Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1090190imm; Wed, 25 Jul 2018 11:18:10 -0700 (PDT) X-Google-Smtp-Source: AAOMgpelw4G/GAkbDPzKvs66z/RPD2fvGwJMNgZw8jGWpZIhdZEV1O1hFySMNOFLqw0SMY4bJnI7 X-Received: by 2002:a17:902:8482:: with SMTP id c2-v6mr22198759plo.45.1532542690737; Wed, 25 Jul 2018 11:18:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532542690; cv=none; d=google.com; s=arc-20160816; b=awxdNzq0Esyf/iPbHt1zhFW0PWH9Dj8KEP9ly8GIt1SFdLmOqQzQPxFmGgHfeDXfba 7F18FPWK5F6Rdo0zRjcTUJi9xtmjtHxIEL9CPp87GgKofwjqFr2zS7KhnBqCKlWJ1Wef NPrv3ghSt8JYwxWv3ZWrJrRNKuinvGYIy3Dxt6EcACyfwr1vwBWphSigpW40+EO2Vo06 F4XcMrIdHLCPgzRgwY5bFJedCH4R9oAEtiCghHSBUUKjjCOphFyRKdGdYqsSaVM4R+YZ hnl+KJfUX1ywO65o7eLEJ+fqwEWheaaY3wRtVZnmaSEVOrXsKzH+5q+Dch3agf20FTqQ Lj+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dmarc-filter:dkim-signature :dkim-signature:arc-authentication-results; bh=oZoVxjvSRBGzd/oEeRKOALpgJf6jXnxtOFEpghepjO8=; b=vUpzXOXu67tL5OSvKJXqarwPRqU+3mmFIIaj9QnzYrIZsIIxhG8tv+UM8rzdJqqDyN sh5oXsOxcAS8u3PG+fvyaejCdHMUnnbQ61eWeveRqlhCv4MrlWwAJpZJAAkq5T4n+C6R LxeMb22IebFeC/jKU3zUPqOw+sdcoGndjkW0wCN4BKuBzCoW2MiWMLlM4Ez+S9tf6aF2 JhvHumkzUP5rpe7CE985D5iXuoUZhZ5JbYTG/Fazmb88tT6VKB7HHsPsEUDCILdKpNDG njuyU0K8JxSUBzqDhK3xvQSTYuEWmhBkxpNSb7Q9cRFEegVH0LXYatRyck40RzxV+W/1 CgUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=gN7SykkS; dkim=pass header.i=@codeaurora.org header.s=default header.b=TA7KygyI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x185-v6si14749270pfb.306.2018.07.25.11.17.55; Wed, 25 Jul 2018 11:18:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=gN7SykkS; dkim=pass header.i=@codeaurora.org header.s=default header.b=TA7KygyI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730509AbeGYT3u (ORCPT + 99 others); Wed, 25 Jul 2018 15:29:50 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:46148 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729524AbeGYT3t (ORCPT ); Wed, 25 Jul 2018 15:29:49 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 30D9B60B7B; Wed, 25 Jul 2018 18:16:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1532542619; bh=b6KxNQV2CmhG2A9+enxuWVuB+DoTGGXgUP34UCrsEcw=; h=In-Reply-To:References:From:Date:Subject:To:Cc:From; b=gN7SykkSw0RswnOBjlLtcA3bc5dMU0TDXSkH6eLfuZLd13lFF82p1YT4mBWyQwm2D pNSjOMtNh/R9gfD+ek0QTXjesFAF/vAKh+K/IdxvLXTTSMO97cYJDni8TloWCpCpAd Rx9/TUuXo/QXEl/pBsmiltOOu3nXulwxnLAkUMh0= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from mail-qt0-f173.google.com (mail-qt0-f173.google.com [209.85.216.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: vivek.gautam@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id B44BE6074D; Wed, 25 Jul 2018 18:16:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1532542617; bh=b6KxNQV2CmhG2A9+enxuWVuB+DoTGGXgUP34UCrsEcw=; h=In-Reply-To:References:From:Date:Subject:To:Cc:From; b=TA7KygyI6N6xMopOlwaXAobXlGZ3tSelMpblt8/pP2GE+MraExjtmGzth3c91bqVJ oj5UIwvLkTPdRxiteBDJcS8WTnxSGT3da19gpXn1VhxapWSrQ0ziD5DE9Xi3dwhNUf 8JY9vgTTEMt3iqL2l1WIlbNuh+aMM+GnaVZ8ETsw= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org B44BE6074D Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=vivek.gautam@codeaurora.org Received: by mail-qt0-f173.google.com with SMTP id y19-v6so8583282qto.5; Wed, 25 Jul 2018 11:16:57 -0700 (PDT) X-Gm-Message-State: AOUpUlGl7Xw9elYZOMAwKfxWZKcCeYSyb0kgEdBbdX75V1ycR2QW1kDu BXvYc2ZwVrRzSdt7AEl09eI472LKDr30oCvQEL4= X-Received: by 2002:ac8:720f:: with SMTP id a15-v6mr20794215qtp.243.1532542616986; Wed, 25 Jul 2018 11:16:56 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:ac8:f25:0:0:0:0:0 with HTTP; Wed, 25 Jul 2018 11:16:56 -0700 (PDT) In-Reply-To: References: <20180719101539.6104-1-vivek.gautam@codeaurora.org> <20180719101539.6104-2-vivek.gautam@codeaurora.org> From: Vivek Gautam Date: Wed, 25 Jul 2018 23:46:56 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v13 1/4] iommu/arm-smmu: Add pm_runtime/sleep ops To: Robin Murphy Cc: Joerg Roedel , "robh+dt" , "Rafael J. Wysocki" , Will Deacon , "list@263.net:IOMMU DRIVERS , Joerg Roedel ," , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , open list , Mark Rutland , Linux PM , sboyd@kernel.org, Lukas Wunner , linux-arm-msm , freedreno Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 24, 2018 at 8:51 PM, Robin Murphy wrote: > On 19/07/18 11:15, Vivek Gautam wrote: >> >> From: Sricharan R >> >> The smmu needs to be functional only when the respective >> master's using it are active. The device_link feature >> helps to track such functional dependencies, so that the >> iommu gets powered when the master device enables itself >> using pm_runtime. So by adapting the smmu driver for >> runtime pm, above said dependency can be addressed. >> >> This patch adds the pm runtime/sleep callbacks to the >> driver and also the functions to parse the smmu clocks >> from DT and enable them in resume/suspend. >> >> Also, while we enable the runtime pm add a pm sleep suspend >> callback that pushes devices to low power state by turning >> the clocks off in a system sleep. >> Also add corresponding clock enable path in resume callback. >> >> Signed-off-by: Sricharan R >> Signed-off-by: Archit Taneja >> [vivek: rework for clock and pm ops] >> Signed-off-by: Vivek Gautam >> Reviewed-by: Tomasz Figa >> --- >> >> Changes since v12: >> - Added pm sleep .suspend callback. This disables the clocks. >> - Added corresponding change to enable clocks in .resume >> pm sleep callback. >> >> drivers/iommu/arm-smmu.c | 75 >> ++++++++++++++++++++++++++++++++++++++++++++++-- >> 1 file changed, 73 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c >> index c73cfce1ccc0..9138a6fffe04 100644 >> --- a/drivers/iommu/arm-smmu.c >> +++ b/drivers/iommu/arm-smmu.c >> @@ -48,6 +48,7 @@ >> #include >> #include >> #include >> +#include >> #include >> #include >> @@ -205,6 +206,8 @@ struct arm_smmu_device { >> u32 num_global_irqs; >> u32 num_context_irqs; >> unsigned int *irqs; >> + struct clk_bulk_data *clks; >> + int num_clks; >> u32 cavium_id_base; /* Specific to >> Cavium */ >> @@ -1897,10 +1900,12 @@ static int arm_smmu_device_cfg_probe(struct >> arm_smmu_device *smmu) >> struct arm_smmu_match_data { >> enum arm_smmu_arch_version version; >> enum arm_smmu_implementation model; >> + const char * const *clks; >> + int num_clks; >> }; >> #define ARM_SMMU_MATCH_DATA(name, ver, imp) \ >> -static struct arm_smmu_match_data name = { .version = ver, .model = imp } >> +static const struct arm_smmu_match_data name = { .version = ver, .model = >> imp } >> ARM_SMMU_MATCH_DATA(smmu_generic_v1, ARM_SMMU_V1, GENERIC_SMMU); >> ARM_SMMU_MATCH_DATA(smmu_generic_v2, ARM_SMMU_V2, GENERIC_SMMU); >> @@ -1919,6 +1924,23 @@ static const struct of_device_id >> arm_smmu_of_match[] = { >> }; >> MODULE_DEVICE_TABLE(of, arm_smmu_of_match); >> +static void arm_smmu_fill_clk_data(struct arm_smmu_device *smmu, >> + const char * const *clks) >> +{ >> + int i; >> + >> + if (smmu->num_clks < 1) >> + return; >> + >> + smmu->clks = devm_kcalloc(smmu->dev, smmu->num_clks, >> + sizeof(*smmu->clks), GFP_KERNEL); >> + if (!smmu->clks) >> + return; >> + >> + for (i = 0; i < smmu->num_clks; i++) >> + smmu->clks[i].id = clks[i]; >> +} >> + >> #ifdef CONFIG_ACPI >> static int acpi_smmu_get_data(u32 model, struct arm_smmu_device *smmu) >> { >> @@ -2001,6 +2023,9 @@ static int arm_smmu_device_dt_probe(struct >> platform_device *pdev, >> data = of_device_get_match_data(dev); >> smmu->version = data->version; >> smmu->model = data->model; >> + smmu->num_clks = data->num_clks; >> + >> + arm_smmu_fill_clk_data(smmu, data->clks); >> parse_driver_options(smmu); >> @@ -2099,6 +2124,14 @@ static int arm_smmu_device_probe(struct >> platform_device *pdev) >> smmu->irqs[i] = irq; >> } >> + err = devm_clk_bulk_get(smmu->dev, smmu->num_clks, smmu->clks); >> + if (err) >> + return err; >> + >> + err = clk_bulk_prepare(smmu->num_clks, smmu->clks); >> + if (err) >> + return err; >> + >> err = arm_smmu_device_cfg_probe(smmu); >> if (err) >> return err; >> @@ -2181,6 +2214,9 @@ static int arm_smmu_device_remove(struct >> platform_device *pdev) >> /* Turn the thing off */ >> writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0); >> + >> + clk_bulk_unprepare(smmu->num_clks, smmu->clks); >> + >> return 0; >> } >> @@ -2189,15 +2225,50 @@ static void arm_smmu_device_shutdown(struct >> platform_device *pdev) >> arm_smmu_device_remove(pdev); >> } >> +static int __maybe_unused arm_smmu_runtime_resume(struct device *dev) >> +{ >> + struct arm_smmu_device *smmu = dev_get_drvdata(dev); >> + >> + return clk_bulk_enable(smmu->num_clks, smmu->clks); > > > If there's a power domain being automatically switched by genpd then we need > a reset here because we may have lost state entirely. Since I remembered the > otherwise-useless GPU SMMU on Juno is in a separate power domain, I gave it > a poking via sysfs with some debug stuff to dump sCR0 in these callbacks, > and the problem is clear: > > ... > [ 4.625551] arm-smmu 2b400000.iommu: genpd_runtime_suspend() > [ 4.631163] arm-smmu 2b400000.iommu: arm_smmu_runtime_suspend: 0x00201936 > [ 4.637897] arm-smmu 2b400000.iommu: suspend latency exceeded, 6733980 ns > [ 21.566983] arm-smmu 2b400000.iommu: genpd_runtime_resume() > [ 21.584796] arm-smmu 2b400000.iommu: arm_smmu_runtime_resume: 0x00220101 > [ 21.591452] arm-smmu 2b400000.iommu: resume latency exceeded, 6658020 ns > ... Qualcomm SoCs have retention enabled for SMMU registers so they don't lose state. ... [ 256.013367] arm-smmu b40000.arm,smmu: arm_smmu_runtime_suspend SCR0 = 0x201e36 [ 256.013367] [ 256.019160] arm-smmu b40000.arm,smmu: arm_smmu_runtime_resume SCR0 = 0x201e36 [ 256.019160] [ 256.027368] arm-smmu b40000.arm,smmu: arm_smmu_runtime_suspend SCR0 = 0x201e36 [ 256.027368] [ 256.036786] arm-smmu b40000.arm,smmu: arm_smmu_runtime_resume SCR0 = 0x201e36 ... However after adding arm_smmu_device_reset() in runtime_resume() I observe some performance degradation when kill an instance of 'kmscube' and start it again. The launch time with arm_smmu_device_reset() in runtime_resume() change is more. Could this be because of frequent TLB invalidation and sync? Best regards Vivek > >> +} >> + >> +static int __maybe_unused arm_smmu_runtime_suspend(struct device *dev) >> +{ >> + struct arm_smmu_device *smmu = dev_get_drvdata(dev); >> + >> + clk_bulk_disable(smmu->num_clks, smmu->clks); >> + >> + return 0; >> +} >> + >> static int __maybe_unused arm_smmu_pm_resume(struct device *dev) >> { >> struct arm_smmu_device *smmu = dev_get_drvdata(dev); >> + int ret; >> + >> + if (!pm_runtime_suspended(dev)) { >> + ret = arm_smmu_runtime_resume(dev); >> + if (ret) >> + return ret; >> + } >> arm_smmu_device_reset(smmu); > > > This looks a bit off too - if we wake from sleep when the SMMU was also > runtime-suspended, it appears we might end up trying to restore the register > state without clocks enabled. Surely we need to always enable clocks for the > reset, then restore the previous suspended state? Although given my previous > point, it's probably not worth doing anything at all here for that case. > > Robin. > >> return 0; >> } >> -static SIMPLE_DEV_PM_OPS(arm_smmu_pm_ops, NULL, arm_smmu_pm_resume); >> +static int __maybe_unused arm_smmu_pm_suspend(struct device *dev) >> +{ >> + if (!pm_runtime_suspended(dev)) >> + return arm_smmu_runtime_suspend(dev); >> + >> + return 0; >> +} >> + >> +static const struct dev_pm_ops arm_smmu_pm_ops = { >> + SET_SYSTEM_SLEEP_PM_OPS(arm_smmu_pm_suspend, arm_smmu_pm_resume) >> + SET_RUNTIME_PM_OPS(arm_smmu_runtime_suspend, >> + arm_smmu_runtime_resume, NULL) >> +}; >> static struct platform_driver arm_smmu_driver = { >> .driver = { >> > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation