Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp797380ybg; Sun, 26 Jul 2020 22:53:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwa1bAOqZtuXgYumnvu6tw3AqYNORSkZbuwbl1i7JT6Gk/eqOUjDn+Xb23VWfXLdQh69TJ7 X-Received: by 2002:a17:906:b890:: with SMTP id hb16mr9139391ejb.376.1595829204824; Sun, 26 Jul 2020 22:53:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595829204; cv=none; d=google.com; s=arc-20160816; b=Izf49ZJVmKPosdbRwKQvKozGmwaUy4M15BpEnCcbGkRm4z6p585cNglMxEtD9M4wOT q1HcKKBzmaKQ7cq9lfoY+m4cotL6Kp75ONQogjnu0Ktq/RCo1BCYEuX37x/ZIx/nqJ8S FdCNThzN1k7v7EATJJ6jgurkneDnCFafKhh5dD6Xtk/Gcm1TpSh4Wa+sECmMZGISUmOm LgGTU8YpXPuzFqcQg+5C+Qv+5wTD5qEAtnWN0eJfYXqJD9Vxmab/kYbSJjXUqp1S1LbX AjoPrGBIK0I14bXjer9wfe02EUbT6oVQHcUWXGRdooUkbx1J7kgS7ZNVfMFNKf4wSfMR A4Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dmarc-filter :dkim-signature; bh=cSumHZJ7SmOLNbJR1WUncWrylWcnL4pX2o7lxM8n9Sg=; b=YMQiyD9WomAb851kOU4ZB/lMkDkjKRN856Bgf3qp3r6d1i6CYBAOUCc3niYvtzPOst 4O0RIQDNSZqxf+ultbynvpTRHpXEh1Ic7gvKymXzmRPV0b/bDVeU3/RL9CtyyITASb64 V43/WrukUfLtzKHBI2ntVnMC9u6vxMJMutQYF9dt5d8EH/9CDl89leBKv67T+4FObWey Vy9YEgKtEW5suCE3IuIdKulYS0eodfOhj57Qmo/450dxbHzYEDUroPCvIqYBDKS3DHfd RYH19wsyY/TZ0A2PErN3+RrtyNKm+Zz/q51IlkqQkiniw2sGMfjvDuZq4T8Wenf+DTcb zfiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=Hwcde8NH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g7si4723758edj.525.2020.07.26.22.53.02; Sun, 26 Jul 2020 22:53:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=Hwcde8NH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726151AbgG0Fum (ORCPT + 99 others); Mon, 27 Jul 2020 01:50:42 -0400 Received: from m43-7.mailgun.net ([69.72.43.7]:19904 "EHLO m43-7.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726006AbgG0Fum (ORCPT ); Mon, 27 Jul 2020 01:50:42 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1595829040; h=Content-Transfer-Encoding: Content-Type: In-Reply-To: MIME-Version: Date: Message-ID: From: References: Cc: To: Subject: Sender; bh=cSumHZJ7SmOLNbJR1WUncWrylWcnL4pX2o7lxM8n9Sg=; b=Hwcde8NHndF2qsxGcnmreatPC0wxok6a/Sv4+6wR/6l3WYxNaU9kBBkcukhoUp5WU4HJGlhW IkSNjsBVt2sy0+hfE3hHeFKrgdmA7qAW0uyN8FYDuEBlsk1ACcWNIsT8YF3ASbsw/8F29MDY uACWW+Z+nJeW36lFzHOHm6j0f9M= X-Mailgun-Sending-Ip: 69.72.43.7 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n19.prod.us-west-2.postgun.com with SMTP id 5f1e689c845c4d05a324defe (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Mon, 27 Jul 2020 05:39:40 GMT Received: by smtp.codeaurora.org (Postfix, from userid 1001) id A7362C43391; Mon, 27 Jul 2020 05:39:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=2.0 tests=ALL_TRUSTED,NICE_REPLY_A, SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from [192.168.29.129] (unknown [49.36.65.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: mkshah) by smtp.codeaurora.org (Postfix) with ESMTPSA id 418F6C433C6; Mon, 27 Jul 2020 05:39:35 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 418F6C433C6 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=mkshah@codeaurora.org Subject: Re: [PATCH v2] soc: qcom: rpmh-rsc: Sleep waiting for tcs slots to be free To: Stephen Boyd , Andy Gross , Bjorn Andersson Cc: Stephen Boyd , linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, Douglas Anderson , Lina Iyer References: <20200724211711.810009-1-sboyd@kernel.org> From: Maulik Shah Message-ID: <140f8648-2733-9823-eb84-b172b7a23be6@codeaurora.org> Date: Mon, 27 Jul 2020 11:09:32 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200724211711.810009-1-sboyd@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-GB Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Change looks good to me. Reviewed-by: Maulik Shah Thanks, Maulik On 7/25/2020 2:47 AM, Stephen Boyd wrote: > From: Stephen Boyd > > The busy loop in rpmh_rsc_send_data() is written with the assumption > that the udelay will be preempted by the tcs_tx_done() irq handler when > the TCS slots are all full. This doesn't hold true when the calling > thread is an irqthread and the tcs_tx_done() irq is also an irqthread. > That's because kernel irqthreads are SCHED_FIFO and thus need to > voluntarily give up priority by calling into the scheduler so that other > threads can run. > > I see RCU stalls when I boot with irqthreads on the kernel commandline > because the modem remoteproc driver is trying to send an rpmh async > message from an irqthread that needs to give up the CPU for the rpmh > irqthread to run and clear out tcs slots. > > rcu: INFO: rcu_preempt self-detected stall on CPU > rcu: 0-....: (1 GPs behind) idle=402/1/0x4000000000000002 softirq=2108/2109 fqs=4920 > (t=21016 jiffies g=2933 q=590) > Task dump for CPU 0: > irq/11-smp2p R running task 0 148 2 0x00000028 > Call trace: > dump_backtrace+0x0/0x154 > show_stack+0x20/0x2c > sched_show_task+0xfc/0x108 > dump_cpu_task+0x44/0x50 > rcu_dump_cpu_stacks+0xa4/0xf8 > rcu_sched_clock_irq+0x7dc/0xaa8 > update_process_times+0x30/0x54 > tick_sched_handle+0x50/0x64 > tick_sched_timer+0x4c/0x8c > __hrtimer_run_queues+0x21c/0x36c > hrtimer_interrupt+0xf0/0x22c > arch_timer_handler_phys+0x40/0x50 > handle_percpu_devid_irq+0x114/0x25c > __handle_domain_irq+0x84/0xc4 > gic_handle_irq+0xd0/0x178 > el1_irq+0xbc/0x180 > save_return_addr+0x18/0x28 > return_address+0x54/0x88 > preempt_count_sub+0x40/0x88 > _raw_spin_unlock_irqrestore+0x4c/0x6c > ___ratelimit+0xd0/0x128 > rpmh_rsc_send_data+0x24c/0x378 > __rpmh_write+0x1b0/0x208 > rpmh_write_async+0x90/0xbc > rpmhpd_send_corner+0x60/0x8c > rpmhpd_aggregate_corner+0x8c/0x124 > rpmhpd_set_performance_state+0x8c/0xbc > _genpd_set_performance_state+0xdc/0x1b8 > dev_pm_genpd_set_performance_state+0xb8/0xf8 > q6v5_pds_disable+0x34/0x60 [qcom_q6v5_mss] > qcom_msa_handover+0x38/0x44 [qcom_q6v5_mss] > q6v5_handover_interrupt+0x24/0x3c [qcom_q6v5] > handle_nested_irq+0xd0/0x138 > qcom_smp2p_intr+0x188/0x200 > irq_thread_fn+0x2c/0x70 > irq_thread+0xfc/0x14c > kthread+0x11c/0x12c > ret_from_fork+0x10/0x18 > > This busy loop naturally lends itself to using a wait queue so that each > thread that tries to send a message will sleep waiting on the waitqueue > and only be woken up when a free slot is available. This should make > things more predictable too because the scheduler will be able to sleep > tasks that are waiting on a free tcs instead of the busy loop we > currently have today. > > Cc: Douglas Anderson > Cc: Maulik Shah > Cc: Lina Iyer > Signed-off-by: Stephen Boyd > --- > > Changes in v2: > * Document tcs_wait > * Move wake_up() outside of the spinlock > * Document claim_tcs_for_req() > > drivers/soc/qcom/rpmh-internal.h | 4 ++ > drivers/soc/qcom/rpmh-rsc.c | 115 +++++++++++++++---------------- > 2 files changed, 58 insertions(+), 61 deletions(-) > > diff --git a/drivers/soc/qcom/rpmh-internal.h b/drivers/soc/qcom/rpmh-internal.h > index ef60e790a750..344ba687c13b 100644 > --- a/drivers/soc/qcom/rpmh-internal.h > +++ b/drivers/soc/qcom/rpmh-internal.h > @@ -8,6 +8,7 @@ > #define __RPM_INTERNAL_H__ > > #include > +#include > #include > > #define TCS_TYPE_NR 4 > @@ -106,6 +107,8 @@ struct rpmh_ctrlr { > * @lock: Synchronize state of the controller. If RPMH's cache > * lock will also be held, the order is: drv->lock then > * cache_lock. > + * @tcs_wait: Wait queue used to wait for @tcs_in_use to free up a > + * slot > * @client: Handle to the DRV's client. > */ > struct rsc_drv { > @@ -118,6 +121,7 @@ struct rsc_drv { > struct tcs_group tcs[TCS_TYPE_NR]; > DECLARE_BITMAP(tcs_in_use, MAX_TCS_NR); > spinlock_t lock; > + wait_queue_head_t tcs_wait; > struct rpmh_ctrlr client; > }; > > diff --git a/drivers/soc/qcom/rpmh-rsc.c b/drivers/soc/qcom/rpmh-rsc.c > index 076fd27f3081..84a27b884af0 100644 > --- a/drivers/soc/qcom/rpmh-rsc.c > +++ b/drivers/soc/qcom/rpmh-rsc.c > @@ -19,6 +19,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -445,6 +446,7 @@ static irqreturn_t tcs_tx_done(int irq, void *p) > if (!drv->tcs[ACTIVE_TCS].num_tcs) > enable_tcs_irq(drv, i, false); > spin_unlock(&drv->lock); > + wake_up(&drv->tcs_wait); > if (req) > rpmh_tx_done(req, err); > } > @@ -563,73 +565,34 @@ static int find_free_tcs(struct tcs_group *tcs) > } > > /** > - * tcs_write() - Store messages into a TCS right now, or return -EBUSY. > + * claim_tcs_for_req() - Claim a tcs in the given tcs_group; only for active. > * @drv: The controller. > + * @tcs: The tcs_group used for ACTIVE_ONLY transfers. > * @msg: The data to be sent. > * > - * Grabs a TCS for ACTIVE_ONLY transfers and writes the messages to it. > + * Claims a tcs in the given tcs_group while making sure that no existing cmd > + * is in flight that would conflict with the one in @msg. > * > - * If there are no free TCSes for ACTIVE_ONLY transfers or if a command for > - * the same address is already transferring returns -EBUSY which means the > - * client should retry shortly. > + * Context: Must be called with the drv->lock held since that protects > + * tcs_in_use. > * > - * Return: 0 on success, -EBUSY if client should retry, or an error. > - * Client should have interrupts enabled for a bit before retrying. > + * Return: The id of the claimed tcs or -EBUSY if a matching msg is in flight > + * or the tcs_group is full. > */ > -static int tcs_write(struct rsc_drv *drv, const struct tcs_request *msg) > +static int claim_tcs_for_req(struct rsc_drv *drv, struct tcs_group *tcs, > + const struct tcs_request *msg) > { > - struct tcs_group *tcs; > - int tcs_id; > - unsigned long flags; > int ret; > > - tcs = get_tcs_for_msg(drv, msg); > - if (IS_ERR(tcs)) > - return PTR_ERR(tcs); > - > - spin_lock_irqsave(&drv->lock, flags); > /* > * The h/w does not like if we send a request to the same address, > * when one is already in-flight or being processed. > */ > ret = check_for_req_inflight(drv, tcs, msg); > if (ret) > - goto unlock; > - > - ret = find_free_tcs(tcs); > - if (ret < 0) > - goto unlock; > - tcs_id = ret; > - > - tcs->req[tcs_id - tcs->offset] = msg; > - set_bit(tcs_id, drv->tcs_in_use); > - if (msg->state == RPMH_ACTIVE_ONLY_STATE && tcs->type != ACTIVE_TCS) { > - /* > - * Clear previously programmed WAKE commands in selected > - * repurposed TCS to avoid triggering them. tcs->slots will be > - * cleaned from rpmh_flush() by invoking rpmh_rsc_invalidate() > - */ > - write_tcs_reg_sync(drv, RSC_DRV_CMD_ENABLE, tcs_id, 0); > - write_tcs_reg_sync(drv, RSC_DRV_CMD_WAIT_FOR_CMPL, tcs_id, 0); > - enable_tcs_irq(drv, tcs_id, true); > - } > - spin_unlock_irqrestore(&drv->lock, flags); > - > - /* > - * These two can be done after the lock is released because: > - * - We marked "tcs_in_use" under lock. > - * - Once "tcs_in_use" has been marked nobody else could be writing > - * to these registers until the interrupt goes off. > - * - The interrupt can't go off until we trigger w/ the last line > - * of __tcs_set_trigger() below. > - */ > - __tcs_buffer_write(drv, tcs_id, 0, msg); > - __tcs_set_trigger(drv, tcs_id, true); > + return ret; > > - return 0; > -unlock: > - spin_unlock_irqrestore(&drv->lock, flags); > - return ret; > + return find_free_tcs(tcs); > } > > /** > @@ -656,18 +619,47 @@ static int tcs_write(struct rsc_drv *drv, const struct tcs_request *msg) > */ > int rpmh_rsc_send_data(struct rsc_drv *drv, const struct tcs_request *msg) > { > - int ret; > + struct tcs_group *tcs; > + int tcs_id; > + unsigned long flags; > > - do { > - ret = tcs_write(drv, msg); > - if (ret == -EBUSY) { > - pr_info_ratelimited("TCS Busy, retrying RPMH message send: addr=%#x\n", > - msg->cmds[0].addr); > - udelay(10); > - } > - } while (ret == -EBUSY); > + tcs = get_tcs_for_msg(drv, msg); > + if (IS_ERR(tcs)) > + return PTR_ERR(tcs); > > - return ret; > + spin_lock_irqsave(&drv->lock, flags); > + > + /* Wait forever for a free tcs. It better be there eventually! */ > + wait_event_lock_irq(drv->tcs_wait, > + (tcs_id = claim_tcs_for_req(drv, tcs, msg)) >= 0, > + drv->lock); > + > + tcs->req[tcs_id - tcs->offset] = msg; > + set_bit(tcs_id, drv->tcs_in_use); > + if (msg->state == RPMH_ACTIVE_ONLY_STATE && tcs->type != ACTIVE_TCS) { > + /* > + * Clear previously programmed WAKE commands in selected > + * repurposed TCS to avoid triggering them. tcs->slots will be > + * cleaned from rpmh_flush() by invoking rpmh_rsc_invalidate() > + */ > + write_tcs_reg_sync(drv, RSC_DRV_CMD_ENABLE, tcs_id, 0); > + write_tcs_reg_sync(drv, RSC_DRV_CMD_WAIT_FOR_CMPL, tcs_id, 0); > + enable_tcs_irq(drv, tcs_id, true); > + } > + spin_unlock_irqrestore(&drv->lock, flags); > + > + /* > + * These two can be done after the lock is released because: > + * - We marked "tcs_in_use" under lock. > + * - Once "tcs_in_use" has been marked nobody else could be writing > + * to these registers until the interrupt goes off. > + * - The interrupt can't go off until we trigger w/ the last line > + * of __tcs_set_trigger() below. > + */ > + __tcs_buffer_write(drv, tcs_id, 0, msg); > + __tcs_set_trigger(drv, tcs_id, true); > + > + return 0; > } > > /** > @@ -975,6 +967,7 @@ static int rpmh_rsc_probe(struct platform_device *pdev) > return ret; > > spin_lock_init(&drv->lock); > + init_waitqueue_head(&drv->tcs_wait); > bitmap_zero(drv->tcs_in_use, MAX_TCS_NR); > > irq = platform_get_irq(pdev, drv->id); -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation