Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2362149imm; Mon, 24 Sep 2018 03:06:22 -0700 (PDT) X-Google-Smtp-Source: ACcGV60Ja/kJIFDI1Dr4J6mNy7WdIEu7nxc6xw2Py1MD1p2CIv28oltzeiNakj5O6yTgnW0oquWt X-Received: by 2002:a17:902:7009:: with SMTP id y9-v6mr6198322plk.328.1537783582237; Mon, 24 Sep 2018 03:06:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537783582; cv=none; d=google.com; s=arc-20160816; b=0t9fCd44o5MyiwHYGOR/u0t/kyT4v0r5XxK5ov13Jr7nP8nG1PnxH7OkHFN9C52B6h 576/48sU9H82/j+lOHi+ZH6Fh1SVxlUM2Eo5VqpDkAV5KgSkg6KBUykRaJCPQC5gqcHa TKERqJzSrhy4u1sH7bsMDu2V9c3YEhb7Dr6hoz6Ju1nfG/caH1aR4gZswUXAYqP7nAON U8IWCNQA0rcYvuL8aFavMgT8TBL0qY0/pVObS8sNygSshrEGTaiSqk1PjXgdcSHdk6Fz uEVZsOiWKo1sbZtveV6DFW24Fde9yAd//7NA+JJwNY1bIe3zKGvs9IsDlk51ojWBWoHV WoiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=RpSa1aItyjKCyeyw3pCWcYSIf849Z/KFUWkElKrumPc=; b=RT8ysy+JEHWHajZvIgBwRBjhWPn+1lYexFJtx1IFb0qn+2YMi5ZF0v2IcI9BKAV7vq sMp1oftxViDFUS6QLu06blddOTICUbjvl5bG64omnK5OBr9vtur1jF+Qrt5EAWkAo/5m L3FmcuDDPjzPFu+ciNFtZ49ezmtmLeCCm8duElk09g1fyq51LEin/wqPEYBRO5BleTei s1KILuCepKZRZilIVz1tm+b1ZwyytqpnZ6uQf+DkqfcI4nvQLHSA2cElMETPPQ1xKima jdTN0xSNu3cumWDcTW9IfAqfyWQ1h0rlDxeGGsE0zDCnpFuN34Z6LsouX1801viAg15S zGeQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12-v6si2725142pgb.328.2018.09.24.03.06.07; Mon, 24 Sep 2018 03:06:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728521AbeIXP4L (ORCPT + 99 others); Mon, 24 Sep 2018 11:56:11 -0400 Received: from mga02.intel.com ([134.134.136.20]:35322 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725982AbeIXP4K (ORCPT ); Mon, 24 Sep 2018 11:56:10 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Sep 2018 02:54:55 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,297,1534834800"; d="scan'208";a="92711860" Received: from smile.fi.intel.com (HELO smile) ([10.237.72.86]) by fmsmga001.fm.intel.com with ESMTP; 24 Sep 2018 02:48:57 -0700 Received: from andy by smile with local (Exim 4.91) (envelope-from ) id 1g4NU7-0001bv-SZ; Mon, 24 Sep 2018 12:48:55 +0300 Date: Mon, 24 Sep 2018 12:48:55 +0300 From: Andy Shevchenko To: Hans de Goede Cc: Mika Westerberg , Jarkko Nikula , Wolfram Sang , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , linux-acpi@vger.kernel.org, linux-i2c@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/3] x86: baytrail/cherrytrail: Rework and move P-Unit PMIC bus semaphore code Message-ID: <20180924094855.GH15943@smile.fi.intel.com> References: <20180923144510.4564-1-hdegoede@redhat.com> <20180923144510.4564-2-hdegoede@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180923144510.4564-2-hdegoede@redhat.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Sep 23, 2018 at 04:45:08PM +0200, Hans de Goede wrote: > On some BYT/CHT systems the SoC's P-Unit shares the I2C bus with the > kernel. The P-Unit has a semaphore for the PMIC bus which we can take to > block it from accessing the shared bus while the kernel wants to access it. > > Currently we have the I2C-controller driver acquiring and releasing the > semaphore around each I2C transfer. There are 2 problems with this: > > 1) PMIC accesses often come in the form of a read-modify-write on one of > the PMIC registers, we currently release the P-Unit's PMIC bus semaphore > between the read and the write. If the P-Unit modifies the register during > this window?, then we end up overwriting the P-Unit's changes. > I believe that this is mostly an academic problem, but I'm not sure. > > 2) To safely access the shared I2C bus, we need to do 3 things: > a) Notify the GPU driver that we are starting a window in which it may not > access the P-Unit, since the P-Unit seems to ignore the semaphore for > explicit power-level requests made by the GPU driver > b) Make a pm_qos request to force all CPU cores out of C6/C7 since entering > C6/C7 while we hold the semaphore hangs the SoC > c) Finally take the P-Unit's PMIC bus semaphore > All 3 these steps together are somewhat expensive, so ideally if we have > a bunch of i2c transfers grouped together we only do this once for the > entire group. > > Taking the read-modify-write on a PMIC register as example then ideally we > would only do all 3 steps once at the beginning and undo all 3 steps once > at the end. > > For this we need to be able to take the semaphore from within e.g. the PMIC > opregion driver, yet we do not want to remove the taking of the semaphore > from the I2C-controller driver, as that is still necessary to protect many > other code-paths leading to accessing the shared I2C bus. > > This means that we first have the PMIC driver acquire the semaphore and > then have the I2C controller driver trying to acquire it again. > > To make this possible this commit does the following: > > 1) Move the semaphore code from being private to the I2C controller driver > into the generic iosf_mbi code, which already has other code to deal with > the shared bus so that it can be accessed outside of the I2C bus driver. > > 2) Rework the code so that it can be called multiple times nested, while > still blocking I2C accesses while e.g. the GPU driver has indicated the > P-Unit needs the bus through a iosf_mbi_punit_acquire() call. > > Signed-off-by: Hans de Goede > --- > Note this commit deliberately limits the i2c-designware changes to > only touch i2c-designware-baytrail.c, deliberately not doing some cleanups > which become possible after removing the semaphore code from the > i2c-designmware code. This is done so that this commit can be merged > through the x86 tree without causing conflicts in the i2c tree. > > The cleanups to the i2c-designware tree will be done in a follow up > patch which can be merged once this commit is in place. > +static void iosf_mbi_reset_semaphore(void) > +{ > + if (iosf_mbi_modify(BT_MBI_UNIT_PMC, MBI_REG_READ, > + iosf_mbi_sem_address, 0, PUNIT_SEMAPHORE_BIT)) > + dev_err(&mbi_pdev->dev, "Error punit semaphore reset failed\n"); > + > + pm_qos_update_request(&iosf_mbi_pm_qos, PM_QOS_DEFAULT_VALUE); > + > + blocking_notifier_call_chain(&iosf_mbi_pmic_bus_access_notifier, > + MBI_PMIC_BUS_ACCESS_END, NULL); > + mutex_unlock(&iosf_mbi_punit_mutex); Can we actually move this to the callers? To me sounds slightly more logical to see lock in *block*() call and unlock in *unblock*() respectively. > +} > +int iosf_mbi_block_punit_i2c_access(void) > +{ > + unsigned long start, end; > + int ret = 0; > + u32 sem; > + > + if (WARN_ON(!mbi_pdev || !iosf_mbi_sem_address)) > + return -ENXIO; > + > + mutex_lock(&iosf_mbi_block_punit_i2c_access_count_mutex); > + > + if (iosf_mbi_block_punit_i2c_access_count > 0) > + goto out; > + > + mutex_lock(&iosf_mbi_punit_mutex); > + blocking_notifier_call_chain(&iosf_mbi_pmic_bus_access_notifier, > + MBI_PMIC_BUS_ACCESS_BEGIN, NULL); > + > + /* > + * Disallow the CPU to enter C6 or C7 state, entering these states > + * requires the punit to talk to the pmic and if this happens while > + * we're holding the semaphore, the SoC hangs. > + */ > + pm_qos_update_request(&iosf_mbi_pm_qos, 0); > + > + /* host driver writes to side band semaphore register */ > + ret = iosf_mbi_write(BT_MBI_UNIT_PMC, MBI_REG_WRITE, > + iosf_mbi_sem_address, PUNIT_SEMAPHORE_ACQUIRE); > + if (ret) { > + dev_err(&mbi_pdev->dev, "Error punit semaphore request failed\n"); > + goto out; > + } > + > + /* host driver waits for bit 0 to be set in semaphore register */ > + start = jiffies; > + end = start + msecs_to_jiffies(SEMAPHORE_TIMEOUT); > + do { > + ret = iosf_mbi_get_sem(&sem); > + if (!ret && sem) { > + iosf_mbi_sem_acquired = jiffies; > + dev_dbg(&mbi_pdev->dev, "punit semaphore acquired after %ums\n", > + jiffies_to_msecs(jiffies - start)); > + goto out; /* Success, done. */ > + } > + > + usleep_range(1000, 2000); > + } while (time_before(jiffies, end)); > + > + ret = -ETIMEDOUT; > + dev_err(&mbi_pdev->dev, "Error punit semaphore timed out, resetting\n"); > + iosf_mbi_reset_semaphore(); > + > + if (!iosf_mbi_get_sem(&sem)) > + dev_err(&mbi_pdev->dev, "PUNIT SEM: %d\n", sem); > +out: > + if (!WARN_ON(ret)) > + iosf_mbi_block_punit_i2c_access_count++; > + > + mutex_unlock(&iosf_mbi_block_punit_i2c_access_count_mutex); > + > + return ret; > +} > +EXPORT_SYMBOL(iosf_mbi_block_punit_i2c_access); > + > +void iosf_mbi_unblock_punit_i2c_access(void) > +{ > + mutex_lock(&iosf_mbi_block_punit_i2c_access_count_mutex); > + > + iosf_mbi_block_punit_i2c_access_count--; > + if (iosf_mbi_block_punit_i2c_access_count == 0) { > + iosf_mbi_reset_semaphore(); > + dev_dbg(&mbi_pdev->dev, "punit semaphore held for %ums\n", > + jiffies_to_msecs(jiffies - iosf_mbi_sem_acquired)); > + } > + > + mutex_unlock(&iosf_mbi_block_punit_i2c_access_count_mutex); > +} > +EXPORT_SYMBOL(iosf_mbi_unblock_punit_i2c_access); > + { PCI_DEVICE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_BAYTRAIL), > + .driver_data = PUNIT_SEMAPHORE_BYT }, > + { PCI_DEVICE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_BRASWELL), > + .driver_data = PUNIT_SEMAPHORE_CHT }, > { PCI_DEVICE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_QUARK_X1000) }, > { PCI_DEVICE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_TANGIER) }, > { 0, }, Perhaps it can be converted to use PCI_DEVICE_DATA() macro. -- With Best Regards, Andy Shevchenko