Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2465112imm; Mon, 28 May 2018 08:34:51 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpK69nPDpJ4Q5Ad8k14ajj69SZNKMYoPY5GcXPBuofLRF2uX7yh3Qk2rFGRKlz9vjIxn+lr X-Received: by 2002:a62:8345:: with SMTP id h66-v6mr14106897pfe.0.1527521691024; Mon, 28 May 2018 08:34:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527521690; cv=none; d=google.com; s=arc-20160816; b=GkJzqkVjOEc4PpXafINByX1+gDZjM5J1bzxGaxq/DQzb7ume9RnqdgA4AAwTtHiAd4 JKj3wO0plPdI1iVGx7R3eFNFqU5uAiNH6xYS93SAqoGHucx3U1qeCOOgRnxr/eUsLcN6 rXRZ0pZig8BAKRdefb37zpr8C3lPr4FUegIO7l+/jtbfEP6I4zpPzQHi+S1ODPkXnGuM CE8zegqt2WhKY415bdStpYteLtHEpI7fULL6we+NuRJiQsp8B1lgQwAB14/zeh3YIDLT sFwNDLa6pXG0ipAzLYFKHFRPL3GzNpW5EO3zm3UK47qppx9YxZRHTeZGG30+L2eI29g7 YuWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=ftmcsT7Vo7YdtV0B7O0IDoopUl1kbVFyPPzEFny/dUs=; b=f7JZzyBiovwtXddaECSaVf8zSRZVDvyy3MKiOA0qBeZNTLGrfAi44h2D8H3mzSJzzb FIgeMfs6f/pycRlDDlWFiMmwpaMac/aoJXntXdOT9UlE/7hb72l4FZmkdQyCQCys7paw B/BLtmdJl9J/x8SJCbfF3wQ09jpl7kbh2rgi2HNGs/eWgA+gxHJoSASb77dGXgnjN3Um ILdmGpUl/E2I1Cx4Dhp0AnTzki+OWMy/C8mN+ze4f1WdPdZFyOj1LTKJ3faMbQh+Tt23 +J0+4RpLZQ3JDtJ/d00WbQLwFbLyGlQ5m0/TsoX/jFdbpnJhPxrKdyZFwIWNPNGhG6zt oAnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amarulasolutions.com header.s=google header.b=Tu54Hoa0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v66-v6si30154020pfv.48.2018.05.28.08.34.36; Mon, 28 May 2018 08:34:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amarulasolutions.com header.s=google header.b=Tu54Hoa0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034529AbeE1PeE (ORCPT + 99 others); Mon, 28 May 2018 11:34:04 -0400 Received: from mail-wm0-f67.google.com ([74.125.82.67]:35801 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1032399AbeE1Pd6 (ORCPT ); Mon, 28 May 2018 11:33:58 -0400 Received: by mail-wm0-f67.google.com with SMTP id o78-v6so33182090wmg.0 for ; Mon, 28 May 2018 08:33:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amarulasolutions.com; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ftmcsT7Vo7YdtV0B7O0IDoopUl1kbVFyPPzEFny/dUs=; b=Tu54Hoa0Nt3mb0KpWexFFvVP0A0cRJgD4jqy+wE/4NqbQEDEKhSm9K8oIqpNyRsQD0 /lDQRWcaEssPu/0+IWelVPkbMmk259RQJCc5JghfjDCzVRb3bxH7TljkVYhtywAuF7P7 vPPdhL7hnIoIXmNSifbBdHCW3mM3AIfTQdl3Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ftmcsT7Vo7YdtV0B7O0IDoopUl1kbVFyPPzEFny/dUs=; b=dpTxw1gCZrtSi4q63+w7SCWED5Q12mYz3j/7udv4ckHLRemDlq8aPmd7q2AkRXnfxJ veQ1f0iL0r03q9jnWKm34Sg+iOi2+w1ui8Bm8HYpaQhyLfztfvJUNFsJOAvKvrRyXMjY l62V3Gee6uyaQ0kDEGamPsf4HGXnSqByis9Jutf3tiyvCJwEZU+/6TAKfDOA2Hu4OfUs i3vTak237wjuorW/owCr++eo/n/aTWOnQvmhcuvUnILk56XBsEgQJf+MfNKX3us0DF3o /qMHD4BZyFUFFtGzzUUz6GRQ0g4dV//4gLQtZQsBvDuHjl2WE5UlJVDAVbOnZWRtHdx4 TvYA== X-Gm-Message-State: ALKqPweOq/EHtKqdvbkTrgwAQD5zIf1D1Jqu71xhGM8wLHvwagtAVtKh or/5NYe7QF/FBah1OmbZ0Wj+CS+ArEcIupVELKW9zA== X-Received: by 2002:a1c:c241:: with SMTP id s62-v6mr10169690wmf.112.1527521637185; Mon, 28 May 2018 08:33:57 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:adf:8684:0:0:0:0:0 with HTTP; Mon, 28 May 2018 08:33:56 -0700 (PDT) In-Reply-To: References: <1527493857-2220-1-git-send-email-michael@amarulasolutions.com> <5B0BD13D.8000809@broadcom.com> From: Michael Nazzareno Trimarchi Date: Mon, 28 May 2018 17:33:56 +0200 Message-ID: Subject: Re: [PATCH] brcmfmac: stop watchdog before detach and free everything To: Andy Shevchenko Cc: Arend van Spriel , Franky Lin , Hante Meuleman , Chi-Hsien Lin , Wright Feng , Kalle Valo , "David S. Miller" , Pieter-Paul Giesberts , Ian Molton , "open list:TI WILINK WIRELES..." , "open list:BROADCOM BRCM80211 IEEE802.11n WIRELESS DRIVER" , brcm80211-dev-list@cypress.com, netdev , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Andy The problem seems really easy to solve: diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c index 412a05b..ba60b151 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c @@ -4227,13 +4227,7 @@ struct brcmf_sdio *brcmf_sdio_probe(struct brcmf_sdio_dev *sdiodev) timer_setup(&bus->timer, brcmf_sdio_watchdog, 0); /* Initialize watchdog thread */ init_completion(&bus->watchdog_wait); - bus->watchdog_tsk = kthread_run(brcmf_sdio_watchdog_thread, - bus, "brcmf_wdog/%s", - dev_name(&sdiodev->func1->dev)); - if (IS_ERR(bus->watchdog_tsk)) { - pr_warn("brcmf_watchdog thread failed to start\n"); - bus->watchdog_tsk = NULL; - } + /* Initialize DPC thread */ bus->dpc_triggered = false; bus->dpc_running = false; @@ -4281,6 +4275,14 @@ struct brcmf_sdio *brcmf_sdio_probe(struct brcmf_sdio_dev *sdiodev) goto fail; } + bus->watchdog_tsk = kthread_run(brcmf_sdio_watchdog_thread, + bus, "brcmf_wdog/%s", + dev_name(&sdiodev->func1->dev)); + if (IS_ERR(bus->watchdog_tsk)) { + pr_warn("brcmf_watchdog thread failed to start\n"); + bus->watchdog_tsk = NULL; + } + return bus; Just look here ret = brcmf_fw_get_firmwares(sdiodev->dev, fwreq, brcmf_sdio_firmware_callback); if (ret != 0) { brcmf_err("async firmware request failed: %d\n", ret); kfree(fwreq); goto fail; } bus->watchdog_tsk = kthread_run(brcmf_sdio_watchdog_thread, bus, "brcmf_wdog/%s", dev_name(&sdiodev->func1->dev)); if (IS_ERR(bus->watchdog_tsk)) { pr_warn("brcmf_watchdog thread failed to start\n"); bus->watchdog_tsk = NULL; } return bus; fail: brcmf_sdio_remove(bus); return NULL; On Mon, May 28, 2018 at 5:29 PM, Michael Nazzareno Trimarchi wrote: > Hi > > On Mon, May 28, 2018 at 5:25 PM, Andy Shevchenko > wrote: >> On Mon, May 28, 2018 at 12:54 PM, Michael Nazzareno Trimarchi >> wrote: >>> Hi Arend >>> >>> On Mon, May 28, 2018 at 11:51 AM, Arend van Spriel >>> wrote: >>>> On 5/28/2018 9:50 AM, Michael Trimarchi wrote: >>>>> >>>>> Watchdog need to be stopped in brcmf_sdio_remove to avoid >>>>> i >>>>> The system is going down NOW! >>>>> [ 1348.110759] Unable to handle kernel NULL pointer dereference at virtual >>>>> address 000002f8 >>>>> Sent SIGTERM to all processes >>>>> [ 1348.121412] Mem abort info: >>>>> [ 1348.126962] ESR = 0x96000004 >>>>> [ 1348.130023] Exception class = DABT (current EL), IL = 32 bits >>>>> [ 1348.135948] SET = 0, FnV = 0 >>>>> [ 1348.138997] EA = 0, S1PTW = 0 >>>>> [ 1348.142154] Data abort info: >>>>> [ 1348.145045] ISV = 0, ISS = 0x00000004 >>>>> [ 1348.148884] CM = 0, WnR = 0 >>>>> [ 1348.151861] user pgtable: 4k pages, 48-bit VAs, pgdp = (____ptrval____) >>>>> [ 1348.158475] [00000000000002f8] pgd=0000000000000000 >>>>> [ 1348.163364] Internal error: Oops: 96000004 [#1] PREEMPT SMP >>>>> [ 1348.168927] Modules linked in: ipv6 >>>>> [ 1348.172421] CPU: 3 PID: 1421 Comm: brcmf_wdog/mmc0 Not tainted >>>>> 4.17.0-rc5-next-20180517 #18 >>>>> [ 1348.180757] Hardware name: Amarula A64-Relic (DT) >>>>> [ 1348.185455] pstate: 60000005 (nZCv daif -PAN -UAO) >>>>> [ 1348.190251] pc : brcmf_sdiod_freezer_count+0x0/0x20 >>>>> [ 1348.195124] lr : brcmf_sdio_watchdog_thread+0x64/0x290 >>>> >>>> >>>> Hi Michael, >>>> >>>> Thanks for the patch. In normal scenario the callstack looks like this: >>>> >>>> brcmf_sdio_remove() >>>> -> brcmf_detach() >>>> -> brcmf_bus_stop() >>>> -> brcmf_sdio_bus_stop() >>>> >>>> In brcmf_sdio_bus_stop() the watchdog is terminated. So in what scenario did >>>> you encounter this null pointer deref? >>> >>> Is this happen even when there is not wifi firmware? >>> boot without any firmware in the filesystem and then trigger a reboot >> >> Something like the above I had noticed for a long (couple of kernel >> releases?) time, but wasn't a big priority to me. >> Though, I can test this on my side. >> >> P.S. I think rmmod or echo > unbind will trigger that as well. >> > > Right now the module is compiled in the kernel. I can dig down tonight > on this if needed > > Michael > >> -- >> With Best Regards, >> Andy Shevchenko > > > > -- > | Michael Nazzareno Trimarchi Amarula Solutions BV | > | COO - Founder Cruquiuskade 47 | > | +31(0)851119172 Amsterdam 1018 AM NL | > | [`as] http://www.amarulasolutions.com | -- | Michael Nazzareno Trimarchi Amarula Solutions BV | | COO - Founder Cruquiuskade 47 | | +31(0)851119172 Amsterdam 1018 AM NL | | [`as] http://www.amarulasolutions.com |