Received: by 10.223.185.116 with SMTP id b49csp1063091wrg; Wed, 21 Feb 2018 11:25:46 -0800 (PST) X-Google-Smtp-Source: AH8x225NvCGNKm0ZEuTJcMuqhMm2BK8N50x6rqsjSn3n5baLwwFCBoMX4SuWrxJWXBbeuccmIonS X-Received: by 2002:a17:902:a60d:: with SMTP id u13-v6mr4035985plq.165.1519241146022; Wed, 21 Feb 2018 11:25:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519241145; cv=none; d=google.com; s=arc-20160816; b=xAFLL9ZDmpWy9OBlNqzkKudCMZVspi5cf57OYzz6i8rOx2uMjk8MDxo3YP1Cp48COJ imW/+f3oqyf2L+TFUs5PZgIkNBt6H03scuCk2pP1OV8PIhOqDMmLKCYkpp5WbRUJ+zTE m3D0FwQTsK5QqP4YK7FM/m5WbdzzJj0o2+jQJQXMB4yHyw5n6LYFfHKx/FCKRVtC6rYa Il0PrPSulK9Bj6H+osxiS2CaEe+bcBlcrLFqK61XDGIF69ltrQEiyemxeh6zYVpf1IJC JNnUpbLs6WjfRuv3P/sSX1epl4p01Zi0aDidViHIYL6939dBwCJaYdv4n/bOsVgffu9i BOaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:newsgroups:cc:to:subject :arc-authentication-results; bh=jp2L+Wun8piivJ50ck9bbQRTsbH+sOpnkFAmY9/k+ZY=; b=ZPoEP6g2njffDZue3HQFcfemqaF+pLBx4CBiCONQuGbddztk5P+3r7rfcKNeSEmelB Ob297OoJcnqdLYIGMLKJn8/9xQPiT9D5H9ozEIrs4iQaO7kxyDeTms0DcMi+w7K8fZ6B uDcGTsjy53dKJOCY2vh9VUE6CLWIYHVhQbP5RwcbOhAcuzdobjEkd0T/TypiRfS5tEI9 XNS+N15nwTSvo39nj+2XWh/acsS/IVxVir+2Z3J2BS0NiTT7r6XUQ59LTWEd2hRwBamA qR95/ZuQFoV2x6Y8ARsW1WSVs6HaitjXqda4BH41nDEcggc0FIydUaC6gbgb0G4HtagG 6nqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 140si2124781pfa.318.2018.02.21.11.25.31; Wed, 21 Feb 2018 11:25:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751833AbeBUTYq (ORCPT + 99 others); Wed, 21 Feb 2018 14:24:46 -0500 Received: from us01smtprelay-2.synopsys.com ([198.182.60.111]:39780 "EHLO smtprelay.synopsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751752AbeBUTYm (ORCPT ); Wed, 21 Feb 2018 14:24:42 -0500 Received: from mailhost.synopsys.com (mailhost3.synopsys.com [10.12.238.238]) by smtprelay.synopsys.com (Postfix) with ESMTP id AD35910C00CC; Wed, 21 Feb 2018 11:24:41 -0800 (PST) Received: from mailhost.synopsys.com (localhost [127.0.0.1]) by mailhost.synopsys.com (Postfix) with ESMTP id 8F7FA391F; Wed, 21 Feb 2018 11:24:41 -0800 (PST) Received: from US01WEHTC2.internal.synopsys.com (us01wehtc2-vip.internal.synopsys.com [10.12.239.238]) by mailhost.synopsys.com (Postfix) with ESMTP id 75DDA391E; Wed, 21 Feb 2018 11:24:41 -0800 (PST) Received: from IN01WEHTCB.internal.synopsys.com (10.144.199.106) by US01WEHTC2.internal.synopsys.com (10.12.239.237) with Microsoft SMTP Server (TLS) id 14.3.266.1; Wed, 21 Feb 2018 11:24:41 -0800 Received: from IN01WEHTCA.internal.synopsys.com (10.144.199.103) by IN01WEHTCB.internal.synopsys.com (10.144.199.105) with Microsoft SMTP Server (TLS) id 14.3.266.1; Thu, 22 Feb 2018 00:54:38 +0530 Received: from [10.10.161.84] (10.10.161.84) by IN01WEHTCA.internal.synopsys.com (10.144.199.243) with Microsoft SMTP Server (TLS) id 14.3.266.1; Thu, 22 Feb 2018 00:54:38 +0530 Subject: Re: [PATCH] mmc: dw_mmc: Fix the DTO timeout overflow calculation for 32-bit systems To: Evgeniy Didin , CC: Ulf Hansson , Alexey Brodkin , Douglas Anderson , , , "andy.shevchenko@gmail.com >> Andy Shevchenko" Newsgroups: gmane.linux.kernel.arc,gmane.linux.kernel.mmc,gmane.linux.kernel References: <20180221175734.39114-1-Evgeniy.Didin@synopsys.com> From: Vineet Gupta Message-ID: Date: Wed, 21 Feb 2018 11:24:32 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180221175734.39114-1-Evgeniy.Didin@synopsys.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.10.161.84] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Evgeniy On 02/21/2018 09:57 AM, Evgeniy Didin wrote: > In commit 9d9491a7da2a ("mmc: dw_mmc: Fix the DTO timeout calculation") have been made > changes which can cause multiply overflow for 32-bit systems. Awesome, thx for quickly narrowing it down. I tried the fix and it cures my issue. It was caught on arc/hsdk board > when "drto_ms" should be 671, but it was 70 and that caused a flow of stack-traces just copying > file from mmc. IMHO, the fragment above could be improved. "The broken timeout calculations caused false interrupt latency warnings and stacktrace splat (such as below) when accessing the SD Card." | Running : 4M-check-reassembly-tcp-cmykw2-rotatew2.out -v0 -w1 | - Info: Finished target initialization. | mmcblk0: error -110 transferring data, sector 320544, nr 2048, cmd response | 0x900, card status 0x0 | mmc_host mmc0: Bus speed (slot 0) = 50000000Hz (slot req 400000Hz, actual | 396825HZ div = 63) | mmc_host mmc0: Bus speed (slot 0) = 50000000Hz (slot req 25000000Hz, actual | 25000000HZ div = 1) | ------------[ cut here ]------------ | softirq: huh, entered softirq 6 TASKLET 6f6a9412 with preempt_count 00000101, | exited with 00000100? | WARNING: CPU: 2 PID: 0 at ../lib/scatterlist.c:652 sg_miter_next+0x28/0x20c | Modules linked in: | CPU: 2 PID: 0 Comm: swapper/2 Not tainted 4.15.0 #57 | | Stack Trace: | arc_unwind_core.constprop.1+0xd0/0xf4 | dump_stack+0x68/0x80 | warn_slowpath_null+0x4e/0xec | sg_miter_next+0x28/0x20c | dw_mci_read_data_pio+0x44/0x190 | dw_mmc f000a000.mmc: Unexpected interrupt latency | dw_mci_interrupt+0x3ee/0x530 | __handle_irq_event_percpu+0x56/0x150 | handle_irq_event+0x34/0x78 | handle_level_irq+0x8e/0x120 | generic_handle_irq+0x1c/0x2c | idu_cascade_isr+0x30/0x6c | __handle_domain_irq+0x72/0xc8 | ret_from_exception+0x0/0x8 |---[ end trace 2a58c9af6c25fe51 ]--- > > Lets cast this multiply to long long int which prevents overflow. > > Signed-off-by: Evgeniy Didin > CC: Alexey Brodkin > CC: Douglas Anderson > CC: Ulf Hansson > CC: linux-kernel@vger.kernel.org > CC: linux-snps-arc@lists.infradead.org Tested-by: Vineet Gupta Fixes: ARC STAR 9001306872 HSDK, sdio: board crashes when copying big files > --- > drivers/mmc/host/dw_mmc.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/mmc/host/dw_mmc.c b/drivers/mmc/host/dw_mmc.c > index 0aa39975f33b..1a0b9751c67c 100644 > --- a/drivers/mmc/host/dw_mmc.c > +++ b/drivers/mmc/host/dw_mmc.c > @@ -1944,7 +1944,7 @@ static void dw_mci_set_drto(struct dw_mci *host) > drto_div = (mci_readl(host, CLKDIV) & 0xff) * 2; > if (drto_div == 0) > drto_div = 1; > - drto_ms = DIV_ROUND_UP(MSEC_PER_SEC * drto_clks * drto_div, > + drto_ms = DIV_ROUND_UP((uint64_t)MSEC_PER_SEC * drto_clks * drto_div, > host->bus_hz); > > /* add a bit spare time */ >