Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753210AbcDRQjP (ORCPT ); Mon, 18 Apr 2016 12:39:15 -0400 Received: from bh-25.webhostbox.net ([208.91.199.152]:34965 "EHLO bh-25.webhostbox.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752832AbcDRQjN (ORCPT ); Mon, 18 Apr 2016 12:39:13 -0400 Date: Mon, 18 Apr 2016 09:39:18 -0700 From: Guenter Roeck To: Oliver Neukum Cc: Alexey Klimov , yury.norov@gmail.com, wim@iguana.be, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, linux-watchdog@vger.kernel.org Subject: Re: [PATCH v2] watchdog: add driver for StreamLabs USB watchdog device Message-ID: <20160418163918.GE29343@roeck-us.net> References: <1460948016-5453-1-git-send-email-klimov.linux@gmail.com> <1460968368.25119.7.camel@suse.com> <5714E7D3.4030809@roeck-us.net> <1460988518.25119.28.camel@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1460988518.25119.28.camel@suse.com> User-Agent: Mutt/1.5.23 (2014-03-12) X-Authenticated_sender: guenter@roeck-us.net X-OutGoing-Spam-Status: No, score=-1.0 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-Get-Message-Sender-Via: bh-25.webhostbox.net: authenticated_id: guenter@roeck-us.net X-Authenticated-Sender: bh-25.webhostbox.net: guenter@roeck-us.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3103 Lines: 84 On Mon, Apr 18, 2016 at 04:08:38PM +0200, Oliver Neukum wrote: > On Mon, 2016-04-18 at 06:57 -0700, Guenter Roeck wrote: > > On 04/18/2016 01:32 AM, Oliver Neukum wrote: > > > On Mon, 2016-04-18 at 03:53 +0100, Alexey Klimov wrote: > > >> This patch creates new driver that supports StreamLabs usb watchdog > > >> device. This device plugs into 9-pin usb header and connects to > > >> reset pin and reset button on common PC. > > >> > > >> USB commands used to communicate with device were reverse > > >> engineered using usbmon. > > > > > > Almost. I see only one issue. > > > > > >> +struct streamlabs_wdt { > > >> + struct watchdog_device wdt_dev; > > >> + struct usb_interface *intf; > > >> + > > >> + struct mutex lock; > > >> + u8 buffer[BUFFER_LENGTH]; > > > > > > That is wrong. > > > > > >> +}; > > >> + > > > > > > [..] > > > > > >> +static int usb_streamlabs_wdt_command(struct watchdog_device *wdt_dev, u16 cmd) > > >> +{ > > >> + struct streamlabs_wdt *streamlabs_wdt = watchdog_get_drvdata(wdt_dev); > > >> + struct usb_device *usbdev; > > >> + int retval; > > >> + int size; > > >> + unsigned long timeout_msec; > > >> + > > >> + int retry_counter = 10; /* how many times to re-send stop cmd */ > > >> + > > >> + mutex_lock(&streamlabs_wdt->lock); > > >> + > > >> + if (unlikely(!streamlabs_wdt->intf)) { > > >> + mutex_unlock(&streamlabs_wdt->lock); > > >> + return -ENODEV; > > >> + } > > >> + > > >> + usbdev = interface_to_usbdev(streamlabs_wdt->intf); > > >> + timeout_msec = wdt_dev->timeout * MSEC_PER_SEC; > > >> + > > >> + do { > > >> + usb_streamlabs_wdt_prepare_buf((u16 *) streamlabs_wdt->buffer, > > >> + cmd, timeout_msec); > > >> + /* send command to watchdog */ > > >> + retval = usb_interrupt_msg(usbdev, usb_sndintpipe(usbdev, 0x02), > > >> + streamlabs_wdt->buffer, BUFFER_TRANSFER_LENGTH, > > > > > > Because of this line. > > > > > > The problem is subtle. Your buffer and your lock share a cacheline. > > > On some architecture the cache is not consistent with respect to DMA. > > > On them cachelines holding a buffer for DMA need to be flushed to RAM > > > and invalidated and you may read from them only after DMA has finished. > > > > > > Thus you may have prepared a cacheline for DMA but somebody tries taking > > > the lock. Then the cacheline with the lock is read from RAM. If that > > > happens before you finish the DMA the data resulting from DMA is lost. > > > > > > The fix is to allocate the buffer with its own allocation. The VM > > > subsystem makes sure separate allocation don't share cachelines. > > > > > > > Hi Oliver, > > > > For my own education, would adding ____cacheline_aligned to the buffer variable > > declaration solve the problem as well ? > > Possibly. We have never gone that route. The obvious problems is that > I am not sure our alignment is known before boot. > Seems scary. I always thought that the alignment associated with ____cacheline_aligned would be the maximum possible for a given build/architecture. If not, what is the value of having ____cacheline_aligned in the first place ? Thanks, Guenter