Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3806729pxj; Tue, 11 May 2021 12:16:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiE29DohDGxNg4mXpwsQnJQPXUDRrHsV/uj9+ZJ1yYIzP7vyAtP34p12S7cf/iiRFmOlu4 X-Received: by 2002:a17:907:294f:: with SMTP id et15mr33949608ejc.324.1620760570261; Tue, 11 May 2021 12:16:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620760570; cv=none; d=google.com; s=arc-20160816; b=r/icFQwmbx2NWN2ZSxVN6L0IKM+LMVKqvEwo5LxGKDdbs8j/bUJHA6jpRNg/w+n/sU yq7UlAcgGBbK461JS72Up/gzcCr2l/Fu6BTGh6VfUgTx0AyQR2x7BLyY1n9fVSHbOErY Tnl7yVI8N0rJQREZ+JBbhTBlR5mWt/QZy/Pcf0/T4mIjgKLvI+KyxNUUGmGkpDKmAc0n FbGGze8nwkmpPooLQW00ggPr4XgcNJvluvFQLFUqnStiB5d+PW0F6gAb7ld0Bw0FqGUx wZJLJh7jg6lXghSNLLKY37E2zDORvUDoBOrY7HQIgSmMLSq0bUxW0U/d2YkrwpFz0Icm Tr8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:ironport-sdr:ironport-sdr; bh=o0KKtXyHCWfYZlIqaYVYdD3lC0oeI/xLHdW1RVidrlg=; b=m1bqNwprhlZoqu9OyZ6Lpa9sM3VJ3kUrkVIte4stcSX91gNAwY6Cd/9EweUzaxMX3G TIm5w6kIIPxtswLnx48UOq17ydmuoEb/efdgX84SutQN1v3wVIxOX99q5xruYFZ4zz1u nPLBMZ8Ox01jo2rgvt5UqdN6+61h2faoTackS63dYMM5LjpKmaiv90rxMTAFRrDzaqEC OWSAs8wX81acmw3W9RtJTXVepYKzav9pwJ3DXB0LTNZYYX7Qx6V0DNfaw5o074QTynqT cCx9pxXLv+F6/4lL8NggYzyE7wwYFQ9dYFLmes2FWxCJy8cG9Anp8TlDMatdvmRQBW9y fXjQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d21si16710346edr.97.2021.05.11.12.15.45; Tue, 11 May 2021 12:16:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232153AbhEKTOy (ORCPT + 99 others); Tue, 11 May 2021 15:14:54 -0400 Received: from mga12.intel.com ([192.55.52.136]:64361 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231454AbhEKTOy (ORCPT ); Tue, 11 May 2021 15:14:54 -0400 IronPort-SDR: l8YZfYsSZvD2XVP3gBgfHMZg1NBgxXRs55GjFDOOdMXtULs5ANJNz8AiFdmVatFgQ+hp9582Bb 32ncXcGLRfNA== X-IronPort-AV: E=McAfee;i="6200,9189,9981"; a="179119775" X-IronPort-AV: E=Sophos;i="5.82,291,1613462400"; d="scan'208";a="179119775" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 May 2021 12:13:45 -0700 IronPort-SDR: DmE+R1y/IxualhIKBmCcmjLws8UZvO71Y4XiyENx6K/aOVIc3oTOTLCIjlm9tN8iB0Fs0R7RWD O6O+GUrQJC1w== X-IronPort-AV: E=Sophos;i="5.82,291,1613462400"; d="scan'208";a="436804966" Received: from rjwysock-mobl1.ger.corp.intel.com (HELO [10.249.129.50]) ([10.249.129.50]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 May 2021 12:13:42 -0700 Subject: Re: Question about device link//Re: Qestion about device link To: Saravana Kannan , "chenxiang (M)" Cc: John Garry , linuxarm@huawei.com, linux-scsi@vger.kernel.org, linux-kernel , Greg Kroah-Hartman References: <3c88cf35-6725-1bfa-9e1e-8e9d69147e3b@hisilicon.com> <2e69efb9-a563-251f-2161-5546324a9587@hisilicon.com> From: "Rafael J. Wysocki" Organization: Intel Technology Poland Sp. z o. o., KRS 101882, ul. Slowackiego 173, 80-298 Gdansk Message-ID: <11749ea2-777c-e200-9c5a-eab531c7e69a@intel.com> Date: Tue, 11 May 2021 21:13:40 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/11/2021 8:23 PM, Saravana Kannan wrote: > On Tue, May 11, 2021 at 3:42 AM chenxiang (M) wrote: >> Re-edit the non-aligned flowchart and add CC to Greg-KH and Saravanna. >> >> >> 在 2021/5/11 11:59, chenxiang (M) 写道: >>> Hi Rafael and other guys, >>> >>> I am trying to add a device link between scsi_host->shost_gendev and >>> hisi_hba->dev to support runtime PM for hisi_hba driver >>> >>> (as it supports runtime PM for scsi host in some scenarios such as >>> error handler etc, we can avoid to do them again if adding a >>> >>> device link between scsi_host->shost_gendev and hisi_hba->dev) as >>> follows (hisi_sas driver is under directory drivers/scsi/hisi_sas): >>> >>> device_link_add(&shost->shost_gendev, hisi_hba->dev, >>> DL_FLAG_PM_RUNTIME | DL_FLAG_RPM_ACTIVE) >>> >>> We have a full test on it, and it works well except when rmmod the >>> driver, some call trace occurs as follows: >>> >>> [root@localhost ~]# rmmod hisi_sas_v3_hw >>> [ 105.377944] BUG: scheduling while atomic: kworker/113:1/811/0x00000201 >>> [ 105.384469] Modules linked in: bluetooth rfkill ib_isert >>> iscsi_target_mod ib_ipoib ib_umad iptable_filter vfio_iommu_type1 >>> vfio_pci vfio_virqfd vfio rpcrdma ib_is er >>> libiscsi scsi_transport_iscsi crct10dif_ce sbsa_gwdt hns_roce_hw_v2 >>> hisi_sec2 hisi_hpre hisi_zip hisi_qm uacce spi_hisi_sfc_v3xx >>> hisi_trng_v2 rng_core hisi_uncore _hha_pmu >>> hisi_uncore_ddrc_pmu hisi_uncore_l3c_pmu spi_dw_mmio hisi_uncore_pmu >>> hns3 hclge hnae3 hisi_sas_v3_hw(-) hisi_sas_main libsas >>> [ 105.424841] CPU: 113 PID: 811 Comm: kworker/113:1 Kdump: loaded >>> Tainted: G W 5.12.0-rc1+ #1 >>> [ 105.434454] Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS >>> 2280-V2 CS V5.B143.01 04/22/2021 >>> [ 105.443287] Workqueue: rcu_gp srcu_invoke_callbacks >>> [ 105.448154] Call trace: >>> [ 105.450593] dump_backtrace+0x0/0x1a4 >>> [ 105.454245] show_stack+0x24/0x40 >>> [ 105.457548] dump_stack+0xc8/0x104 >>> [ 105.460939] __schedule_bug+0x68/0x80 >>> [ 105.464590] __schedule+0x73c/0x77c >>> [ 105.465700] BUG: scheduling while atomic: kworker/96:1/791/0x00000201 >>> [ 105.468066] schedule+0x7c/0x110 >>> [ 105.468068] schedule_timeout+0x194/0x1d4 >>> [ 105.474490] Modules linked in: >>> [ 105.477692] wait_for_completion+0x8c/0x12c >>> [ 105.477695] rcu_barrier+0x1e0/0x2fc >>> [ 105.477697] scsi_host_dev_release+0x50/0xf0 >>> [ 105.477701] device_release+0x40/0xa0 >>> [ 105.477704] kobject_put+0xac/0x100 >>> [ 105.477707] __device_link_free_srcu+0x50/0x74 >>> [ 105.477709] srcu_invoke_callbacks+0x108/0x1a4 >>> [ 105.484743] process_one_work+0x1dc/0x48c >>> [ 105.492468] worker_thread+0x7c/0x464 >>> [ 105.492471] kthread+0x168/0x16c >>> [ 105.492473] ret_from_fork+0x10/0x18 >>> ... >>> >>> After analyse the process, we find that it will >>> device_del(&shost->gendev) in function scsi_remove_host() and then >>> >>> put_device(&shost->shost_gendev) in function scsi_host_put() when >>> removing the driver, if there is a link between shost and hisi_hba->dev, >>> >>> it will try to delete the link in device_del(), and also will >>> call_srcu(__device_link_free_srcu) to put_device() link->consumer and >>> supplier. >>> >>> But if put device() for shost_gendev in device_link_free() is later >>> than in scsi_host_put(), it will call scsi_host_dev_release() in >>> >>> srcu_invoke_callbacks() while it is atomic and there are scheduling in >>> scsi_host_dev_release(), >>> >>> so it reports the BUG "scheduling while atomic:...". >>> >>> thread 1 thread2 >>> hisi_sas_v3_remove >>> ... >>> sas_remove_host() >>> ... >>> scsi_remove_host() >>> ... >>> device_del(&shost->shost_gendev) >>> ... >>> device_link_purge() >>> __device_link_del() >>> device_unregister(&link->link_dev) >>> devlink_dev_release >>> call_srcu(__device_link_free_srcu) -----------> >>> srcu_invoke_callbacks (atomic) >>> __device_link_free_srcu >>> ... >>> scsi_host_put() >>> put_device(&shost->shost_gendev) (ref = 1) >>> device_link_free() >>> put_device(link->consumer) >>> //shost->gendev ref = 0 >>> ... >>> scsi_host_dev_release >>> ... >>> rcu_barrier >>> kthread_stop() >> Re-edit the non-aligned flowchart >> thread 1 thread 2 >> hisi_sas_v3_remove() >> ... >> sas_remove_host() >> ... >> device_del(&shost->shost_gendev) >> ... >> device_link_purge() >> __device_link_del() >> device_unregister(&link->link_dev) >> devlink_dev_release >> call_srcu(__device_link_free_srcu) -----------> >> srcu_invoke_callbacks (atomic) >> __device_link_free_srcu() >> ... >> scsi_host_put() >> put_device(&shost->shost_gendev) (ref = 1) >> device_link_free() >> put_device(link->consumer) >> //shost->gendev ref = 0 >> ... >> scsi_host_dev_release() >> ... >> rcu_barrier() >> kthread_stop() >> >>> >>> We can check kref of shost->shost_gendev to make sure scsi_host_put() >>> to release scsi host device in LLDD driver to avoid the issue, >>> >>> but it seems be a common issue: function __device_link_free_srcu >>> calls put_device() for consumer and supplier, >>> >>> but if it's ref =0 at that time and there are scheduling or sleep in >>> dev_release, it may have the issue. >>> >>> Do you have any idea about the issue? > Another report for the same issue. > https://lore.kernel.org/lkml/CAGETcx80xSZ8d4JbZqiSz4L0VNtL+HCnFCS2u3F9aNC0QQoQjg@mail.gmail.com/ > > I don't have enough context yet about the need for SRCU (I haven't > read up all the runtime PM code), but this is a real issue that needs > to be solved. > > Dirty/terrible hack is to kick off another work to do the > put_device(). I wouldn't call it dirty or terrible, but it may just be the thing that needs to be done here. > But is there any SRCU option that'll try to do the > release in a non-atomic context? No, the callbacks are run from a softirq if I'm not mistaken. Thanks!