >> Hi, >> >> On 04/24/2018 11:30 AM, Nicholas Piggin wrote: >>> On Tue, 24 Apr 2018 10:11:46 +0530 >>> Shilpasri G Bhat wrote: >>> >>>> gpstate_timer_handler() uses synchronous smp_call to set the pstate >>>> on the requested core. This causes the below hard lockup: >>>> >>>> [c000003fe566b320] [c0000000001d5340] smp_call_function_single+0x110/0x180 (unreliable) >>>> [c000003fe566b390] [c0000000001d55e0] smp_call_function_any+0x180/0x250 >>>> [c000003fe566b3f0] [c000000000acd3e8] gpstate_timer_handler+0x1e8/0x580 >>>> [c000003fe566b4a0] [c0000000001b46b0] call_timer_fn+0x50/0x1c0 >>>> [c000003fe566b520] [c0000000001b4958] expire_timers+0x138/0x1f0 >>>> [c000003fe566b590] [c0000000001b4bf8] run_timer_softirq+0x1e8/0x270 >>>> [c000003fe566b630] [c000000000d0d6c8] __do_softirq+0x158/0x3e4 >>>> [c000003fe566b710] [c000000000114be8] irq_exit+0xe8/0x120 >>>> [c000003fe566b730] [c000000000024d0c] timer_interrupt+0x9c/0xe0 >>>> [c000003fe566b760] [c000000000009014] decrementer_common+0x114/0x120 >>>> --- interrupt: 901 at doorbell_global_ipi+0x34/0x50 >>>> LR = arch_send_call_function_ipi_mask+0x120/0x130 >>>> [c000003fe566ba50] [c00000000004876c] arch_send_call_function_ipi_mask+0x4c/0x130 (unreliable) >>>> [c000003fe566ba90] [c0000000001d59f0] smp_call_function_many+0x340/0x450 >>>> [c000003fe566bb00] [c000000000075f18] pmdp_invalidate+0x98/0xe0 >>>> [c000003fe566bb30] [c0000000003a1120] change_huge_pmd+0xe0/0x270 >>>> [c000003fe566bba0] [c000000000349278] change_protection_range+0xb88/0xe40 >>>> [c000003fe566bcf0] [c0000000003496c0] mprotect_fixup+0x140/0x340 >>>> [c000003fe566bdb0] [c000000000349a74] SyS_mprotect+0x1b4/0x350 >>>> [c000003fe566be30] [c00000000000b184] system_call+0x58/0x6c >>>> >>>> Fix this by using the asynchronus smp_call in the timer interrupt handler. >>>> We don't have to wait in this handler until the pstates are changed on >>>> the core. This change will not have any impact on the global pstate >>>> ramp-down algorithm. >>>> >>>> Reported-by: Nicholas Piggin >>>> Reported-by: Pridhiviraj Paidipeddi >>>> Signed-off-by: Shilpasri G Bhat >>>> --- >>>> drivers/cpufreq/powernv-cpufreq.c | 2 +- >>>> 1 file changed, 1 insertion(+), 1 deletion(-) >>>> >>>> diff --git a/drivers/cpufreq/powernv-cpufreq.c b/drivers/cpufreq/powernv-cpufreq.c >>>> index 0591874..7e0c752 100644 >>>> --- a/drivers/cpufreq/powernv-cpufreq.c >>>> +++ b/drivers/cpufreq/powernv-cpufreq.c >>>> @@ -721,7 +721,7 @@ void gpstate_timer_handler(struct timer_list *t) >>>> spin_unlock(&gpstates->gpstate_lock); >>>> >>>> /* Timer may get migrated to a different cpu on cpu hot unplug */ >>>> - smp_call_function_any(policy->cpus, set_pstate, &freq_data, 1); >>>> + smp_call_function_any(policy->cpus, set_pstate, &freq_data, 0); >>>> } >>>> >>>> /* >>> >>> This can still deadlock because !wait case still ends up having to wait >>> if another !wait smp_call_function caller had previously used the >>> call single data for this cpu. >>> >>> If you go this way you would have to use smp_call_function_async, which >>> is more work. >>> >>> As a rule it would be better to avoid smp_call_function entirely if >>> possible. Can you ensure the timer is running on the right CPU? Use >>> add_timer_on and try again if the timer is on the wrong CPU, perhaps? >>> >> >> Yeah that is doable we can check for the cpu and re-queue it. We will only >> ramp-down slower in that case which is no harm. > > Great, I'd be much happier avoiding that IPI. I guess it should happen > quite rarely that we have to queue on a different CPU. I would say just > do add_timer unless we have migrated to the wrong CPU, then do add_timer_on > in that case (it's a bit slower). (The gpstates->timer is initialized with TIMER_PINNED and is a timer per cpufreq policy / or per core) We are currently using mod_timer() and this gets triggered in the code-path of the cpufreq's governor timer which is per-policy (i.e per core in our case). This ensures the timer is always fired on one of the policy->cpus as the deferred kworker is also scheduled on one of the policy->cpus. We were good until this patch 7bc54b652f13119f64e87dd96bb792efbfc5a786 where after we could leave a migrated timer and subsequent re-queues from the timer context on the wrong cpu. For this I agree we need a add_timer_on() to correct it. > >> (If the targeted core turns out to be offline then we will not queue the timer >> again as we would have already set the pstate to min in the cpu-down path.) > > Something I noticed is that if we can not get the lock (trylock fails), > then the timer does not get queued again. Should it? > Since the gpstates->timer is per-core I am assuming that it should not fail in the trylock. (which sounds like an unlikely case to me where we have two expiry on the same timer) > Thanks, > Nick >