lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000001da3869$ca643fa0$5f2cbee0$@samsung.com> Date: Wed, 27 Dec 2023 11:09:57 +0900 From: "bumyong.lee" <bumyong.lee@...sung.com> To: "'Chen-Yu Tsai'" <wens@...nel.org>, "'Vinod Koul'" <vkoul@...nel.org> Cc: <p.zabel@...gutronix.de>, <dmaengine@...r.kernel.org>, <linux-kernel@...r.kernel.org> Subject: RE: [PATCH] dmaengine: pl330: issue_pending waits until WFP state Hello. > On Thu, Dec 21, 2023 at 10:00:26PM +0530, Vinod Koul wrote: > > This seems to cause a stall on my Quartz 64 model B (RK3566) once > Bluetooth over UART is initialized, when combined with a patch of mine > that enables DMA on UARTs [1]. Reverting this patch gets everything > running again. > > The following are RCU stalls detected, followed by stack traces produced > with pseudo-NMI. Without pseudo-NMIs no stack traces are produced. > > rcu: INFO: rcu_sched detected stalls on CPUs/tasks: > rcu: 0-...0: (0 ticks this GP) idle=80fc/1/0x4000000000000000 > softirq=693/693 fqs=31498 > rcu: 3-...0: (3 ticks this GP) idle=2b44/1/0x4000000000000000 > softirq=553/556 fqs=31498 > rcu: (detected by 1, t=162830 jiffies, g=-307, q=32 ncpus=4) > Sending NMI from CPU 1 to CPUs 0: > NMI backtrace for cpu 0 > CPU: 0 PID: 1200 Comm: (udev-worker) Not tainted 6.7.0-rc6-next- > 20231222-10300-g8b07e3811bc7 #17 > Hardware name: Pine64 RK3566 Quartz64-B Board (DT) > pstate: 00400009 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : queued_spin_lock_slowpath+0x50/0x330 > lr : pl330_irq_handler+0x2f8/0x5a0 > sp : ffffffc080003ec0 > pmr_save: 00000060 > x29: ffffffc080003ec0 x28: ffffff80017c7000 x27: ffffff8001a58d80 > x26: 0000000000000060 x25: ffffff80017d0338 x24: ffffff800161ae38 > x23: ffffff8001597c00 x22: ffffffc081960000 x21: 0000000000000000 > x20: ffffff800161ac80 x19: ffffff80010c5180 x18: 0000000000000000 > x17: ffffffc06e724000 x16: ffffffc080000000 x15: 0000000000000000 > x14: 0000000000000000 x13: ffffff80042f102f x12: ffffffc083ad3cc4 > x11: 0000000000000040 x10: ffffff800022a0a8 x9 : ffffff800022a0a0 > x8 : ffffff8000400270 x7 : 0000000000000000 x6 : 0000000000000000 > x5 : ffffff8000400248 x4 : ffffffc06e724000 x3 : ffffffc080003fa0 > x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff800161ae38 > Call trace: > queued_spin_lock_slowpath+0x50/0x330 > __handle_irq_event_percpu+0x38/0x16c > handle_irq_event+0x44/0xf8 > handle_fasteoi_irq+0xb0/0x28c > generic_handle_domain_irq+0x2c/0x44 > gic_handle_irq+0x10c/0x240 > call_on_irq_stack+0x24/0x4c > do_interrupt_handler+0x80/0x8c > el1_interrupt+0x44/0x98 > el1h_64_irq_handler+0x18/0x24 > el1h_64_irq+0x78/0x7c > __d_rehash+0x0/0x94 > d_add+0x40/0x80 > simple_lookup+0x4c/0x78 > path_openat+0x5ec/0xed0 > do_filp_open+0x80/0x12c > do_sys_openat2+0xb4/0xe8 > __arm64_sys_openat+0x64/0xa4 > invoke_syscall+0x48/0x114 > el0_svc_common.constprop.0+0x40/0xe0 > do_el0_svc+0x1c/0x28 > el0_svc+0x34/0xd4 > el0t_64_sync_handler+0x100/0x12c > el0t_64_sync+0x1a4/0x1a8 > Sending NMI from CPU 1 to CPUs 3: > NMI backtrace for cpu 3 > CPU: 3 PID: 31 Comm: kworker/3:0 Not tainted 6.7.0-rc6-next-20231222- > 10300-g8b07e3811bc7 #17 > Hardware name: Pine64 RK3566 Quartz64-B Board (DT) > Workqueue: events hci_uart_write_work [hci_uart] > pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > pc : _state+0x2c/0x138 > lr : pl330_start_thread.isra.0+0x2e0/0x32c > sp : ffffffc08157bb20 > pmr_save: 00000060 > x29: ffffffc08157bb20 x28: 0000000000000000 x27: 0000000000000060 > x26: ffffffc080c4e658 x25: 0000000000000060 x24: 0000000001a20000 > x23: ffffff8001555000 x22: ffffffc081960020 x21: ffffff800161b068 > x20: 0000000000000000 x19: ffffff800161b050 x18: ffffffffffffffff > x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000001 > x14: 0000000000000004 x13: 0000000000000009 x12: 0000000000000005 > x11: 0000000000000027 x10: 000000000000002b x9 : 0000000000000032 > x8 : ffffffc08154521d x7 : 0000000000000005 x6 : 0000000000000010 > x5 : 0000000000000001 x4 : ffffffc081960d04 x3 : ffffff800161b280 > x2 : ffffff800161b050 x1 : 0000000000204000 x0 : 0000000000000108 > Call trace: > _state+0x2c/0x138 > pl330_tasklet+0x1f8/0x818 > pl330_issue_pending+0x150/0x178 > serial8250_tx_dma+0x150/0x21c > serial8250_start_tx+0x9c/0x1c0 > __uart_start+0x74/0xfc > uart_write+0xfc/0x2f0 > ttyport_write_buf+0x4c/0x90 > serdev_device_write_buf+0x24/0x38 > hci_uart_write_work+0x54/0x164 [hci_uart] > process_one_work+0x13c/0x2bc > worker_thread+0x2a0/0x52c > kthread+0xe0/0xe4 > ret_from_fork+0x10/0x20 I think the dma channel already passed WFP state. The errata[1] says that 4. The driver polls the status of channel 0 until it observes that it has entered the "Waiting for peripheral" state 5. The driver enables the peripheral to allow it to issue DMA requests When I review 8250_dma.c, I think serial8250_do_prepare_tx_dma() of serial8250_tx_dma() would enable peripheral to allow issue DMA requests. serial8250_do_prepare_tx_dma(p) performs before dma_async_issue_pending() It means that serial8250_tx_dma() has reversed sequence step 4 and 5 for pl330. But I'm not sure if the errata suggests normal slave driver dma usage sequence or not. If it is abnormal sequence, I think it should be handled by quirk [1]: https://developer.arm.com/documentation/genc008428/latest
Powered by blists - more mailing lists