Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5932916rwb; Mon, 14 Nov 2022 11:34:28 -0800 (PST) X-Google-Smtp-Source: AA0mqf4rliAFlG5phXQiA+GQXa/RyQM7qy6lyR6RgZ2H14sIBnIuFQYcYQiNRt1oNlJASLEESD4a X-Received: by 2002:a17:902:6b07:b0:186:cb27:4e01 with SMTP id o7-20020a1709026b0700b00186cb274e01mr596435plk.139.1668454468074; Mon, 14 Nov 2022 11:34:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668454468; cv=none; d=google.com; s=arc-20160816; b=FM2pTCjq7CXNNiIgHhWSPXiEbni9XiTfK8KT05BzPNXWLmqVGSW+HMPZCUcvqCrFyv fuvhKuniH4/eK7TE8XWQ3nznSV6/O5YAYdYnQcix3pQmWk8ticxiAVAVgchCPRQpsbeg okNzCelqWC2/GkCmQMYFHv+aEQpFdMgu5Ck/HK8f8IXEQI8Adv3JmQgyd/xF6WSq/gC5 aAuVOxiYBKgbVNec1SLKatbhG9mtsdmr5qCnO+ZMsCYyqDSGb6dS0mE1cIqwJzvg3D0s HieifWlSR1heckVnYPN0vKUf4VePoFREePHTZ1tNnIkKHk17VxVADWuA4qdZrUBdhrh1 Z7Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:content-disposition :content-transfer-encoding:mime-version:in-reply-to:references:cc :user-agent:date:subject:to:from; bh=6ulDv7e9MRJWGJqi/vuYQ6ysFylZfjzYc3gnRmnAGBs=; b=BQfphWTMDxXJvPxA+2N7XcOtjMMLOGYNltzDSKZCEh9Z7h6PYcwPdv+Lo6SZcyud36 PHybHyqcFAQVuw6ttudj+C4+/LbAdYsZCKykVyUzbQThe73DqmzIa/Jjr9oMtpLil++m ves9gyDW9qse264l9PPOmx08Ej4+Gb2Imhpsz4uGfTg01jythAAa+4Fib1vx3jKlB66A 2diU6dIv37iU7Ew3tKvo97YzjjBCtUkpckDRIONBZEnfyA8rwnmVozKIci4PQYFQjJA1 g0xssAsNI+tO7zMri3QAMh7Gr84KwHUAuS8VKnxZQn9xPRT7o787DPq1M/3HrsTYUfUy 1vFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 15-20020a63154f000000b0046ffd5dc0ccsi8733806pgv.433.2022.11.14.11.34.16; Mon, 14 Nov 2022 11:34:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237187AbiKNTZ7 (ORCPT + 88 others); Mon, 14 Nov 2022 14:25:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235772AbiKNTZ6 (ORCPT ); Mon, 14 Nov 2022 14:25:58 -0500 Received: from hosting.gsystem.sk (hosting.gsystem.sk [212.5.213.30]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DEC1423387; Mon, 14 Nov 2022 11:25:55 -0800 (PST) Received: from [192.168.0.2] (chello089173232159.chello.sk [89.173.232.159]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by hosting.gsystem.sk (Postfix) with ESMTPSA id 961FB7A0344; Mon, 14 Nov 2022 20:25:54 +0100 (CET) From: Ondrej Zary To: Damien Le Moal Subject: Re: [PATCH] pata_parport: add driver (PARIDE replacement) Date: Mon, 14 Nov 2022 20:25:46 +0100 User-Agent: KMail/1.9.10 Cc: Christoph Hellwig , Sergey Shtylyov , Jens Axboe , Tim Waugh , linux-block@vger.kernel.org, linux-parport@lists.infradead.org, linux-ide@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220312144415.20010-1-linux@zary.sk> <202211140853.11115.linux@zary.sk> In-Reply-To: X-KMail-QuotePrefix: > MIME-Version: 1.0 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <202211142025.46723.linux@zary.sk> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Monday 14 November 2022 09:03:28 Damien Le Moal wrote: > On 11/14/22 16:53, Ondrej Zary wrote: > > On Monday 14 November 2022, Damien Le Moal wrote: > >> On 11/12/22 20:17, Ondrej Zary wrote: > >>> On Wednesday 19 October 2022 09:34:31 Christoph Hellwig wrote: > >>>> It's been a while - did you get a chance to make some progress on > >>>> this? Do you need any help to unblock you? > >>>> > >>> > >>> Sorry again, I'm back now. Trying to fix locking problems. > >>> Added this to each function for analysis how the functions are called wrt. > >>> locking: > >>> > >>> printk("%s, locked=%d\n", __FUNCTION__, spin_is_locked(ap->lock)); > >> > >> Do you have your code somewhere that we can look at ? > > > > This is the current version with debug printks. I've also added dump_stack() > > to find out the code path but haven't analyzed the output yet. > > Can you send a proper patch ? Or a link to a git tree ? That is easier to > handle than pasted code in an email... Patch against what? I don't have a git server. I've done some call trace analysis. These code paths are calling pata_parport functions with ap->lock locked during init. Comm: kworker, Workqueue: ata_sff ata_sff_pio_task ata_sff_hsm_move -> ata_pio_sectors-> ata_sff_altstatus -> pata_parport_tf_read -> pata_parport_check_altstatus ata_sff_hsm_move -> ata_sff_altstatus -> pata_parport_tf_read -> pata_parport_check_altstatus ata_sff_pio_task -> ata_sff_busy_wait -> pata_parport_check_status ata_sff_hsm_move -> ata_wait_idle -> ata_sff_busy_wait -> pata_parport_check_status ata_sff_hsm_move -> ata_hsm_qc_complete -> ata_sff_irq_on -> ata_wait_idle -> ata_sff_busy_wait -> pata_parport_check_status ata_sff_pio_task -> ata_sff_hsm_move -> ata_pio_sectors -> ata_pio_sector -> ata_pio_xfer -> pata_parport_data_xfer ata_sff_pio_task -> ata_sff_hsm_move -> pata_parport_data_xfer ata_sff_pio_task -> ata_sff_hsm_move -> pata_parport_tf_read ata_sff_hsm_move -> ata_hsm_qc_complete -> ata_qc_complete -> fill_result_tf -> ata_sff_qc_fill_rtf -> pata_parport_tf_read ata_sff_hsm_move -> ata_pio_sectors -> ata_sff_altstatus -> pata_parport_check_altstatus ata_sff_hsm_move -> ata_sff_altstatus -> pata_parport_check_altstatus Comm: modprobe ata_host_start -> ata_eh_freeze_port -> ata_sff_freeze -> pata_parport_check_status Comm: scsi_eh_4 ata_eh_recover -> ata_eh_reset -> ata_eh_thaw_port -> ata_sff_thaw -> ata_sff_irq_on -> ata_wait_idle -> ata_sff_busy_wait -> pata_parport_check_status ata_eh_reset -> ata_eh_freeze_port -> ata_sff_freeze -> pata_parport_check_status ata_scsi_error -> ata_scsi_port_error_handler -> ata_port_freeze -> ata_sff_freeze -> pata_parport_check_status ata_sff_error_handler -> pata_parport_drain_fifo -> pata_parport_check_status -- Ondrej Zary