Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp274881lqg; Fri, 1 Mar 2024 05:07:33 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUrQoM6KtJhQRM7i5zjkWeFE2aTEhq7kQ7NY894R52dKegjQGM0MWeGSX2eiF9ZYKM3z8+UdU/gmZCBKVRWn15UwZjLBwLZeMNqqIyJOA== X-Google-Smtp-Source: AGHT+IEgv989qWk7cTSOiRjLrIBJkpwyBum9RmmFX5S+P6zzyfGUwaY71saOl7eQ3MWhPsU5CFcV X-Received: by 2002:a17:902:fc47:b0:1dc:b6ef:e237 with SMTP id me7-20020a170902fc4700b001dcb6efe237mr2329607plb.31.1709298453118; Fri, 01 Mar 2024 05:07:33 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709298453; cv=pass; d=google.com; s=arc-20160816; b=BE3iLqVddM1ObdB+9M9JNrZmVgqCzIffd6ZU3JaTBBFAUqywIKC7P+i2Z2FCFuGVsM N/8vtzrY6dl8JRxOeGLt319v72KQviUI5nccRWQq6Ukvb9cI+08YxnK2LF5Z1R2Y9VhE zIFs0p8Nyu2Q/Qj8XYjJ5lN1cRMr71Qo2/GO4MyAa2PK2w7k9nEnL4MgvegT9F2/bauB ftYrzAhUoZ7xTX21lasY/thzWTziQS8o2fiovSEbQtBRIOX6fomgGKajJNbxR7/mlkQs AJGqwjW8HUhtNeu/geqXQUcDrfAjBRWw4QtfxslH7kBySvyQKHwlWcb8qd9tiiW0zNtZ Nzvw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=tUxFP62V22g4bpXDC9T2dSEey2G5PbglTkcrNYCU2U4=; fh=NZWzpEJ0vRK6vS3r2CUbXza2S58BfpgqhZRV1Lxz/oo=; b=FTCnPy97NQW5Rxvv4wrYxy1fOTgjcvWfgaD2u5oCIeF6iviGJ7LZHfexpRO3YRgFMa ePlcgBUGRyEqEy70xipe9RL4tEP2PEsP3BsW9NTRoQrHtbTkzKc7h45ZJpS4wsTiylLx B02oJFXHHpfrT7Uc+RwxprjXTEGX6AE/Rp8JC+8HFTRfhZ2xCEDEadfMMuxG0xq7YwMv 954CTypEDUuUY5dJSA2p/5HmvHjNj0zknbvIkWKJCi/HDWscNIbsnlr1tidOajlImtcR 94u2VfMmdt2pq1iBgQ0TZ0zX5Xxf2bZeF1KIbgbzM+ZiHlW3oxrxMJW0FiSv5vwRdlS9 Z+kA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-88434-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-88434-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id c1-20020a170903234100b001dc8fac925csi3532017plh.310.2024.03.01.05.07.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Mar 2024 05:07:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-88434-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-88434-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-88434-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id DE45AB248FE for ; Fri, 1 Mar 2024 13:06:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3D6416EB4A; Fri, 1 Mar 2024 13:06:02 +0000 (UTC) Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B210C6CDA2; Fri, 1 Mar 2024 13:06:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709298361; cv=none; b=qWe9cc7YzAZzRTfSVZ9Q4g6s3ECsG1JlbXlxE3bGlBtbe6JxgprGZzJ1Gd0yWV7jezxs447IcBuBjpi7HIH379YyOJcZhXwB7YKOX0LWWuO0FK08ecUPZcFZt8YcmR4nvVL0B56/IuLhP2QsbIyGtkefoxih+SdwdMhDmzMKH6I= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709298361; c=relaxed/simple; bh=CjDE5ydNR/BncURT9vZlYDlNHu0bNpYjqN4jeVRjGyo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=rEQEvQUujosVusR+1TDIo2+9vGjtodoE5ABTV2kzBlQ6umH/rsfYxOIf6MWJVRnlG2E4IJllTHIMJXMmHIIWf0onT95ImVAv3ly93KzgrGgeC56x13upcDzQ/Ei3A6cLwA44ikwIU86Pk6GIYIB1D77s7zsJh+h0WwvCgM/MV2g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 264E1C433C7; Fri, 1 Mar 2024 13:05:57 +0000 (UTC) From: Huacai Chen To: Peter Zijlstra , Ingo Molnar , Will Deacon , Arnd Bergmann Cc: Huacai Chen , Waiman Long , Boqun Feng , Guo Ren , Rui Wang , WANG Xuerui , Jiaxun Yang , linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, Huacai Chen Subject: [PATCH 2/2] mmiowb: Hook up mmiowb helpers to mutexes as well as spinlocks Date: Fri, 1 Mar 2024 21:05:32 +0800 Message-ID: <20240301130532.3953167-2-chenhuacai@loongson.cn> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240301130532.3953167-1-chenhuacai@loongson.cn> References: <20240301130532.3953167-1-chenhuacai@loongson.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Commit fb24ea52f78e0d595852e ("drivers: Remove explicit invocations of mmiowb()") remove all mmiowb() in drivers, but it says: "NOTE: mmiowb() has only ever guaranteed ordering in conjunction with spin_unlock(). However, pairing each mmiowb() removal in this patch with the corresponding call to spin_unlock() is not at all trivial, so there is a small chance that this change may regress any drivers incorrectly relying on mmiowb() to order MMIO writes between CPUs using lock-free synchronisation." The mmio in radeon_ring_commit() is protected by a mutex rather than a spinlock, but in the mutex fastpath it behaves similar to spinlock. We can add mmiowb() calls in the radeon driver but the maintainer says he doesn't like such a workaround, and radeon is not the only example of mutex protected mmio. So we extend the mmiowb tracking system from spinlock to mutex, hook up mmiowb helpers to mutexes as well as spinlocks. Without this, we get such an error when run 'glxgears' on weak ordering architectures such as LoongArch: radeon 0000:04:00.0: ring 0 stalled for more than 10324msec radeon 0000:04:00.0: ring 3 stalled for more than 10240msec radeon 0000:04:00.0: GPU lockup (current fence id 0x000000000001f412 last fence id 0x000000000001f414 on ring 3) radeon 0000:04:00.0: GPU lockup (current fence id 0x000000000000f940 last fence id 0x000000000000f941 on ring 0) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) radeon 0000:04:00.0: scheduling IB failed (-35). [drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35) Link: https://lore.kernel.org/dri-devel/29df7e26-d7a8-4f67-b988-44353c4270ac@amd.com/T/#t Signed-off-by: Huacai Chen --- kernel/locking/mutex.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/kernel/locking/mutex.c b/kernel/locking/mutex.c index cbae8c0b89ab..f51d09aec643 100644 --- a/kernel/locking/mutex.c +++ b/kernel/locking/mutex.c @@ -127,8 +127,10 @@ static inline struct task_struct *__mutex_trylock_common(struct mutex *lock, boo } if (atomic_long_try_cmpxchg_acquire(&lock->owner, &owner, task | flags)) { - if (task == curr) + if (task == curr) { + mmiowb_in_lock(); return NULL; + } break; } } @@ -168,8 +170,10 @@ static __always_inline bool __mutex_trylock_fast(struct mutex *lock) unsigned long curr = (unsigned long)current; unsigned long zero = 0UL; - if (atomic_long_try_cmpxchg_acquire(&lock->owner, &zero, curr)) + if (atomic_long_try_cmpxchg_acquire(&lock->owner, &zero, curr)) { + mmiowb_in_lock(); return true; + } return false; } @@ -178,6 +182,7 @@ static __always_inline bool __mutex_unlock_fast(struct mutex *lock) { unsigned long curr = (unsigned long)current; + mmiowb_in_unlock(); return atomic_long_try_cmpxchg_release(&lock->owner, &curr, 0UL); } #endif @@ -918,6 +923,7 @@ static noinline void __sched __mutex_unlock_slowpath(struct mutex *lock, unsigne * Except when HANDOFF, in that case we must not clear the owner field, * but instead set it to the top waiter. */ + mmiowb_in_unlock(); owner = atomic_long_read(&lock->owner); for (;;) { MUTEX_WARN_ON(__owner_task(owner) != current); -- 2.43.0