Received: by 10.192.165.148 with SMTP id m20csp1193606imm; Fri, 27 Apr 2018 14:33:30 -0700 (PDT) X-Google-Smtp-Source: AB8JxZow0f6LuA11eK89z+n67oFswoPUgzqxOUtjaqp9ID+9KdjEqjfa/JVdpoCfszwe5hV+/dAV X-Received: by 2002:a17:902:33a5:: with SMTP id b34-v6mr3715243plc.232.1524864810685; Fri, 27 Apr 2018 14:33:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524864810; cv=none; d=google.com; s=arc-20160816; b=g4KZS64oI8t2TQ4E9g9HEImBrtsTvAfhs2NZnnsaXVBhdBm6Z1bukeY9/YqkRxcWZq Ixx1DtFnOv4AKvh4GIu42TOSe7D/stFev0l13dUG3/e/pJVVWw45kmWK3PjJXdDwQ6Lj l83Hpmaf+PZr5ipLq+tqZ0JfjLEkE6Wq6X7WtEso0Wv++Kyej3xhYeucDfWxfxscEXsY ZejC4CmejXTB8b//rLwPneq0Wh9KqHvrDpxTmTXdaPDnbYUs+GtYO1n+FUeKjrBspgGB PbUomTxuhVPZY+sfe0iZ1WgHpXjKGgtJ44Qx2m4iL1/L4KRCiaSuTcXDka+7hrGb/ow/ ZRQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:dkim-signature:dkim-signature :arc-authentication-results; bh=cnzzuL6jWHvk6v/B0a62pRps9rPifCFr3jKXGfnLdXo=; b=h+3Kd5JX3egdFZcHYr64B3cNUy9vhqjV0uTc5R5lyFqeFMFPTIZwwiQDvc4nAvJK93 TPOYll5GXoqcdKOGi5DcYiLTucg6yJu3X2RsT3Myu+oRhYdQjg/xT4LcpbcdMjcIcM6b FpIhgCc8bgN/QzNlV/d9Vx2FxGs3kNlKV74h7/gL3Vff97XP8yUoobSvhwVAU9SGDURO g3A+DQUha95H0GpvFOnc9MIYaqYs16eDtSFgd7p9wqmIxyVbJ0a1GwwA3vgo/H64RjYl ELzQnslinzo3//OcJLMXD06mVUSP8gdJGlsHk/mYRxMB9SbY4w7kc+V6Zbb8FsTVmkjK 0PHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=NQSq9J1U; dkim=pass header.i=@codeaurora.org header.s=default header.b=O3ji9oFS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k14-v6si1863972pgt.27.2018.04.27.14.33.16; Fri, 27 Apr 2018 14:33:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=NQSq9J1U; dkim=pass header.i=@codeaurora.org header.s=default header.b=O3ji9oFS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759320AbeD0VcF (ORCPT + 99 others); Fri, 27 Apr 2018 17:32:05 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:42342 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759215AbeD0VcD (ORCPT ); Fri, 27 Apr 2018 17:32:03 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 3EA8E607DD; Fri, 27 Apr 2018 21:32:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1524864723; bh=1lLSdQQAUKO7OnB+2Og6UeVy8fMkALJcmmJ4KTgbdak=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=NQSq9J1U0vwsoIUj1tyoZ3fsU2mWcJN3shszFCAEj5Jtwh1vWjPXlFWc+xVFWMLdF +IQOXDivZNmU9k6xjcpp0JWLnDiQLUJn5WkzEa47epUEFMAXG44kj5QPBvYCrvrtaG kDJrjOCotxl9BPvHNRYd87igPPQyFX9V0uQDSB3M= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from localhost (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: ilina@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id F3E9D600C9; Fri, 27 Apr 2018 21:32:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1524864722; bh=1lLSdQQAUKO7OnB+2Og6UeVy8fMkALJcmmJ4KTgbdak=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=O3ji9oFSdCZomk/NbsdJSFbp1cmO25sg45oARYAN89Z92LZYX7vET5UNH54CtXRb1 J4mOWL5wragh+YKuQuxxgzcC9hSvCGk2YJqtPBehBuDjMj2C4gVEy34+++CdzxOvXq gC12vjQskGbG+zbhkNPwarlumvtG7gy3W2UVz0aM= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org F3E9D600C9 Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=ilina@codeaurora.org Date: Fri, 27 Apr 2018 15:32:01 -0600 From: Lina Iyer To: Matthias Kaehlcke Cc: andy.gross@linaro.org, david.brown@linaro.org, linux-arm-msm@vger.kernel.org, linux-soc@vger.kernel.org, rnayak@codeaurora.org, bjorn.andersson@linaro.org, linux-kernel@vger.kernel.org, sboyd@kernel.org, evgreen@chromium.org, dianders@chromium.org Subject: Re: [PATCH v6 05/10] drivers: qcom: rpmh-rsc: write sleep/wake requests to TCS Message-ID: <20180427213201.GA23157@codeaurora.org> References: <20180419221635.17849-1-ilina@codeaurora.org> <20180419221635.17849-6-ilina@codeaurora.org> <20180425214111.GC243180@google.com> <20180427173943.GD6380@codeaurora.org> <20180427184017.GI243180@google.com> <20180427194559.GE6380@codeaurora.org> <20180427200605.GJ243180@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20180427200605.GJ243180@google.com> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 27 2018 at 14:06 -0600, Matthias Kaehlcke wrote: >On Fri, Apr 27, 2018 at 01:45:59PM -0600, Lina Iyer wrote: >> On Fri, Apr 27 2018 at 12:40 -0600, Matthias Kaehlcke wrote: >> > On Fri, Apr 27, 2018 at 11:39:43AM -0600, Lina Iyer wrote: >> > > On Wed, Apr 25 2018 at 15:41 -0600, Matthias Kaehlcke wrote: >> > > > On Thu, Apr 19, 2018 at 04:16:30PM -0600, Lina Iyer wrote: >> > > > > Sleep and wake requests are sent when the application processor >> > > > > subsystem of the SoC is entering deep sleep states like in suspend. >> > > > > These requests help lower the system power requirements when the >> > > > > resources are not in use. >> > > > > >> > > > > Sleep and wake requests are written to the TCS slots but are not >> > > > > triggered at the time of writing. The TCS are triggered by the firmware >> > > > > after the last of the CPUs has executed its WFI. Since these requests >> > > > > may come in different batches of requests, it is the job of this >> > > > > controller driver to find and arrange the requests into the available >> > > > > TCSes. >> > > > > >> > > > > Signed-off-by: Lina Iyer >> > > > > Reviewed-by: Evan Green >> > > > > --- >> > > > > drivers/soc/qcom/rpmh-internal.h | 8 +++ >> > > > > drivers/soc/qcom/rpmh-rsc.c | 120 +++++++++++++++++++++++++++++++ >> > > > > 2 files changed, 128 insertions(+) >> > > > > >> > > > > diff --git a/drivers/soc/qcom/rpmh-internal.h b/drivers/soc/qcom/rpmh-internal.h >> > > > > index d9a21726e568..6e19fe458c31 100644 >> > > > > --- a/drivers/soc/qcom/rpmh-internal.h >> > > > > +++ b/drivers/soc/qcom/rpmh-internal.h >> > > > >> > > > >> > > > >> > > > > +static int find_match(const struct tcs_group *tcs, const struct tcs_cmd *cmd, >> > > > > + int len) >> > > > > +{ >> > > > > + int i, j; >> > > > > + >> > > > > + /* Check for already cached commands */ >> > > > > + for_each_set_bit(i, tcs->slots, MAX_TCS_SLOTS) { >> > > > > + for (j = 0; j < len; j++) { >> > > > > + if (tcs->cmd_cache[i] != cmd[0].addr) { >> > > > >> > > > Shouldn't the condition be 'tcs->cmd_cache[i + j] != cmd[j].addr'? >> > > > >> > > Here, we are trying to find the first address from the request and its >> > > position 'i' in the cmd_cache. >> > > >> > > > Otherwise the code below the following if branch will never be >> > > > executed. Either the 'tcs->cmd_cache[i] != cmd[0].addr' branch isn't >> > > > entered because the addresses match, or the addresses don't match >> > > > and the inner loop is aborted after the first iteration. >> > > > >> > > > > + if (j == 0) >> > > > > + break; >> > > > > + WARN(tcs->cmd_cache[i + j] != cmd[j].addr, >> > > > > + "Message does not match previous sequence.\n"); >> > > We now check for the sequence using the iterator 'j' only after we have >> > > found 'i' (the beginning of our request). >> > > >> > > I hope that helps clear the concern. >> > >> > It doesn't, maybe I'm just confused, the driver has a certain >> > complexity and I don't claim to have a comprehensive understanding :) >> > >> > If I understand correctly find_match() is used to find a sequence of >> > commands of length 'len' in the command cache. If that is correct I >> > would expect it to do the following: >> > >> > 1. iterate through the commands in the command cache and find a >> > command that matches the first command in the sequence >> > >> > 2. verify that the (len - 1) subsequent commands match those in the >> > sequence, otherwise bail out >> > >> > If I'm not mistaken the current version of find_match() only checks >> > that the first command exists. After that it happily increases the >> > command index, but doesn't perform any checks (after finding the first >> > command 'tcs->cmd_cache[i] != cmd[0].addr' remains false for the >> > subsequent values of j). When j reaches (len - 1) the function >> > returns the index of the first command in the cache, regardless of >> > whether the other commands match or not. >> > >> Did you miss the check inside the WARN? >> WARN(tcs->cmd_cache[i + j] != cmd[j].addr, > >My point is that this code is never reached, also regardless of the >condition, the branch would always return -EINVAL. > >for (j = 0; j < len; j++) { > if (tcs->cmd_cache[i] != cmd[0].addr) { > if (j == 0) > break; > WARN(tcs->cmd_cache[i + j] != cmd[j].addr, > "Message does not match previous sequence.\n"); > return -EINVAL; > } else if (j == len - 1) { > return i; > } >} > >Let's single step through this, assuming the sequence of len=3 is in >the cache: > >1. j=0 >2. (tcs->cmd_cache[i] != cmd[0].addr): false > => branch with WARN + EINVAL not executed (good, this is the first > command we are looking for) >3. (j == len - 1): false > >4. j=1 >5. (tcs->cmd_cache[i] != cmd[0].addr): false > => branch with WARN + EINVAL not executed >6. (j == len - 1): false > >7. j=2 >8. (tcs->cmd_cache[i] != cmd[0].addr): false > => branch with WARN + EINVAL not executed >9. (j == len - 1): true > => return i > >Am I getting something wrong here? The for_each_set_bit() should increment the 'i' and we would attempt to compare the first address in the request with the next command in the TCS cache. If they don't match we repeat the process again. If it does, then we loop through 'j' to find if the sequence matches. Did I miss something? -- Lina