Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4779187ybp; Mon, 7 Oct 2019 13:54:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqlhi5ZekFy3e65r5rEaQtR7Yg5wUcRl1hT6Q2Kro9m3uNWp66UCnajVKhaVn8vfV6xrWb X-Received: by 2002:a05:6402:13c2:: with SMTP id a2mr30350623edx.21.1570481690468; Mon, 07 Oct 2019 13:54:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570481690; cv=none; d=google.com; s=arc-20160816; b=Jc/+kSkOGzvoPmtBKO2otvr0jLGqEQ6wNL+Xkd1iY4/zL8YS0N0Elb7GsRbzOMAEt9 i7V6jJYih9dc/KUDhD7McTf5o7pmeN3/a1oAa1A+NyKjPFSKs5yeQeO2NG5F9Vw+GOx+ 9jRt2QNhtU3ZBnuQN2cwxhtTC2llF7XJ3NoWzZKN62uoqwxHYBa+7m4aeJiNEXm/wDPX cONrtS23ymaHOhDUoaG9FS0xLtxPRzn3TtCQXHquKaYMw5M6LcVsRIIZBZV2cuuuAb99 4cIR4/G4yVOL8E9uSAABqxRyaVzDHIDnxMYnt0vsJQIVnlZzADHUpQyQzde2SJ+BJyr7 ckHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6g6bAI8I8EYsK43cwBiTTXy4oB3NYybaiwTag+iFJPA=; b=wBoIjoBmgenyGOfZOTFpODygLlZ3xSo3XHZ2qQLdsYrIRUaKuQQahoyOq28lu4V+F1 ccUN2V054osYecifsehRximvVZ4/nOhl6mo3iradGBw6l0EPxJXNsxbR2eSMGH6IN3zm D0wKKtFRDBZLRGvIoFR9BumY3zIy0lSdlFK3wHsNqUTJzmu3Feygxvt/A8GFb/vdtyG9 88pOfyRGdJJw2BHud9J0lDQeqgTP+coVY6ezXRySPqMjE7/L2oFw1EA/n8gg72Vcejpr GSHWFHtvLOyjm0B9izeaO0CEXRyR83VCsOo2rjlp+FbGqIxzWC9T31hsYtaYR0Vwp/Re OgHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rC3YTB0+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ci21si7790773ejb.320.2019.10.07.13.54.26; Mon, 07 Oct 2019 13:54:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rC3YTB0+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729388AbfJGUv0 (ORCPT + 99 others); Mon, 7 Oct 2019 16:51:26 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:44039 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728364AbfJGUvZ (ORCPT ); Mon, 7 Oct 2019 16:51:25 -0400 Received: by mail-pf1-f193.google.com with SMTP id q21so9383832pfn.11 for ; Mon, 07 Oct 2019 13:51:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=6g6bAI8I8EYsK43cwBiTTXy4oB3NYybaiwTag+iFJPA=; b=rC3YTB0+hOcmaDXUspN39GIY0nApX+Rt/+I0TvKqqeA1Xaq9WCzVeeUHweQW7m6Pav VjVX19Qmr1nFoSTKu7/G6DQWha2WEgEh9X5NhuHzHKkws8lYbSCkIoU+t0BqIK7KBmpH 2+6UkWqL088G7ZOhAa5TGMmTTT0fyUdlaVFSiVJuBYLnKPYCcW0VfSzNdZa62BKIpJuB qIexWIG7LzL9jmw5euiECych+ZLh6dexPW2I/F09tthZ/k8q3QBZcPsD7+GUiXJsTfr7 x+74QhULu49un+22fuw0md1lVwbPHpRnJDYtVwgQFbqrXiVVhfXWf3NeOyUNTCGDScua NkJg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=6g6bAI8I8EYsK43cwBiTTXy4oB3NYybaiwTag+iFJPA=; b=Qgot7CxrtugZVRdu+kDGDBpxRwzl3imEHLfN6sZP/10uaObl3OhPozUtWOKK9Q0f8n UDb9bPuZxBQn4oVovCL1EdFX3OL+xsPTRGIQ9z5bRhI1Bn4j8GDdcXKN5j91Np8ZvRjX bqSz96P895SlfC5wzyaPNWJd/c2Dr3CpIEtR/MSMpl9ajHZiYal26YgK4vXWI1Xh1RYa wUOUPzgCTjL4hLw5Zwh3d3dO8M0od77hP487Tru8/ZB1A/hgWTymPSXUXPrX6CdXljJY nHqvRn7fTIdYF1+8veuEKOpy1EiNZx55FK1SkHoF0b3q+ExluFVl/S1cXsBc1EZ5XQCy 4UMQ== X-Gm-Message-State: APjAAAWkXDHN/edVqdrMDNuM8JKQ7bHUJVKPnZ6UuXGXjZIUao7XLlvN dpRzVrPnmbXXvwlI73Dyono= X-Received: by 2002:a63:60e:: with SMTP id 14mr5830612pgg.179.1570481484414; Mon, 07 Oct 2019 13:51:24 -0700 (PDT) Received: from localhost ([100.118.89.196]) by smtp.gmail.com with ESMTPSA id e192sm17789132pfh.83.2019.10.07.13.51.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 07 Oct 2019 13:51:23 -0700 (PDT) From: Rob Clark To: iommu@lists.linux-foundation.org Cc: freedreno@lists.freedesktop.org, Robin Murphy , Rob Clark , Will Deacon , Joerg Roedel , linux-arm-kernel@lists.infradead.org (moderated list:ARM SMMU DRIVERS), linux-kernel@vger.kernel.org (open list) Subject: [PATCH v2] iommu/arm-smmu: fix "hang" when games exit Date: Mon, 7 Oct 2019 13:49:06 -0700 Message-Id: <20191007204906.19571-1-robdclark@gmail.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <418d8426-f299-1269-2b2e-f86677cf22c2@arm.com> References: <418d8426-f299-1269-2b2e-f86677cf22c2@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Rob Clark When games, browser, or anything using a lot of GPU buffers exits, there can be many hundreds or thousands of buffers to unmap and free. If the GPU is otherwise suspended, this can cause arm-smmu to resume/suspend for each buffer, resulting 5-10 seconds worth of reprogramming the context bank (arm_smmu_write_context_bank()/arm_smmu_write_s2cr()/etc). To the user it would appear that the system just locked up. A simple solution is to use pm_runtime_put_autosuspend() instead, so we don't immediately suspend the SMMU device. Signed-off-by: Rob Clark --- v1: original v2: unconditionally use autosuspend, rather than deciding based on what consumer does drivers/iommu/arm-smmu.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c index 3f1d55fb43c4..b7b41f5001bc 100644 --- a/drivers/iommu/arm-smmu.c +++ b/drivers/iommu/arm-smmu.c @@ -289,7 +289,7 @@ static inline int arm_smmu_rpm_get(struct arm_smmu_device *smmu) static inline void arm_smmu_rpm_put(struct arm_smmu_device *smmu) { if (pm_runtime_enabled(smmu->dev)) - pm_runtime_put(smmu->dev); + pm_runtime_put_autosuspend(smmu->dev); } static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom) @@ -1445,6 +1445,9 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) /* Looks ok, so add the device to the domain */ ret = arm_smmu_domain_add_master(smmu_domain, fwspec); + pm_runtime_set_autosuspend_delay(smmu->dev, 20); + pm_runtime_use_autosuspend(smmu->dev); + rpm_put: arm_smmu_rpm_put(smmu); return ret; -- 2.21.0