Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp310575ybi; Wed, 29 May 2019 22:01:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqw2Q5Vtd2c6FdHVrdgaRbzJ/0cpWZAkOw6XX9uAitkrNt2a2ZqqYiEiwHcFVaePz0KJe86A X-Received: by 2002:a17:90a:338e:: with SMTP id n14mr1708476pjb.35.1559192476646; Wed, 29 May 2019 22:01:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559192476; cv=none; d=google.com; s=arc-20160816; b=qd/up4NzxxRMD61KW9+MLB1XTbZE7COnV7tEOB+m0b0lz4iPnV6Jw9EEF8CmI5azp/ xH1jIIYxb2Ugc/sqRQhzydpffeLVXarkdbub9AqahP6stSfKyKkNUzGZzlIfMJl6dUz+ vvizvp69MdqJ4/pSGoG8khZvTDfYFsuxie0r2aXWIXVzxFremwaX0ftjsmXj7+T33xrw l+FZoz/pkWv+bUMiV/lpMMTfr8Whil+Q2oEz/u4x0dDiZhg3/Via+vxoEH0BKgdtQea9 Fq03KEFXIE5aZ7we75CZH3hd1i0TS45SgjzEyBOdm3tXIGCFmMQQgLyT997kLlH0S3yg OulQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Y599YEbbCqSPoqs417sknmAgdq2pyItyTG2/fUbHXks=; b=zu+48S7WKhDI+jr5yRFIflKRjywQbl0rFzmdvxu4/UcKn0R7XqPXn3zILL/VknJvxy 0hCIdWOl6Qp+luZU5uHPMNyU7P7cAWYZfYDEell5c2tp2FapHP0iCF/QRqUmT14xOtJ2 qW1tMpIQFFt4t5g/cn8B5iNGNvj2BHAu0qjL5wux72KrP4f5ivfHI5cYvMtPFFiSR7Be zbRiBLoiVYUKtW2k84lzi3yxAAiU4gg6PvQNIsBJUErgeR5XqIxkcdYimxGUngAD/NNE HzgXHNqzWtYW51rr5oUUmP/5biN4yciJUxuKGeQAG7AAK21wkmyri9dOV+dvbxkm6FUS gutQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xAYg3qCF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si1980554plv.102.2019.05.29.22.00.59; Wed, 29 May 2019 22:01:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xAYg3qCF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389308AbfE3E5z (ORCPT + 99 others); Thu, 30 May 2019 00:57:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:45216 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727830AbfE3DJw (ORCPT ); Wed, 29 May 2019 23:09:52 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 978C924493; Thu, 30 May 2019 03:09:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559185791; bh=eUosp6swW7jatdqmW6Q3weFrKEivl4OFvi4vPDCBYq0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xAYg3qCF5FHfRV4iNwm9dfYlfR31IT9t8N/zSLhyvltCA7jHMc2LIHZDjmAd5UD2I jSX+LTvo+pw6CbfGmXvCN916/TRvhWoK3AfnOXpmizJd0KY3Rj11dFqEJlL7v3hT9o GraKFnlsPwR4FU5CTZHdHhjFHUZ5iMtHPsd65j8A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sameer Pujar , Jon Hunter , Vinod Koul , Sasha Levin Subject: [PATCH 5.1 063/405] dmaengine: tegra210-dma: free dma controller in remove() Date: Wed, 29 May 2019 20:01:01 -0700 Message-Id: <20190530030544.134990966@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030540.291644921@linuxfoundation.org> References: <20190530030540.291644921@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit f030e419501cb95e961e9ed35c493b5d46a04eca ] Following kernel panic is seen during DMA driver unload->load sequence ========================================================================== Unable to handle kernel paging request at virtual address ffffff8001198880 Internal error: Oops: 86000007 [#1] PREEMPT SMP CPU: 0 PID: 5907 Comm: HwBinder:4123_1 Tainted: G C 4.9.128-tegra-g065839f Hardware name: galen (DT) task: ffffffc3590d1a80 task.stack: ffffffc3d0678000 PC is at 0xffffff8001198880 LR is at of_dma_request_slave_channel+0xd8/0x1f8 pc : [] lr : [] pstate: 60400045 sp : ffffffc3d067b710 x29: ffffffc3d067b710 x28: 000000000000002f x27: ffffff800949e000 x26: ffffff800949e750 x25: ffffff800949e000 x24: ffffffbefe817d84 x23: ffffff8009f77cb0 x22: 0000000000000028 x21: ffffffc3ffda49c8 x20: 0000000000000029 x19: 0000000000000001 x18: ffffffffffffffff x17: 0000000000000000 x16: ffffff80082b66a0 x15: ffffff8009e78250 x14: 000000000000000a x13: 0000000000000038 x12: 0101010101010101 x11: 0000000000000030 x10: 0101010101010101 x9 : fffffffffffffffc x8 : 7f7f7f7f7f7f7f7f x7 : 62ff726b6b64622c x6 : 0000000000008064 x5 : 6400000000000000 x4 : ffffffbefe817c44 x3 : ffffffc3ffda3e08 x2 : ffffff8001198880 x1 : ffffffc3d48323c0 x0 : ffffffc3d067b788 Process HwBinder:4123_1 (pid: 5907, stack limit = 0xffffffc3d0678028) Call trace: [] 0xffffff8001198880 [] dma_request_chan+0x50/0x1f0 [] dma_request_slave_channel+0x28/0x40 [] tegra_alt_pcm_open+0x114/0x170 [] soc_pcm_open+0x10c/0x878 [] snd_pcm_open_substream+0xc0/0x170 [] snd_pcm_open+0xc4/0x240 [] snd_pcm_playback_open+0x58/0x80 [] snd_open+0xb4/0x178 [] chrdev_open+0xb8/0x1d0 [] do_dentry_open+0x214/0x318 [] vfs_open+0x58/0x88 [] do_last+0x450/0xde0 [] path_openat+0xa8/0x368 [] do_filp_open+0x8c/0x110 [] do_sys_open+0x164/0x220 [] compat_SyS_openat+0x3c/0x50 [] el0_svc_naked+0x34/0x38 ---[ end trace 67e6d544e65b5145 ]--- Kernel panic - not syncing: Fatal exception ========================================================================== In device probe(), of_dma_controller_register() registers DMA controller. But when driver is removed, this is not freed. During driver reload this results in data abort and kernel panic. Add of_dma_controller_free() in driver remove path to fix the issue. Fixes: f46b195799b5 ("dmaengine: tegra-adma: Add support for Tegra210 ADMA") Signed-off-by: Sameer Pujar Reviewed-by: Jon Hunter Signed-off-by: Vinod Koul Signed-off-by: Sasha Levin --- drivers/dma/tegra210-adma.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/dma/tegra210-adma.c b/drivers/dma/tegra210-adma.c index 5ec0dd97b3971..9aa35a7f13692 100644 --- a/drivers/dma/tegra210-adma.c +++ b/drivers/dma/tegra210-adma.c @@ -787,6 +787,7 @@ static int tegra_adma_remove(struct platform_device *pdev) struct tegra_adma *tdma = platform_get_drvdata(pdev); int i; + of_dma_controller_free(pdev->dev.of_node); dma_async_device_unregister(&tdma->dma_dev); for (i = 0; i < tdma->nr_channels; ++i) -- 2.20.1