Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp848530yba; Wed, 24 Apr 2019 10:34:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqwFxI39K6kYqJ/zFLfr1eDO3+OpFM2VZJtvMkTUAV6yLd23VsUcC34KG5hqzH1Y8cZ49t7D X-Received: by 2002:a63:cd50:: with SMTP id a16mr13082333pgj.394.1556127258473; Wed, 24 Apr 2019 10:34:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556127258; cv=none; d=google.com; s=arc-20160816; b=0Jds+QUuGldZ+CgeHebmoZH54aloOCoROC4W8WOCgNhcFAlKQn8fEjrhB4SYkc+j// 7yeZ6MNMnfgzXNg1y/qLuzTXf4agJ/A2hFHE7wLs1yFzKRhqVKS09+yIgKUR72PuikZZ cW6IzNuqCrvFxfGq6AfeJFTgGXI7MjnDwti561aGnZcbMsbj0Ve2EZ+phJe5H+I5YJby EIYr6XApJu+1ZUDAGytSLH41qMyZ5P1dCVuld3+Cf7+o+dphyMwG/y0eELE71BWaibf2 RJo3x9I4RA5CLYw36EVnlgRmTO/nMFncPo2GpWJACRspNtDobO5O+5v5GcaA29cgZ7wa LNcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W4PZI5uDg+zTO55IXjzBJdGkpt/CoDe1SUM6KLJGHaU=; b=neNOozZwiLcQcf8fdOaW4a/jj2FUXHqlXPjO6yWwoUQeLXxnTSG85/CGlyhbNBlCgA +/T0iT5P8ug7EDmbq0nyWqH4UzbT+qC9TWi91n+QkLCdqop8AewHQrTts8qbA6jIncxN oirm3WAQp3Nyzs9pGiIOj7vpepn0O15iu+XKlKyN+RY8r0r57hdjBFY9XYiV2ZNFV59m NDL9b8asvEOXUhI5QngydluzrvZ5U4EIERoGjqHOvvFthBgcomcO94Gs4zgL9noAmLpY r+SYbMY4YOx9USludlvQ9dsnqGhhKS516mukhyItZ+XYF2sdT2aX9ecgglvHzCq/HZ11 rBgA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TjErBdDi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6si13046703pgv.458.2019.04.24.10.34.02; Wed, 24 Apr 2019 10:34:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TjErBdDi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390981AbfDXRcb (ORCPT + 99 others); Wed, 24 Apr 2019 13:32:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:59122 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391338AbfDXRc2 (ORCPT ); Wed, 24 Apr 2019 13:32:28 -0400 Received: from localhost (62-193-50-229.as16211.net [62.193.50.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 46EDF2054F; Wed, 24 Apr 2019 17:32:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556127147; bh=wgJNo1HLswB0+jUZQAbDWhAm72emEwoJnxKZva+VcYM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TjErBdDidwUNFNkG1v3F0jtJk/vXIa//lFqZkZL9Eui+/T+Z8KWtrXffe5VLVkoVY OVDnZo4LddMB5u+PA/GBe3p7eYpHeYwsXWVn+qSv4FPJcmkjlgZhC9zouCNO138TWy SwbaYCUY1YfSg5mQOnnZAU3n43WdzbXCd55NAYHk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Erwin Tsaur , Toshi Kani , Dan Williams , Sasha Levin Subject: [PATCH 4.19 79/96] nfit/ars: Allow root to busy-poll the ARS state machine Date: Wed, 24 Apr 2019 19:10:24 +0200 Message-Id: <20190424170925.157614402@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190424170919.829037226@linuxfoundation.org> References: <20190424170919.829037226@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org commit 5479b2757f26fe9908fc341d105b2097fe820b6f upstream. The ARS implementation implements exponential back-off on the poll interval to prevent high-frequency access to the DIMM / platform interface. Depending on when the ARS completes the poll interval may exceed the completion event by minutes. Allow root to reset the timeout each time it probes the status. A one-second timeout is still enforced, but root can otherwise can control the poll interval. Fixes: bc6ba8085842 ("nfit, address-range-scrub: rework and simplify ARS...") Cc: Reported-by: Erwin Tsaur Reviewed-by: Toshi Kani Signed-off-by: Dan Williams Signed-off-by: Sasha Levin --- drivers/acpi/nfit/core.c | 8 ++++++++ drivers/acpi/nfit/nfit.h | 1 + 2 files changed, 9 insertions(+) diff --git a/drivers/acpi/nfit/core.c b/drivers/acpi/nfit/core.c index 6b5a3c3b4458..4b489d14a680 100644 --- a/drivers/acpi/nfit/core.c +++ b/drivers/acpi/nfit/core.c @@ -1314,6 +1314,13 @@ static ssize_t scrub_show(struct device *dev, busy = test_bit(ARS_BUSY, &acpi_desc->scrub_flags) && !test_bit(ARS_CANCEL, &acpi_desc->scrub_flags); rc = sprintf(buf, "%d%s", acpi_desc->scrub_count, busy ? "+\n" : "\n"); + /* Allow an admin to poll the busy state at a higher rate */ + if (busy && capable(CAP_SYS_RAWIO) && !test_and_set_bit(ARS_POLL, + &acpi_desc->scrub_flags)) { + acpi_desc->scrub_tmo = 1; + mod_delayed_work(nfit_wq, &acpi_desc->dwork, HZ); + } + mutex_unlock(&acpi_desc->init_mutex); device_unlock(dev); return rc; @@ -3075,6 +3082,7 @@ static void acpi_nfit_scrub(struct work_struct *work) else notify_ars_done(acpi_desc); memset(acpi_desc->ars_status, 0, acpi_desc->max_ars); + clear_bit(ARS_POLL, &acpi_desc->scrub_flags); mutex_unlock(&acpi_desc->init_mutex); } diff --git a/drivers/acpi/nfit/nfit.h b/drivers/acpi/nfit/nfit.h index 94710e579598..b5fd3522abc7 100644 --- a/drivers/acpi/nfit/nfit.h +++ b/drivers/acpi/nfit/nfit.h @@ -184,6 +184,7 @@ struct nfit_mem { enum scrub_flags { ARS_BUSY, ARS_CANCEL, + ARS_POLL, }; struct acpi_nfit_desc { -- 2.19.1