Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3808783pxj; Tue, 11 May 2021 12:18:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzybNdiNatMCPfJ9f6fZVXwYnevAqG6LBAMpuy9PmCkjrI6hg+f4u0wdjGgPuWcS75ur/lg X-Received: by 2002:a17:906:fa81:: with SMTP id lt1mr2289091ejb.465.1620760730297; Tue, 11 May 2021 12:18:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620760730; cv=none; d=google.com; s=arc-20160816; b=YOkAKgmLJw2m0nafTwbdx7UQZjteVnSe+XH4ovvC0R22bt3G4C4DfqE2KkWmfhkkKv D7p4JLUO+t3FtWHZk5+TM5Qdp2gCtcxvU92e2uQpY2O2ZxmirCfcCL97N5bqI9vdgVfU p41hwMm7nmoitM/HKGo/bdR8BOW6Uc2EneerxBlCEUAi088ROS0LEQ+tP39P6tQ7iFBO AtVq1mBLpm7juJ2is6p3UbXXmyATAgD3n3m907EZC0LTc5HsxblZCF1dXFlXGM6mkXmY ST5E2k+7WNOBzp+2EhW4pKvksuEJNKEOW37Gwoxs7tv1/ZJH+sDyQX4wr87VTT6DB2EL l7+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=1h2HWSO7he7e7IH1ZDDEdMZHbL54zdbat6tTL4OZ8HA=; b=tfdP+fAniyRTSSHXufvhwhrQqJzwkdNHFTlMhGUYuV6u/P+3+4vvELBVXpGlkW1B6P huavtYDxsozOHyCOE2iHmpUVyIYVptZOKZ158vcoqDO8ywCYWaEqcScV/PlfGcdfq1Q1 seYEsjkXszU8PPI1y0o+dwscpRNCaPzkegJq1h4Ler6UpvO71NnbiH9oBMKz3DJg+fgQ 58FKXb9dDhIF+g1Ovdq4XGOkSpNtVWl5yEvDviwEg194LqhDuU1RzGR0qw0N22wC6H5G 1S4tJNgMWeTTMq1TLVglCQmaR4XpX29omaQVe+zKpDnjFzW0ahv3J6kP+XtDFs+KVUs6 a0Zw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d15si16091927edu.375.2021.05.11.12.18.25; Tue, 11 May 2021 12:18:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232231AbhEKTSE (ORCPT + 99 others); Tue, 11 May 2021 15:18:04 -0400 Received: from cloudserver094114.home.pl ([79.96.170.134]:56786 "EHLO cloudserver094114.home.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231454AbhEKTSE (ORCPT ); Tue, 11 May 2021 15:18:04 -0400 Received: from localhost (127.0.0.1) (HELO v370.home.net.pl) by /usr/run/smtp (/usr/run/postfix/private/idea_relay_lmtp) via UNIX with SMTP (IdeaSmtpServer 2.0.5) id 05c12cc465fb03c4; Tue, 11 May 2021 21:16:55 +0200 Received: from kreacher.localnet (89-64-81-188.dynamic.chello.pl [89.64.81.188]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by v370.home.net.pl (Postfix) with ESMTPSA id CE8DD669582; Tue, 11 May 2021 21:16:54 +0200 (CEST) From: "Rafael J. Wysocki" To: "chenxiang (M)" Cc: "Rafael J. Wysocki" , John Garry , linuxarm@huawei.com, linux-scsi@vger.kernel.org, linux-kernel , Linux PM , Greg Kroah-Hartman , Saravana Kannan Subject: Re: Qestion about device link Date: Tue, 11 May 2021 21:16:54 +0200 Message-ID: <2149723.iZASKD2KPV@kreacher> In-Reply-To: References: <3c88cf35-6725-1bfa-9e1e-8e9d69147e3b@hisilicon.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="UTF-8" X-CLIENT-IP: 89.64.81.188 X-CLIENT-HOSTNAME: 89-64-81-188.dynamic.chello.pl X-VADE-SPAMSTATE: clean X-VADE-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduledrvdehtddgudefhecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfjqffogffrnfdpggftiffpkfenuceurghilhhouhhtmecuudehtdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhephffvufffkfgjfhgggfgtsehtufertddttdejnecuhfhrohhmpedftfgrfhgrvghlucflrdcuhgihshhotghkihdfuceorhhjfiesrhhjfiihshhotghkihdrnhgvtheqnecuggftrfgrthhtvghrnhepvdejlefghfeiudektdelkeekvddugfeghffggeejgfeukeejleevgffgvdeluddtnecukfhppeekledrieegrdekuddrudekkeenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeekledrieegrdekuddrudekkedphhgvlhhopehkrhgvrggthhgvrhdrlhhotggrlhhnvghtpdhmrghilhhfrhhomhepfdftrghfrggvlhculfdrucghhihsohgtkhhifdcuoehrjhifsehrjhifhihsohgtkhhirdhnvghtqedprhgtphhtthhopegthhgvnhigihgrnhhgieeisehhihhsihhlihgtohhnrdgtohhmpdhrtghpthhtoheprhgrfhgrvghlrdhjrdifhihsohgtkhhisehinhhtvghlrdgtohhmpdhrtghpthhtohepjhhohhhnrdhgrghrrhihsehhuhgrfigvihdrtghomhdprhgtphhtthhopehlihhnuhigrghrmheshhhurgifvghirdgtohhmpdhrtghpthhtoheplhhinhhugidqshgtshhisehvghgvrhdrkhgvrhhnvghl rdhorhhgpdhrtghpthhtoheplhhinhhugidqkhgvrhhnvghlsehvghgvrhdrkhgvrhhnvghlrdhorhhgpdhrtghpthhtoheplhhinhhugidqphhmsehvghgvrhdrkhgvrhhnvghlrdhorhhgpdhrtghpthhtohepghhrvghgkhhhsehlihhnuhigfhhouhhnuggrthhiohhnrdhorhhgpdhrtghpthhtohepshgrrhgrvhgrnhgrkhesghhoohhglhgvrdgtohhm X-DCC--Metrics: v370.home.net.pl 1024; Body=9 Fuz1=9 Fuz2=9 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tuesday, May 11, 2021 4:39:31 PM CEST Rafael J. Wysocki wrote: > On 5/11/2021 5:59 AM, chenxiang (M) wrote: > > Hi Rafael and other guys, > > > > I am trying to add a device link between scsi_host->shost_gendev and > > hisi_hba->dev to support runtime PM for hisi_hba driver > > > > (as it supports runtime PM for scsi host in some scenarios such as > > error handler etc, we can avoid to do them again if adding a > > > > device link between scsi_host->shost_gendev and hisi_hba->dev) as > > follows (hisi_sas driver is under directory drivers/scsi/hisi_sas): > > > > device_link_add(&shost->shost_gendev, hisi_hba->dev, > > DL_FLAG_PM_RUNTIME | DL_FLAG_RPM_ACTIVE) > > > > We have a full test on it, and it works well except when rmmod the > > driver, some call trace occurs as follows: > > > > [root@localhost ~]# rmmod hisi_sas_v3_hw > > [ 105.377944] BUG: scheduling while atomic: kworker/113:1/811/0x00000201 > > [ 105.384469] Modules linked in: bluetooth rfkill ib_isert > > iscsi_target_mod ib_ipoib ib_umad iptable_filter vfio_iommu_type1 > > vfio_pci vfio_virqfd vfio rpcrdma ib_is er > > libiscsi scsi_transport_iscsi crct10dif_ce sbsa_gwdt hns_roce_hw_v2 > > hisi_sec2 hisi_hpre hisi_zip hisi_qm uacce spi_hisi_sfc_v3xx > > hisi_trng_v2 rng_core hisi_uncore _hha_pmu > > hisi_uncore_ddrc_pmu hisi_uncore_l3c_pmu spi_dw_mmio hisi_uncore_pmu > > hns3 hclge hnae3 hisi_sas_v3_hw(-) hisi_sas_main libsas > > [ 105.424841] CPU: 113 PID: 811 Comm: kworker/113:1 Kdump: loaded > > Tainted: G W 5.12.0-rc1+ #1 > > [ 105.434454] Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS > > 2280-V2 CS V5.B143.01 04/22/2021 > > [ 105.443287] Workqueue: rcu_gp srcu_invoke_callbacks > > [ 105.448154] Call trace: > > [ 105.450593] dump_backtrace+0x0/0x1a4 > > [ 105.454245] show_stack+0x24/0x40 > > [ 105.457548] dump_stack+0xc8/0x104 > > [ 105.460939] __schedule_bug+0x68/0x80 > > [ 105.464590] __schedule+0x73c/0x77c > > [ 105.465700] BUG: scheduling while atomic: kworker/96:1/791/0x00000201 > > [ 105.468066] schedule+0x7c/0x110 > > [ 105.468068] schedule_timeout+0x194/0x1d4 > > [ 105.474490] Modules linked in: > > [ 105.477692] wait_for_completion+0x8c/0x12c > > [ 105.477695] rcu_barrier+0x1e0/0x2fc > > [ 105.477697] scsi_host_dev_release+0x50/0xf0 > > [ 105.477701] device_release+0x40/0xa0 > > [ 105.477704] kobject_put+0xac/0x100 > > [ 105.477707] __device_link_free_srcu+0x50/0x74 > > [ 105.477709] srcu_invoke_callbacks+0x108/0x1a4 > > [ 105.484743] process_one_work+0x1dc/0x48c > > [ 105.492468] worker_thread+0x7c/0x464 > > [ 105.492471] kthread+0x168/0x16c > > [ 105.492473] ret_from_fork+0x10/0x18 > > ... > > > > After analyse the process, we find that it will > > device_del(&shost->gendev) in function scsi_remove_host() and then > > > > put_device(&shost->shost_gendev) in function scsi_host_put() when > > removing the driver, if there is a link between shost and hisi_hba->dev, > > > > it will try to delete the link in device_del(), and also will > > call_srcu(__device_link_free_srcu) to put_device() link->consumer and > > supplier. > > > > But if put device() for shost_gendev in device_link_free() is later > > than in scsi_host_put(), it will call scsi_host_dev_release() in > > > > srcu_invoke_callbacks() while it is atomic and there are scheduling in > > scsi_host_dev_release(), > > > > so it reports the BUG "scheduling while atomic:...". > > > > thread 1 thread2 > > hisi_sas_v3_remove > > ... > > sas_remove_host() > > ... > > scsi_remove_host() > > ... > > device_del(&shost->shost_gendev) > > ... > > device_link_purge() > > __device_link_del() > > device_unregister(&link->link_dev) > > devlink_dev_release > > call_srcu(__device_link_free_srcu) -----------> > > srcu_invoke_callbacks (atomic) > > __device_link_free_srcu > > ... > > scsi_host_put() > > put_device(&shost->shost_gendev) (ref = 1) > > device_link_free() > > put_device(link->consumer) > > //shost->gendev ref = 0 > > ... > > scsi_host_dev_release > > ... > > rcu_barrier > > kthread_stop() > > > > > > We can check kref of shost->shost_gendev to make sure scsi_host_put() > > to release scsi host device in LLDD driver to avoid the issue, > > > > but it seems be a common issue: function __device_link_free_srcu > > calls put_device() for consumer and supplier, > > > > but if it's ref =0 at that time and there are scheduling or sleep in > > dev_release, it may have the issue. > > > > Do you have any idea about the issue? > > > Yes, this is a general issue. > > If I'm not mistaken, it can be addressed by further deferring the > device_link_free() invocation through a workqueue. > > Let me cut a patch doing this. Please test the patch below and let me know if it works for you. --- drivers/base/core.c | 18 ++++++++++++++++-- include/linux/device.h | 5 ++++- 2 files changed, 20 insertions(+), 3 deletions(-) Index: linux-pm/drivers/base/core.c =================================================================== --- linux-pm.orig/drivers/base/core.c +++ linux-pm/drivers/base/core.c @@ -455,16 +455,30 @@ static void device_link_free(struct devi } #ifdef CONFIG_SRCU +static void __device_link_free_fn(struct work_struct *work) +{ + device_link_free(container_of(work, struct device_link, srcu.work)); +} + static void __device_link_free_srcu(struct rcu_head *rhead) { - device_link_free(container_of(rhead, struct device_link, rcu_head)); + struct device_link *link = container_of(rhead, struct device_link, + srcu.rhead); + struct work_struct *work = &link->srcu.work; + + /* + * Because device_link_free() may sleep in some cases, schedule the + * execution of it instead of invoking it directly. + */ + INIT_WORK(work, __device_link_free_fn); + schedule_work(work); } static void devlink_dev_release(struct device *dev) { struct device_link *link = to_devlink(dev); - call_srcu(&device_links_srcu, &link->rcu_head, __device_link_free_srcu); + call_srcu(&device_links_srcu, &link->srcu.rhead, __device_link_free_srcu); } #else static void devlink_dev_release(struct device *dev) Index: linux-pm/include/linux/device.h =================================================================== --- linux-pm.orig/include/linux/device.h +++ linux-pm/include/linux/device.h @@ -584,7 +584,10 @@ struct device_link { refcount_t rpm_active; struct kref kref; #ifdef CONFIG_SRCU - struct rcu_head rcu_head; + union { + struct rcu_head rhead; + struct work_struct work; + } srcu; #endif bool supplier_preactivated; /* Owned by consumer probe. */ };