Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1281993imm; Wed, 25 Jul 2018 15:10:47 -0700 (PDT) X-Google-Smtp-Source: AAOMgpezyJW0xQiSrZQzkcSM4nSHBj6GyfuczdsVngkatgi2N3xmn0IN/QxnMVxRbXPboP1g5eg5 X-Received: by 2002:a17:902:5a83:: with SMTP id r3-v6mr22228946pli.78.1532556647127; Wed, 25 Jul 2018 15:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532556647; cv=none; d=google.com; s=arc-20160816; b=reCNKzuhq9Jt1zRNclQUE+qAcZHnLepeGNVsbdbTm/hntQxWRa2xChk5hzTOnDZmd7 5whM2ddJCFcLWZpgCOupW42yWoKsmU8s7ZSTPDtYWvv87quw9WWtimEWfH1gH9jcdOvi FwcvrBZ1Z/VXj+R3qExPS8BdZuOJS11SBddy5k9wukW4PE8GEgXfxYwNzJYE5RHIju1h QmriSltmwGdxLIPsCpu7SKzorkArARZf6653iTn1+KC3ZvNDnqn40M1GqZVOvcc3P9iK 6Dal77fXxzDbsFrmWi0hdJpH7frHCRPcbrmYZzl4UcaC7e7SlqJX3RTepQI4bIPMpjKk avnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=lAZfQ4jqXPUAcGQrW9+/fWptYBZbr6cDK3WE114G/fQ=; b=K92koROgJRQKtcysLI7cAgf0ncbMvsIMKc3eEsis1Wq/FGr36lVtE3FtaKJjelXIR/ Vs5MiQG4WX4+AZhRMX7Xznzx+c1wI+NGRld0Sq8ZDVrdNU382MppuGCYtV2UWRnprrBX Jot8rVkWWC9kHljQ+BjGxJA49H4SW/q8Q3AiWVhHx0GGMAMlI/ZbDxYssPadhq678px9 iw0wRDkC4fgo3Obq8Kc4K0ZBA8zWgmfEvjF1vrAi04mqr/6L2KFwH+8uv5KmIu1HO026 W6HJvkTGcbZl2pu3DFI3a2YWDSa2EIEX4mKzUFavDEY+Vfju2HJuf/mDnSEP4sAt8eLu tFqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=uYIENqwM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t4-v6si6779259plq.324.2018.07.25.15.10.31; Wed, 25 Jul 2018 15:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=uYIENqwM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731422AbeGYXWm (ORCPT + 99 others); Wed, 25 Jul 2018 19:22:42 -0400 Received: from fllv0016.ext.ti.com ([198.47.19.142]:41986 "EHLO fllv0016.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731259AbeGYXWl (ORCPT ); Wed, 25 Jul 2018 19:22:41 -0400 Received: from dflxv15.itg.ti.com ([128.247.5.124]) by fllv0016.ext.ti.com (8.15.2/8.15.2) with ESMTP id w6PM8vPR053528; Wed, 25 Jul 2018 17:08:57 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1532556537; bh=lAZfQ4jqXPUAcGQrW9+/fWptYBZbr6cDK3WE114G/fQ=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=uYIENqwMEsz15iylJzG64tLVGKfC6NXvHCb5x6KB6FSZ/uXFXKhrL7MJG6NQ0gK0F d9qHke5zU1ImRm2vHtk5Ovh5VemZz0spS3Ko1aUYbngIKrYqVuOcXyq3szJVe/MSuN +AipTiHQn251ne6nP4VLYFM08RZJCd+tAyrPNr4Q= Received: from DFLE104.ent.ti.com (dfle104.ent.ti.com [10.64.6.25]) by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id w6PM8uTi012561; Wed, 25 Jul 2018 17:08:56 -0500 Received: from DFLE105.ent.ti.com (10.64.6.26) by DFLE104.ent.ti.com (10.64.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Wed, 25 Jul 2018 17:08:56 -0500 Received: from dlep32.itg.ti.com (157.170.170.100) by DFLE105.ent.ti.com (10.64.6.26) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1466.3 via Frontend Transport; Wed, 25 Jul 2018 17:08:56 -0500 Received: from [128.247.58.153] (ileax41-snat.itg.ti.com [10.172.224.153]) by dlep32.itg.ti.com (8.14.3/8.13.8) with ESMTP id w6PM8uEv006331; Wed, 25 Jul 2018 17:08:56 -0500 Subject: Re: [PATCH v2 1/1] remoteproc: correct rproc_free_vring() to avoid invalid kernel paging To: Loic Pallardy , , CC: , , , References: <1530863212-16584-1-git-send-email-loic.pallardy@st.com> From: Suman Anna Message-ID: Date: Wed, 25 Jul 2018 17:08:56 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <1530863212-16584-1-git-send-email-loic.pallardy@st.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Loic, On 07/06/2018 02:46 AM, Loic Pallardy wrote: > If rproc_start() failed, rproc_resource_cleanup() is called to clean > debugfs entries, then associated iommu mappings, carveouts and vdev. > Issue occurs when rproc_free_vring() is trying to reset vring resource > table entry. > At this time, table_ptr is pointing on loaded resource table and carveouts > already released, so access to loaded resource table is generating a kernel > paging error: Are you using a device specific CMA pool or carveout, and if so, where the pool is? If not, where is the default CMA pool? I am trying to reproduce the issue on my platform with the start failure as you suggested, but haven't seen it so far. That said, I have seen the exact same crash when using HighMEM CMA pools on my downstream kernel when stopping the processor, and the root cause is essentially the same as what you summarized here. The issue was present with LowMem pools as well, but got masked because of the kernel linear mapping. > > [ 12.696535] Unable to handle kernel paging request at virtual address f0f357cc > [ 12.696540] pgd = (ptrval) > [ 12.696542] [f0f357cc] *pgd=6d2d0811, *pte=00000000, *ppte=00000000 > [ 12.696558] Internal error: Oops: 807 [#1] SMP ARM > [ 12.696563] Modules linked in: rpmsg_core v4l2_mem2mem videobuf2_dma_contig sti_drm v4l2_common vida > [ 12.696598] CPU: 1 PID: 48 Comm: kworker/1:1 Tainted: G W 4.18.0-rc2-00018-g3170fdd-8 > [ 12.696602] Hardware name: STi SoC with Flattened Device Tree > [ 12.696625] Workqueue: events request_firmware_work_func > [ 12.696659] PC is at rproc_free_vring+0x84/0xbc [remoteproc] > [ 12.696667] LR is at rproc_free_vring+0x70/0xbc [remoteproc] > > This patch proposes to simply remove reset of resource table vring entries, > as firmware and resource table are reloaded at each rproc boot. > rproc_trigger_recovery() not impacted as resources not touched during recovery > procedure. And error recovery doesn't work for me after the rproc_start, stop got introduced. regards Suman > > Signed-off-by: Loic Pallardy > --- > Changes from V1: typo fixes in commit message > > drivers/remoteproc/remoteproc_core.c | 6 ------ > 1 file changed, 6 deletions(-) > > diff --git a/drivers/remoteproc/remoteproc_core.c b/drivers/remoteproc/remoteproc_core.c > index a9609d9..9a8b47c 100644 > --- a/drivers/remoteproc/remoteproc_core.c > +++ b/drivers/remoteproc/remoteproc_core.c > @@ -289,16 +289,10 @@ void rproc_free_vring(struct rproc_vring *rvring) > { > int size = PAGE_ALIGN(vring_size(rvring->len, rvring->align)); > struct rproc *rproc = rvring->rvdev->rproc; > - int idx = rvring->rvdev->vring - rvring; > - struct fw_rsc_vdev *rsc; > > dma_free_coherent(rproc->dev.parent, size, rvring->va, rvring->dma); > idr_remove(&rproc->notifyids, rvring->notifyid); > > - /* reset resource entry info */ > - rsc = (void *)rproc->table_ptr + rvring->rvdev->rsc_offset; > - rsc->vring[idx].da = 0; > - rsc->vring[idx].notifyid = -1; > } > > static int rproc_vdev_do_probe(struct rproc_subdev *subdev) >