Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp814369ybh; Thu, 12 Mar 2020 11:36:08 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvFWOi6PtdD9+ye+98cf1IM9YKDJ+3sHaRxEJP5D17tFNRUEiFFEQngQo0GgRJVGwstox/w X-Received: by 2002:a9d:4d85:: with SMTP id u5mr7814925otk.128.1584038168758; Thu, 12 Mar 2020 11:36:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584038168; cv=none; d=google.com; s=arc-20160816; b=oUBcgs9XHFARhVamDLMdxzPhxfNjdTAGoOb+AZ3jmrhgKwiqqlNb5YxCxu9b9CtQDp Wrux0RcyaecKhLaaNPIso2dojsyi1DXL4jkb26GKHJR903dFwUlmXTBBG+CWMAKsTU5X l3wrjWsLzdVgRdQ5SfiCiVg605hVgYHwCHnfQP/JX0081CsUgh7rqJpukLEFn725L/GH m99zpME018QdMrK9X0OxcBfJy+y90eiR4v/7x9+AVSpAlAjCWdEb5raHncMJYBqKLpRG wUuZqL3+JDlGwYmjIVb753VdL0GBSexc82IaAJBbXe3nny/uUCqg8WmJ2nK36M06QJD/ VtUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=Czh/DBTkEFWeibR6/Thv7qps/IJUh7iyxJs4SRCMA6c=; b=V38wjcbytpaqug94xLcFERT7YEX+wUL8aDNsoef9rzcvpabE707mcQLEn+BYfrrbYC v5T3qIUjigASN2IDezyqD9pKebZk8Kh8iapZmZmf6MQl/+Q/QEB7496VhsPPQFL8i8Ke FlqGVdu0hojG7NqEWO58aWh48K4ewhsBCfltki1NPlMHDo0228Pr4fMF/6N0GtXsW1pD tV19CZMhxTIaY2mIsViK0hOf2l98IFPyqt+r0Fx4Fj/7u2UA5LTzLr3qPdPpO3P8MeOu but+BRuUZPmZw42NIUKKbejdCCHeTVuHifIIX9tNE9BRDKusRV19RvGYm2dNgwj3AwT5 7VHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q3si3082388oij.157.2020.03.12.11.35.55; Thu, 12 Mar 2020 11:36:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726508AbgCLSeG (ORCPT + 99 others); Thu, 12 Mar 2020 14:34:06 -0400 Received: from foss.arm.com ([217.140.110.172]:39766 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725268AbgCLSeG (ORCPT ); Thu, 12 Mar 2020 14:34:06 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7418030E; Thu, 12 Mar 2020 11:34:05 -0700 (PDT) Received: from [10.1.197.50] (e120937-lin.cambridge.arm.com [10.1.197.50]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A63313F67D; Thu, 12 Mar 2020 11:34:04 -0700 (PDT) Subject: Re: [PATCH v4 07/13] firmware: arm_scmi: Add notification dispatch and delivery To: Lukasz Luba , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: sudeep.holla@arm.com, james.quinlan@broadcom.com, Jonathan.Cameron@Huawei.com References: <20200304162558.48836-1-cristian.marussi@arm.com> <20200304162558.48836-8-cristian.marussi@arm.com> <45d4aee9-57df-6be9-c176-cf0d03940c21@arm.com> From: Cristian Marussi Message-ID: <363cb1ba-76b5-cc1e-af45-454837fae788@arm.com> Date: Thu, 12 Mar 2020 18:34:03 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <45d4aee9-57df-6be9-c176-cf0d03940c21@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/03/2020 13:51, Lukasz Luba wrote: > Hi Cristian, > > just one comment below... Hi Lukasz Thanks for the review > > On 3/4/20 4:25 PM, Cristian Marussi wrote: >> Add core SCMI Notifications dispatch and delivery support logic which is >> able, at first, to dispatch well-known received events from the RX ISR to >> the dedicated deferred worker, and then, from there, to final deliver the >> events to the registered users' callbacks. >> >> Dispatch and delivery is just added here, still not enabled. >> >> Signed-off-by: Cristian Marussi >> --- >> V3 --> V4 >> - dispatcher now handles dequeuing of events in chunks (header+payload): >> handling of these in_flight events let us remove one unneeded memcpy >> on RX interrupt path (scmi_notify) >> - deferred dispatcher now access their own per-protocol handlers' table >> reducing locking contention on the RX path >> V2 --> V3 >> - exposing wq in sysfs via WQ_SYSFS >> V1 --> V2 >> - splitted out of V1 patch 04 >> - moved from IDR maps to real HashTables to store event_handlers >> - simplified delivery logic >> --- >> drivers/firmware/arm_scmi/notify.c | 334 ++++++++++++++++++++++++++++- >> drivers/firmware/arm_scmi/notify.h | 9 + >> 2 files changed, 342 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/firmware/arm_scmi/notify.c b/drivers/firmware/arm_scmi/notify.c > > [snip] > >> + >> +/** >> + * scmi_notify - Queues a notification for further deferred processing >> + * >> + * This is called in interrupt context to queue a received event for >> + * deferred processing. >> + * >> + * @handle: The handle identifying the platform instance from which the >> + * dispatched event is generated >> + * @proto_id: Protocol ID >> + * @evt_id: Event ID (msgID) >> + * @buf: Event Message Payload (without the header) >> + * @len: Event Message Payload size >> + * @ts: RX Timestamp in nanoseconds (boottime) >> + * >> + * Return: 0 on Success >> + */ >> +int scmi_notify(const struct scmi_handle *handle, u8 proto_id, u8 evt_id, >> + const void *buf, size_t len, u64 ts) >> +{ >> + struct scmi_registered_event *r_evt; >> + struct scmi_event_header eh; >> + struct scmi_notify_instance *ni = handle->notify_priv; >> + >> + /* Ensure atomic value is updated */ >> + smp_mb__before_atomic(); >> + if (unlikely(!atomic_read(&ni->enabled))) >> + return 0; >> + >> + r_evt = SCMI_GET_REVT(ni, proto_id, evt_id); >> + if (unlikely(!r_evt)) >> + return -EINVAL; >> + >> + if (unlikely(len > r_evt->evt->max_payld_sz)) { >> + pr_err("SCMI Notifications: discard badly sized message\n"); >> + return -EINVAL; >> + } >> + if (unlikely(kfifo_avail(&r_evt->proto->equeue.kfifo) < >> + sizeof(eh) + len)) { >> + pr_warn("SCMI Notifications: queue full dropping proto_id:%d evt_id:%d ts:%lld\n", >> + proto_id, evt_id, ts); >> + return -ENOMEM; >> + } >> + >> + eh.timestamp = ts; >> + eh.evt_id = evt_id; >> + eh.payld_sz = len; >> + kfifo_in(&r_evt->proto->equeue.kfifo, &eh, sizeof(eh)); >> + kfifo_in(&r_evt->proto->equeue.kfifo, buf, len); >> + queue_work(r_evt->proto->equeue.wq, >> + &r_evt->proto->equeue.notify_work); > > Is it safe to ignore the return value from the queue_work here? > In fact yes, we do not want to care: it returns true or false depending on the fact that the specific work was or not already queued, and we just rely on this behavior to keep kicking the worker only when needed but never kick more than one instance of it per-queue (so that there's only one reader wq and one writer here in the scmi_notify)...explaining better: 1. we push an event (hdr+payld) to the protocol queue if we found that there was enough space on the queue 2a. if at the time of the kfifo_in( ) the worker was already running (queue not empty) it will process our new event sooner or later and here the queue_work will return false, but we do not care in fact ... we tried to kick it just in case 2b. if instead at the time of the kfifo_in() the queue was empty the worker would have probably already gone to the sleep and this queue_work() will return true and so this time it will effectively wake up the worker to process our items The important thing here is that we are sure to wakeup the worker when needed but we are equally sure we are never causing the scheduling of more than one worker thread consuming from the same queue (because that would break the one reader/one writer assumption which let us use the fifo in a lockless manner): this is possible because queue_work checks if the required work item is already pending and in such a case backs out returning false and we have one work_item (notify_work) defined per-protocol and so per-queue. Now probably I wrote too much of an explanation and confuse stuff more ... :D Regards Cristian > Regards, > Lukasz > >