[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <389deec70911021643t6897f21fv52cc660e5f5d67e5@mail.gmail.com>
Date: Tue, 3 Nov 2009 08:43:54 +0800
From: hank peng <pengxihan@...il.com>
To: Dan Williams <dan.j.williams@...el.com>
Cc: Vishnu Suresh <Vishnu@...escale.com>, linuxppc-dev@...abs.org,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-raid@...r.kernel.org, herbert@...dor.apana.org.au,
Kim Phillips <kim.phillips@...escale.com>,
Dipen Dudhat <Dipen.Dudhat@...escale.com>,
Maneesh Gupta <Maneesh.Gupta@...escale.com>
Subject: Re: [PATCH v0 2/2] Crypto: Talitos: Support for Async_tx XOR offload
I have tested this patch on my MPC8548 machine box, kernel version is
2.6.30. There is a problem.
#mdadm -C /dev/md0 -l5 -n3 /dev/sd{a,b,c}
Recovery can be done successfully, interrupts looks normal.
# cat /proc/interrupts
CPU0
16: 16091057 OpenPIC Level mvSata
17: 0 OpenPIC Level mvSata
18: 4 OpenPIC Level phy_interrupt, phy_interrupt
20: 39 OpenPIC Level fsldma-channel
21: 0 OpenPIC Level fsldma-channel
22: 0 OpenPIC Level fsldma-channel
23: 0 OpenPIC Level fsldma-channel
29: 241 OpenPIC Level eth0_tx
30: 1004692 OpenPIC Level eth0_rx
34: 0 OpenPIC Level eth0_er
35: 0 OpenPIC Level eth1_tx
36: 0 OpenPIC Level eth1_rx
40: 0 OpenPIC Level eth1_er
42: 73060 OpenPIC Level serial
43: 9854 OpenPIC Level i2c-mpc, i2c-mpc
45: 61264188 OpenPIC Level talitos
BAD: 0
Then, I plan to create a VG, but problem occured.
#pvcreate /dev/md0
After I input this command, system hangs there without any messages.
BTW, all is OK before using this patch.
2009/10/30 Dan Williams <dan.j.williams@...el.com>:
> On Wed, Oct 14, 2009 at 11:41 PM, Vishnu Suresh <Vishnu@...escale.com> wrote:
> [..]
>> diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig
>> index b08403d..343e578 100644
>> --- a/drivers/crypto/Kconfig
>> +++ b/drivers/crypto/Kconfig
>> @@ -192,6 +192,8 @@ config CRYPTO_DEV_TALITOS
>> select CRYPTO_ALGAPI
>> select CRYPTO_AUTHENC
>> select HW_RANDOM
>> + select DMA_ENGINE
>> + select ASYNC_XOR
>
> You need only select DMA_ENGINE. ASYNC_XOR is selected by its users.
>
>> depends on FSL_SOC
>> help
>> Say 'Y' here to use the Freescale Security Engine (SEC)
>> diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c
>> index c47ffe8..84819d4 100644
>> --- a/drivers/crypto/talitos.c
>> +++ b/drivers/crypto/talitos.c
> [..]
>> +static void talitos_process_pending(struct talitos_xor_chan *xor_chan)
>> +{
>> + struct talitos_xor_desc *desc, *_desc;
>> + unsigned long flags;
>> + int status;
>> +
>> + spin_lock_irqsave(&xor_chan->desc_lock, flags);
>> +
>> + list_for_each_entry_safe(desc, _desc, &xor_chan->pending_q, node) {
>> + status = talitos_submit(xor_chan->dev, &desc->hwdesc,
>> + talitos_release_xor, desc);
>> + if (status != -EINPROGRESS)
>> + break;
>> +
>> + list_del(&desc->node);
>> + list_add_tail(&desc->node, &xor_chan->in_progress_q);
>> + }
>> +
>> + spin_unlock_irqrestore(&xor_chan->desc_lock, flags);
>> +}
>
> The driver uses spin_lock_bh everywhere else which is either a bug, or
> this code is being overly protective. In any event lockdep will
> rightly complain about this. The API and its users do not submit
> operations in hard-irq context.
>
>> +
>> +static void talitos_release_xor(struct device *dev, struct talitos_desc *hwdesc,
>> + void *context, int error)
>> +{
>> + struct talitos_xor_desc *desc = context;
>> + struct talitos_xor_chan *xor_chan;
>> + dma_async_tx_callback callback;
>> + void *callback_param;
>> +
>> + if (unlikely(error)) {
>> + dev_err(dev, "xor operation: talitos error %d\n", error);
>> + BUG();
>> + }
>> +
>> + xor_chan = container_of(desc->async_tx.chan, struct talitos_xor_chan,
>> + common);
>> + spin_lock_bh(&xor_chan->desc_lock);
>> + if (xor_chan->completed_cookie < desc->async_tx.cookie)
>> + xor_chan->completed_cookie = desc->async_tx.cookie;
>> +
>> + callback = desc->async_tx.callback;
>> + callback_param = desc->async_tx.callback_param;
>> +
>> + if (callback) {
>> + spin_unlock_bh(&xor_chan->desc_lock);
>> + callback(callback_param);
>> + spin_lock_bh(&xor_chan->desc_lock);
>> + }
>
> You do not need to unlock to call the callback. Users of the API
> assume that they are called in bh context and that they are not
> allowed to submit new operations directly from the callback (this
> simplifies the descriptor cleanup routines in other drivers).
>
>> +
>> + list_del(&desc->node);
>> + list_add_tail(&desc->node, &xor_chan->free_desc);
>> + spin_unlock_bh(&xor_chan->desc_lock);
>> + if (!list_empty(&xor_chan->pending_q))
>> + talitos_process_pending(xor_chan);
>> +}
>
> It appears this routine is missing a call to dma_run_dependencies()?
> This is needed if another channel is handling memory copy offload. I
> assume this is the case due to your other patch to fsldma. See
> iop_adma_run_tx_complete_actions(). If this xor resource can also
> handle copy operations that would be more efficient as it eliminates
> channel switching. See the ioatdma driver and its use of
> ASYNC_TX_DISABLE_CHANNEL_SWITCH.
>
>> +static struct dma_async_tx_descriptor * talitos_prep_dma_xor(
>> + struct dma_chan *chan, dma_addr_t dest, dma_addr_t *src,
>> + unsigned int src_cnt, size_t len, unsigned long flags)
>> +{
>> + struct talitos_xor_chan *xor_chan;
>> + struct talitos_xor_desc *new;
>> + struct talitos_desc *desc;
>> + int i, j;
>> +
>> + BUG_ON(unlikely(len > TALITOS_MAX_DATA_LEN));
>> +
>> + xor_chan = container_of(chan, struct talitos_xor_chan, common);
>> +
>> + spin_lock_bh(&xor_chan->desc_lock);
>> + if (!list_empty(&xor_chan->free_desc)) {
>> + new = container_of(xor_chan->free_desc.next,
>> + struct talitos_xor_desc, node);
>> + list_del(&new->node);
>> + } else {
>> + new = talitos_xor_alloc_descriptor(xor_chan, GFP_KERNEL);
>> + }
>> + spin_unlock_bh(&xor_chan->desc_lock);
>> +
>> + if (!new) {
>> + dev_err(xor_chan->common.device->dev,
>> + "No free memory for XOR DMA descriptor\n");
>> + return NULL;
>> + }
>> + dma_async_tx_descriptor_init(&new->async_tx, &xor_chan->common);
>> +
>> + INIT_LIST_HEAD(&new->node);
>> + INIT_LIST_HEAD(&new->tx_list);
>
> You can save some overhead in the fast path by moving this
> initialization to talitos_xor_alloc_descriptor.
>
>> +
>> + desc = &new->hwdesc;
>> + /* Set destination: Last pointer pair */
>> + to_talitos_ptr(&desc->ptr[6], dest);
>> + desc->ptr[6].len = cpu_to_be16(len);
>> + desc->ptr[6].j_extent = 0;
>> +
>> + /* Set Sources: End loading from second-last pointer pair */
>> + for (i = 5, j = 0; (j < src_cnt) && (i > 0); i--, j++) {
>> + to_talitos_ptr(&desc->ptr[i], src[j]);
>> + desc->ptr[i].len = cpu_to_be16(len);
>> + desc->ptr[i].j_extent = 0;
>> + }
>> +
>> + /*
>> + * documentation states first 0 ptr/len combo marks end of sources
>> + * yet device produces scatter boundary error unless all subsequent
>> + * sources are zeroed out
>> + */
>> + for (; i >= 0; i--) {
>> + to_talitos_ptr(&desc->ptr[i], 0);
>> + desc->ptr[i].len = 0;
>> + desc->ptr[i].j_extent = 0;
>> + }
>> +
>> + desc->hdr = DESC_HDR_SEL0_AESU | DESC_HDR_MODE0_AESU_XOR
>> + | DESC_HDR_TYPE_RAID_XOR;
>> +
>> + new->async_tx.parent = NULL;
>> + new->async_tx.next = NULL;
>
> These fields are managed by the async_tx channel switch code. No need
> to manage it here.
>
>> + new->async_tx.cookie = 0;
>
> This is set below to -EBUSY, it's redundant to touch it here.
>
>> + async_tx_ack(&new->async_tx);
>
> This makes it impossible to attach a dependency to this operation.
> Not sure this is what you want.
>
> --
> Dan
> --
> To unsubscribe from this list: send the line "unsubscribe linux-raid" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
--
The simplest is not all best but the best is surely the simplest!
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists