Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp767160ybg; Tue, 28 Jul 2020 19:22:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyIIrjhO/opGTNHY7vPud0g5rj2FrYcp/3A/DoXAxjgiv6Wdo02CvTksMEBIwT3LCPB4xld X-Received: by 2002:a17:907:2662:: with SMTP id ci2mr8997744ejc.334.1595989376539; Tue, 28 Jul 2020 19:22:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595989376; cv=none; d=google.com; s=arc-20160816; b=WqOuarKZ0EcJvpJr3OXdAEyyPA7Mb6FURFJ/BUKp67SDkhAuIdLQG2SVOIlC2sRoJl r0shgyOYBz4WuljdN2xJNjTlUX8gbTRQ92wURBeOb5mGj+7UdnbGIaUa5ZEg+1xLUprW 2xCSDO1YDc9xVhIdC1Zkw3bZZDl16wX1gWDn6pwNW8oFhvovUD2mw5LbGI5alj4Pbd3t 7xqcnI/HRw/d/j6mezTlWMe8Qee+vxg8dnjMB7aq+8cIYO8e6tMXexxUX1rBeVzyG+86 umNoN6aakWnuPjn9kXaB8jZciRElpBLuofrmEULJXxPDXoVe8Y3Liyg2PlBPjaChtg8m ZTLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=JFh2JKXH1bsmnILzTpuUIU+ZG4esprlJ2waz7yw8nYo=; b=z0VFE/Rrzwueg3ljjt6EyCVBSS6HwoeAXxeWIY5Vh78kyX+JZHrM4A5eNECqaEWVno bCSKbtK8uPJbxhW9Kw33huQZlgJIfJJt/drR7y0Wa6uHpoAHijtLAfQMjBC95LBSg3mS CSYXcoFCvaMrzdxZhTGkJeDx7PzXqCXtlC4p1yrGpu73uvJuNQvWULnVbSQ8nVS+B5tS gsiS2AicHl13/lwlH7a+/M/8lldzpGMenyyD8/y5WMSbixm+NqLZYOn585PWvqN3PdNs 6/2Mli6s2E+RRYv+NGXjOyFRK+rwLnPU1nDPTPmJC5aNvozV/gB/SxHHY68J6Qvc9TsF WpBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UD2/SrXn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m26si274300ejn.40.2020.07.28.19.22.33; Tue, 28 Jul 2020 19:22:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UD2/SrXn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731010AbgG2CWW (ORCPT + 99 others); Tue, 28 Jul 2020 22:22:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:36966 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730901AbgG2CWW (ORCPT ); Tue, 28 Jul 2020 22:22:22 -0400 Received: from mail-ed1-f53.google.com (mail-ed1-f53.google.com [209.85.208.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C3CC52070B; Wed, 29 Jul 2020 02:22:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595989340; bh=k5qS863fFeAFImz8qQ72STBgwqwjrT2VdEQppPTBzkU=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=UD2/SrXnSaE/nhR8QzLzln/M1nBs3BDKwAM2N1IFATWjIZxRnjcMdLqtNvkQlCTZS OpydQCu0X+xprkrVevu6lL5QpcKnCTCEdNu2rnqrOAfQBAeHnVH78g4LouybBmztXT wyapIPA8QyLf3cXBqKsKQZ5NzNHK93PhcTbNgDKM= Received: by mail-ed1-f53.google.com with SMTP id m20so6774722eds.2; Tue, 28 Jul 2020 19:22:19 -0700 (PDT) X-Gm-Message-State: AOAM532TgPSo80PBX8j0YyyBld2SnOR5BwjQeRWyJu8ilqXVBGyPDuEs Q8LnFey8/DVz2U4Y3NQeFA9FIYBL1fGM8RwO2w== X-Received: by 2002:a50:e617:: with SMTP id y23mr28961939edm.47.1595989338240; Tue, 28 Jul 2020 19:22:18 -0700 (PDT) MIME-Version: 1.0 References: <1595303971-8793-1-git-send-email-neal.liu@mediatek.com> <1595303971-8793-3-git-send-email-neal.liu@mediatek.com> <1595389756.20193.12.camel@mtkswgap22> <1595484707.26237.12.camel@mtkswgap22> <1595573719.24412.9.camel@mtkswgap22> <1595819152.7630.13.camel@mtkswgap22> <1595908325.1388.8.camel@mtkswgap22> <1595988652.9265.8.camel@mtkswgap22> In-Reply-To: <1595988652.9265.8.camel@mtkswgap22> From: Chun-Kuang Hu Date: Wed, 29 Jul 2020 10:22:06 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 2/2] soc: mediatek: add mtk-devapc driver To: Neal Liu Cc: Chun-Kuang Hu , Rob Herring , Matthias Brugger , "devicetree@vger.kernel.org" , wsd_upstream , lkml , "moderated list:ARM/Mediatek SoC support" , Linux ARM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Neal Liu =E6=96=BC 2020=E5=B9=B47=E6=9C=8829=E6=97= =A5 =E9=80=B1=E4=B8=89 =E4=B8=8A=E5=8D=8810:10=E5=AF=AB=E9=81=93=EF=BC=9A > > Hi Chun-Kuang, > > On Tue, 2020-07-28 at 23:35 +0800, Chun-Kuang Hu wrote: > > Hi, Neal: > > > > Neal Liu =E6=96=BC 2020=E5=B9=B47=E6=9C=8828=E6= =97=A5 =E9=80=B1=E4=BA=8C =E4=B8=8A=E5=8D=8811:52=E5=AF=AB=E9=81=93=EF=BC= =9A > > > > > > Hi Chun-Kuang, > > > > > > On Mon, 2020-07-27 at 22:47 +0800, Chun-Kuang Hu wrote: > > > > Hi, Neal: > > > > > > > > Neal Liu =E6=96=BC 2020=E5=B9=B47=E6=9C=882= 7=E6=97=A5 =E9=80=B1=E4=B8=80 =E4=B8=8A=E5=8D=8811:06=E5=AF=AB=E9=81=93=EF= =BC=9A > > > > > > > > > > Hi Chun-Kuang, > > > > > > > > > > On Fri, 2020-07-24 at 23:55 +0800, Chun-Kuang Hu wrote: > > > > > > Hi, Neal: > > > > > > > > > > > > Neal Liu =E6=96=BC 2020=E5=B9=B47=E6=9C= =8824=E6=97=A5 =E9=80=B1=E4=BA=94 =E4=B8=8B=E5=8D=882:55=E5=AF=AB=E9=81=93= =EF=BC=9A > > > > > > > > > > > > > > Hi Chun-Kuang, > > > > > > > > > > > > > > On Fri, 2020-07-24 at 00:32 +0800, Chun-Kuang Hu wrote: > > > > > > > > Hi, Neal: > > > > > > > > > > > > > > > > Neal Liu =E6=96=BC 2020=E5=B9=B47= =E6=9C=8823=E6=97=A5 =E9=80=B1=E5=9B=9B =E4=B8=8B=E5=8D=882:11=E5=AF=AB=E9= =81=93=EF=BC=9A > > > > > > > > > > > > > > > > > > Hi Chun-Kuang, > > > > > > > > > > > > > > > > > > On Wed, 2020-07-22 at 22:25 +0800, Chun-Kuang Hu wrote: > > > > > > > > > > Hi, Neal: > > > > > > > > > > > > > > > > > > > > Neal Liu =E6=96=BC 2020=E5=B9= =B47=E6=9C=8822=E6=97=A5 =E9=80=B1=E4=B8=89 =E4=B8=8A=E5=8D=8811:49=E5=AF= =AB=E9=81=93=EF=BC=9A > > > > > > > > > > > > > > > > > > > > > > Hi Chun-Kuang, > > > > > > > > > > > > > > > > > > > > > > On Wed, 2020-07-22 at 07:21 +0800, Chun-Kuang Hu wrot= e: > > > > > > > > > > > > Hi, Neal: > > > > > > > > > > > > > > > > > > > > > > > > Neal Liu =E6=96=BC 2020=E5= =B9=B47=E6=9C=8821=E6=97=A5 =E9=80=B1=E4=BA=8C =E4=B8=8B=E5=8D=8812:00=E5= =AF=AB=E9=81=93=EF=BC=9A > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > + > > > > > > > > > > > > > +/* > > > > > > > > > > > > > + * mtk_devapc_dump_vio_dbg - get the violation i= ndex and dump the full violation > > > > > > > > > > > > > + * debug information. > > > > > > > > > > > > > + */ > > > > > > > > > > > > > +static bool mtk_devapc_dump_vio_dbg(struct mtk_d= evapc_context *ctx, u32 vio_idx) > > > > > > > > > > > > > +{ > > > > > > > > > > > > > + u32 shift_bit; > > > > > > > > > > > > > + > > > > > > > > > > > > > + if (check_vio_mask(ctx, vio_idx)) > > > > > > > > > > > > > + return false; > > > > > > > > > > > > > + > > > > > > > > > > > > > + if (!check_vio_status(ctx, vio_idx)) > > > > > > > > > > > > > + return false; > > > > > > > > > > > > > + > > > > > > > > > > > > > + shift_bit =3D get_shift_group(ctx, vio_id= x); > > > > > > > > > > > > > + > > > > > > > > > > > > > + if (sync_vio_dbg(ctx, shift_bit)) > > > > > > > > > > > > > + return false; > > > > > > > > > > > > > + > > > > > > > > > > > > > + devapc_extract_vio_dbg(ctx); > > > > > > > > > > > > > > > > > > > > > > > > I think get_shift_group(), sync_vio_dbg(), and > > > > > > > > > > > > devapc_extract_vio_dbg() should be moved out of vio= _idx for-loop (the > > > > > > > > > > > > loop in devapc_violation_irq()) because these three= function is not > > > > > > > > > > > > related to vio_idx. > > > > > > > > > > > > Another question: when multiple vio_idx violation o= ccur, vio_addr is > > > > > > > > > > > > related to which one vio_idx? The latest happened o= ne? > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Actually, it's related to vio_idx. But we don't use i= t directly on these > > > > > > > > > > > function. I think below snip code might be better way= to understand it. > > > > > > > > > > > > > > > > > > > > > > for (...) > > > > > > > > > > > { > > > > > > > > > > > check_vio_mask() > > > > > > > > > > > check_vio_status() > > > > > > > > > > > > > > > > > > > > > > // if get vio_idx, mask it temporarily > > > > > > > > > > > mask_module_irq(true) > > > > > > > > > > > clear_vio_status() > > > > > > > > > > > > > > > > > > > > > > // dump violation info > > > > > > > > > > > get_shift_group() > > > > > > > > > > > sync_vio_dbg() > > > > > > > > > > > devapc_extract_vio_dbg() > > > > > > > > > > > > > > > > > > > > > > // unmask > > > > > > > > > > > mask_module_irq(false) > > > > > > > > > > > } > > > > > > > > > > > > > > > > > > > > This snip code does not explain any thing. I could rewr= ite this code as: > > > > > > > > > > > > > > > > > > > > for (...) > > > > > > > > > > { > > > > > > > > > > check_vio_mask() > > > > > > > > > > check_vio_status() > > > > > > > > > > > > > > > > > > > > // if get vio_idx, mask it temporarily > > > > > > > > > > mask_module_irq(true) > > > > > > > > > > clear_vio_status() > > > > > > > > > > // unmask > > > > > > > > > > mask_module_irq(false) > > > > > > > > > > } > > > > > > > > > > > > > > > > > > > > // dump violation info > > > > > > > > > > get_shift_group() > > > > > > > > > > sync_vio_dbg() > > > > > > > > > > devapc_extract_vio_dbg() > > > > > > > > > > > > > > > > > > > > And my version is identical with your version, isn't it= ? > > > > > > > > > > > > > > > > > > Sorry, I did not explain it clearly. Let's me try again. > > > > > > > > > The reason why I put "dump violation info" between mask &= unmask context > > > > > > > > > is because it has to stop interrupt first before dump vio= lation info, > > > > > > > > > and then unmask it to prepare next violation. > > > > > > > > > These sequence guarantee that if multiple violation is tr= iggered, we > > > > > > > > > still have information to debug. > > > > > > > > > If the code sequence in your version and multiple violati= on is > > > > > > > > > triggered, there might be no any information but keeps en= tering ISR. > > > > > > > > > Finally, system might be abnormal and watchdog timeout. > > > > > > > > > In this case, we still don't have any information to debu= g. > > > > > > > > > > > > > > > > I still don't understand why no information to debug. For e= xample when > > > > > > > > vio_idx 5, 10, 15 has violation, > > > > > > > > You would mask vio_idx 5 to get information, but vio_idx 10= , 15 does > > > > > > > > not mask yet. > > > > > > > > In your words, when vio_idx 10, 15 not mask, you would not = get any > > > > > > > > debug information when you process vio_idx 5. > > > > > > > > > > > > > > > > In my version, I would clear all status, why keeps entering= ISR? > > > > > > > > > > > > > > Think about this case, if someone tries to dump "AAA" module'= s register. > > > > > > > It would keep read reg base, base+0x4, base+0x8, ... > > > > > > > All these registers are in the same slave, which would be sam= e vio_idx. > > > > > > > (Take vio_idx 5 as example) > > > > > > > In this case, vio_idx 5 will keep triggering interrupt. If yo= u did not > > > > > > > do "dump violation info" between mask & unmask, you cannot ge= t any > > > > > > > violation info until the last interrupt being handled. > > > > > > > Normally, system will crash before last interrupt coming. > > > > > > > > > > > > You have said that first vio_addr would be kept until it's 'han= dled'. > > > > > > So the first vio_addr reg_base would be kept even though other > > > > > > violation happen. And I could handle (clear status and dump inf= o) it > > > > > > then vio_addr would next violation's address. I'm confused with= your > > > > > > statement. If AAA is dumping register of vio_idx 5, BBB is dump= ing > > > > > > register of vio_idx 10, CCC is dumping register of vio_idx 15, = I think > > > > > > you should mask all vio_idx not only one. So the code would be > > > > > > > > > > > > for all vio_idx { > > > > > > mask_module_irq(true) > > > > > > } > > > > > > > > > > > > devapc_extract_vio_dbg() > > > > > > > > > > > > for all vio_idx { > > > > > > clear_vio_status() > > > > > > mask_module_irq(false) > > > > > > } > > > > > > > > > > > > > > > > I'm also consider this solution and I think it's much better to > > > > > understand hardware behavior. > > > > > > > > > > devapc_dump_vio_dbg() > > > > > { > > > > > while(1) { > > > > > // might have multiple shift_bit raised > > > > > shift_bit =3D get_shift_group() > > > > > if (shift_bit >=3D 0 && shift bit <=3D 31) > > > > > sync_vio_dbg(shift_bit) > > > > > extract_vio_dbg() > > > > > > > > According to your statement, when multiple violation occur, only th= e > > > > first one is kept, others are dropped. I think we just need to dump > > > > debug info once. > > > > > > > > Because only one violation information would be kept, why not only = one > > > > group (equal to no group)? > > > > > > > > Regards, > > > > Chun-Kuang. > > > > > > Let's me give you an example of devapc design. > > > vio_idx: 0, 1, 2 -> group 0 (shift_bit: 0) > > > vio_idx: 3, 4, 5 -> group 1 (shift_bit: 1) > > > ... > > > > > > Each group violation will keep one violation (the first one). If vio_= idx > > > 0 is triggered first, vio_idx 1 is triggered next, then group 0 will > > > just keep vio_idx 0 violation info. > > > If vio_idx 2 is triggered first, vio_idx 3 is triggered next, then gr= oup > > > 0 will keep vio_idx 2 violation info, group 1 will keep vio_idx 3's. > > > > > > We have to scan all groups and dump everything we have. > > > Thanks ! > > > > > > > Could we let all vio_idx be group 0 so that we could just sync one > > group? It's bad to spend too much time in irq handler. > > When we set pd_vio_shift_sel_reg, it seems we could set multiple group > > together, couldn't it? > > > > Regards, > > Chun-Kuang. > > > > No, Which group vio_idx belongs to is determined by hardware. Software > cannot change its group. > There is very low possibility that multiple groups has violation at the > same time, so it would not spend much time to handle it. > It also cannot shift multiple groups at the same time since there is > only one vio_info(rw, vio_addr, master_id, ...) exist at a time. > devapc_extract_vio_dbg() function is doing this step. > So this flow is OK for me. Would you please add comment for this information so that we could understand how hardware work. Regards, Chun-Kuang. > Thanks ! > > > > > > > > > > else > > > > > break > > > > > } > > > > > } > > > > > > > > > > devapc_violation_irq() > > > > > { > > > > > for all vio_idx { > > > > > mask_module_irq(true) > > > > > } > > > > > > > > > > devapc_dump_vio_dbg() > > > > > > > > > > for all vio_idx { > > > > > clear_vio_status() > > > > > mask_module_irq(false) > > > > > } > > > > > } > > > > > > > > > > Is it more clear for this control flow? > > > > > Thanks ! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > About your question, vio_addr would be the first one. > > > > > > > > > > > > > > > > > > > > So other vio_addr would be dropped? Or hardware would k= eep all > > > > > > > > > > vio_addr and you have some way to get all vio_addr? > > > > > > > > > > > > > > > > > > > > > > > > > > > > In this case, hardware will drop other violation info and= keep the first > > > > > > > > > one until it been handled. > > > > > > > > > > > > > > > > Does 'handled' mean status is cleared? > > > > > > > > > > > > > > "handled" means clear status and dump violation info. > > > > > > > > > > > > > > > > > > > > > > > Regards, > > > > > > > > Chun-Kuang. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > + > > > > > > > > > > > > > + return true; > > > > > > > > > > > > > +} > > > > > > > > > > > > > + > > > > > > > > > > > > > +/* > > > > > > > > > > > > > + * devapc_violation_irq - the devapc Interrupt S= ervice Routine (ISR) will dump > > > > > > > > > > > > > + * violation information = including which master violates > > > > > > > > > > > > > + * access slave. > > > > > > > > > > > > > + */ > > > > > > > > > > > > > +static irqreturn_t devapc_violation_irq(int irq_= number, > > > > > > > > > > > > > + struct mt= k_devapc_context *ctx) > > > > > > > > > > > > > +{ > > > > > > > > > > > > > + u32 vio_idx; > > > > > > > > > > > > > + > > > > > > > > > > > > > + for (vio_idx =3D 0; vio_idx < ctx->vio_id= x_num; vio_idx++) { > > > > > > > > > > > > > + if (!mtk_devapc_dump_vio_dbg(ctx,= vio_idx)) > > > > > > > > > > > > > + continue; > > > > > > > > > > > > > + > > > > > > > > > > > > > + /* Ensure that violation info are= written before > > > > > > > > > > > > > + * further operations > > > > > > > > > > > > > + */ > > > > > > > > > > > > > + smp_mb(); > > > > > > > > > > > > > + > > > > > > > > > > > > > + /* > > > > > > > > > > > > > + * Mask slave's irq before cleari= ng vio status. > > > > > > > > > > > > > + * Must do it to avoid nested int= errupt and prevent > > > > > > > > > > > > > + * unexpected behavior. > > > > > > > > > > > > > + */ > > > > > > > > > > > > > + mask_module_irq(ctx, vio_idx, tru= e); > > > > > > > > > > > > > + > > > > > > > > > > > > > + clear_vio_status(ctx, vio_idx); > > > > > > > > > > > > > + > > > > > > > > > > > > > + mask_module_irq(ctx, vio_idx, fal= se); > > > > > > > > > > > > > + } > > > > > > > > > > > > > + > > > > > > > > > > > > > + return IRQ_HANDLED; > > > > > > > > > > > > > +} > > > > > > > > > > > > > + > > > > > > > > > > > > > +/* > > > > > > > > > > > > > > > >