Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp697681imm; Wed, 19 Sep 2018 05:37:04 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbzVtrVeCuFxl1kcS4+nDcWXSzkg03pUKNtPrDXStDYX4ydUBd0lclchLnNBxug/4l9e2NO X-Received: by 2002:a63:6a06:: with SMTP id f6-v6mr32368689pgc.63.1537360624197; Wed, 19 Sep 2018 05:37:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537360624; cv=none; d=google.com; s=arc-20160816; b=rC4gx11WTUBy2IhvmQR36v6uC/8XhZOcQeWVCl0TXtewBNWdx9bXBMHG3cttMEt8bb 3/yknc+gFHerBiE3yi5ou2apmfH/IP3uJHPD+Bj8GGmV/QxaYbaQ8ZqtvliyS+oaS9Ro SnO9nP/0pxt4cXhQWIvUYrZKcl3XsscIj8VpW9YyFLUjC3LTuGBhCAUWUoSm+B1YSgG0 kgsJAlnzu2WxiR/W8RuJm58D+U9udBtfaAgsZVGXQcceLkvhsYx8bsScj4YZBZskMkox +S6bP3SfwpfljkAVeWSNO53WdaQrLajTYW1cE+szU6Jrkaps9wZw74Ci3P+jvdhNUAgb pSDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=C9tOuV4F1r/hEVBi9Lmds0Yhbd+Yq7gJL7AuR5loDp8=; b=hkjVfXKnC6szPbqd0/XZRzbyOq69QvOopliBCvAXy91n5hp8Q1OaRN/MeahPdp8Anu iCkPrT6hCSdci3w3fISNjPB4wDeknEE6zZ81JFDLHOGIkH1lB4bJenvDDimVe/SvhhMr 9TKSGgg7vxor8vfHQgLlrqVxvHlj+k0cPHspGl+LoH6mvUkKiBttkvdjeisDVPN7xDEe 1MH7YXag3LpNNvEpWC7uYMWAQsPGjEbpqQOBvxJQVC0m0VD8zSMgORnNdW+2Bj84FO9/ HC2FePeLVjAsTsaNSaNp92Lmp5oxlr4CNiG7h/2E6EWMrjMQXQXfQXP477tePe0xtmvI natA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si22348272pfe.150.2018.09.19.05.36.48; Wed, 19 Sep 2018 05:37:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731817AbeISSOR (ORCPT + 99 others); Wed, 19 Sep 2018 14:14:17 -0400 Received: from inva021.nxp.com ([92.121.34.21]:32770 "EHLO inva021.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731607AbeISSOQ (ORCPT ); Wed, 19 Sep 2018 14:14:16 -0400 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id B5EB82001F7; Wed, 19 Sep 2018 14:36:29 +0200 (CEST) Received: from inva024.eu-rdc02.nxp.com (inva024.eu-rdc02.nxp.com [134.27.226.22]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id A98A32001F0; Wed, 19 Sep 2018 14:36:29 +0200 (CEST) Received: from fsr-ub1864-101.ea.freescale.net (fsr-ub1864-101.ea.freescale.net [10.171.82.97]) by inva024.eu-rdc02.nxp.com (Postfix) with ESMTP id 6732B20618; Wed, 19 Sep 2018 14:36:28 +0200 (CEST) From: laurentiu.tudor@nxp.com To: devicetree@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: roy.pledge@nxp.com, madalin.bucur@nxp.com, davem@davemloft.net, shawnguo@kernel.org, leoyang.li@nxp.com, Laurentiu Tudor Subject: [PATCH 06/21] soc/fsl/qman_portals: defer probe after qman's probe Date: Wed, 19 Sep 2018 15:35:58 +0300 Message-Id: <20180919123613.15092-7-laurentiu.tudor@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180919123613.15092-1-laurentiu.tudor@nxp.com> References: <20180919123613.15092-1-laurentiu.tudor@nxp.com> X-Virus-Scanned: ClamAV using ClamSMTP Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Laurentiu Tudor Defer probe of qman portals after qman probing. This fixes the crash below, seen on NXP LS1043A SoCs: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004 Mem abort info: ESR = 0x96000004 Exception class = DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 [0000000000000004] user address but active_mm is swapper Internal error: Oops: 96000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.18.0-rc1-next-20180622-00200-g986f5c179185 #9 Hardware name: LS1043A RDB Board (DT) pstate: 80000005 (Nzcv daif -PAN -UAO) pc : qman_set_sdest+0x74/0xa0 lr : qman_portal_probe+0x22c/0x470 sp : ffff00000803bbc0 x29: ffff00000803bbc0 x28: 0000000000000000 x27: ffff0000090c1b88 x26: ffff00000927cb68 x25: ffff00000927c000 x24: ffff00000927cb60 x23: 0000000000000000 x22: 0000000000000000 x21: ffff0000090e9000 x20: ffff800073b5c810 x19: ffff800027401298 x18: ffffffffffffffff x17: 0000000000000001 x16: 0000000000000000 x15: ffff0000090e96c8 x14: ffff80002740138a x13: ffff0000090f2000 x12: 0000000000000030 x11: ffff000008f25000 x10: 0000000000000000 x9 : ffff80007bdfd2c0 x8 : 0000000000004000 x7 : ffff80007393cc18 x6 : 0040000000000001 x5 : 0000000000000000 x4 : ffffffffffffffff x3 : 0000000000000004 x2 : ffff00000927c900 x1 : 0000000000000000 x0 : 0000000000000004 Process swapper/0 (pid: 1, stack limit = 0x(____ptrval____)) Call trace: qman_set_sdest+0x74/0xa0 platform_drv_probe+0x50/0xa8 driver_probe_device+0x214/0x2f8 __driver_attach+0xd8/0xe0 bus_for_each_dev+0x68/0xc8 driver_attach+0x20/0x28 bus_add_driver+0x108/0x228 driver_register+0x60/0x110 __platform_driver_register+0x40/0x48 qman_portal_driver_init+0x20/0x84 do_one_initcall+0x58/0x168 kernel_init_freeable+0x184/0x22c kernel_init+0x10/0x108 ret_from_fork+0x10/0x18 Code: f9400443 11001000 927e4800 8b000063 (b9400063) ---[ end trace 4f6d50489ecfb930 ]--- Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b Signed-off-by: Laurentiu Tudor --- drivers/soc/fsl/qbman/qman_portal.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/drivers/soc/fsl/qbman/qman_portal.c b/drivers/soc/fsl/qbman/qman_portal.c index 012bb95e87e1..7fd13f8c8da2 100644 --- a/drivers/soc/fsl/qbman/qman_portal.c +++ b/drivers/soc/fsl/qbman/qman_portal.c @@ -229,6 +229,14 @@ static int qman_portal_probe(struct platform_device *pdev) int irq, cpu, err; u32 val; + err = qman_is_probed(); + if (!err) + return -EPROBE_DEFER; + if (err < 0) { + dev_err(&pdev->dev, "failing probe due to qman probe error\n"); + return -ENODEV; + } + pcfg = devm_kmalloc(dev, sizeof(*pcfg), GFP_KERNEL); if (!pcfg) return -ENOMEM; -- 2.17.1