Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp1047518ybh; Wed, 11 Mar 2020 16:28:00 -0700 (PDT) X-Google-Smtp-Source: ADFU+vs8z0S/+NzKQ++ndgETHm8Is4iF1FSij977WXhvVw+TnprzglgOcAexgXnkILaTGrGOXH3h X-Received: by 2002:a9d:22:: with SMTP id 31mr3974295ota.173.1583969280339; Wed, 11 Mar 2020 16:28:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583969280; cv=none; d=google.com; s=arc-20160816; b=iBmEs4dhDODVREIUn8pydVfxzCrAtUxSgstwVgOM5wkZ4ld6wZUa4V+FX5Wj1xMB5g cj5sg7w3OH4ALnEZZd39+VfWbXCp5YRqq9D5sZg88mBGAno8r3RGQZa81ZI/f7VdBDcA sspL+K1Is3P0Uw9DkEyFDDzV6SSM76Rvh5zcbXK4I8IqAfjeByYlCSq3tx55xgDrbNyv 4nKYW8nAYiTb4+y08S+2foBeFA/PN+KMCXZMWHI3QUqStZew3K6VCzQirK2p1WfGUP2D Xmn3rzSy5LE3CGsXE/yXhABsdlSncmLvudUV9584B5Z5tP3BxBueTm7pdaD02hcCyQVu vHkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=B+P5HzLaM16ohcAsqpflA7I9ODGTAOGyeegeNgXsSGE=; b=TG4SACu+4kFi8GPKhoMo92QqH5EG2xNGxL+nDcgD9vGjQgdkHhjzedmKB195+V5i7K rOB5n/CFVq1FrZlFd0z6AxVdUpK6C0Y1gHf7Ft4LF74f9wZ4afOSV05xUjBCnHBucONc jgoxwCEBEa83DxUJIQNXdYUoMe2OZGtZabqZigpJWp08d11FX5aa5PrVee4niU/11fsW ZgWv3/7gCl/L1jDbRbQWZh2gxMNOyQbUbS0iQevLqrkXQeVJFQ5MLeNI+OlJcH5mOYWQ A9aNbjKqdDqHGnotk7xlsb3DSTz9qgHSByCkUH62YprWbwRCcNoVJHy6JZj1c5zF5cJD lLYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=syfha4jg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9si1598749oiw.133.2020.03.11.16.27.47; Wed, 11 Mar 2020 16:28:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=syfha4jg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731508AbgCKX1N (ORCPT + 99 others); Wed, 11 Mar 2020 19:27:13 -0400 Received: from mail-pl1-f195.google.com ([209.85.214.195]:46685 "EHLO mail-pl1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731392AbgCKX1N (ORCPT ); Wed, 11 Mar 2020 19:27:13 -0400 Received: by mail-pl1-f195.google.com with SMTP id w12so1819807pll.13 for ; Wed, 11 Mar 2020 16:27:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=B+P5HzLaM16ohcAsqpflA7I9ODGTAOGyeegeNgXsSGE=; b=syfha4jgJwh+J6XhF5bW8uBcSARH9kAztF+dhRPJfttxgccsdTy/AIVri3rvRv3Fwa 9F2EnXPRiUI9CDsgVUXb1mCcNiXrC6ydkdtm3Nn9enXB0wfjL2QAo4zCRAvIGnOSST81 AsloIi0gUQg9GWtBsqUVkjIp3pJMk36kOSMARfDCMmVLmdfBAYLRhngnawfY6OUwohoA XumBRAwyC213wzT/B0iJOWjo/SvqphaglAE5DBtPSTv16o7XSS6t3DrcQfEmf1Mckq6J SF/yas8PBIS5C9CHdC1KnJuDJWGWZeVFgGFPcov0fk5yG5KSBm4XhLvlxEktqCMXZYXA BKSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=B+P5HzLaM16ohcAsqpflA7I9ODGTAOGyeegeNgXsSGE=; b=uJTMiadDFsQMwSKxeBAGkpr1foTf2TM4WS6BWvhX9DWtKvCI2M0bxbzyNA7R1sYMSk so0zB1/U/ymhsE1gV2WIYevoZt25CGLuIZ2XTcVO/imggp3q29aBBdGo56m0jGlCdKKs zhfWTegsksEix/dPj9L26x7L2wbvH0Dgb1iBxAIxvQ0pVLkeW2G/m5De8yWgbVs0xZOA v4UOLqR76SJwh79sMHP2yvf4lptlauysUZW4xYJYEuCvUM7XYlcHBoqDSL6xHg4tfY+7 B0Hv1FNDof+zILR7xWNQBiPX6Xa0ss1+RpMpN0FfeKMIbevYE78RjUSfEG5LgELsQTro Q+pg== X-Gm-Message-State: ANhLgQ2H/SARGbwNWpACtJ4OFKaK6tKXOfSPowa2buEsLtzwbSv4eqjp D+ARhdpicJ1f2yl4+H7CS6iuNg== X-Received: by 2002:a17:90a:1a51:: with SMTP id 17mr1108757pjl.118.1583969230836; Wed, 11 Mar 2020 16:27:10 -0700 (PDT) Received: from minitux (104-188-17-28.lightspeed.sndgca.sbcglobal.net. [104.188.17.28]) by smtp.gmail.com with ESMTPSA id y7sm12371229pfq.159.2020.03.11.16.27.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Mar 2020 16:27:10 -0700 (PDT) Date: Wed, 11 Mar 2020 16:27:07 -0700 From: Bjorn Andersson To: Loic Pallardy Cc: ohad@wizery.com, mathieu.poirier@linaro.org, linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org, arnaud.pouliquen@st.com, benjamin.gaignard@linaro.org, fabien.dessenne@st.com, s-anna@ti.com Subject: Re: [RFC 1/2] remoteproc: sysfs: authorize rproc shutdown when rproc is crashed Message-ID: <20200311232707.GA1214176@minitux> References: <1583924072-20648-1-git-send-email-loic.pallardy@st.com> <1583924072-20648-2-git-send-email-loic.pallardy@st.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1583924072-20648-2-git-send-email-loic.pallardy@st.com> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 11 Mar 03:54 PDT 2020, Loic Pallardy wrote: > When remoteproc recovery is disabled and rproc crashed, user space > client has no way to reboot co-processor except by a complete platform > reboot. > Indeed rproc_shutdown() is called by sysfs state_store() only is rproc > state is RPROC_RUNNING. > > This patch offers the possibility to shutdown the co-processor if > it is in RPROC_CRASHED state and so to restart properly co-processor > from sysfs interface. > I did recently run into a similar problem when I fed my remoteproc faulty firmware, which lead to it recovering immediately upon boot. The amount of time spent in !CRASHED state was minimal, so I didn't have any way to stop the remoteproc. > Signed-off-by: Loic Pallardy > --- > drivers/remoteproc/remoteproc_core.c | 2 +- > drivers/remoteproc/remoteproc_sysfs.c | 2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/remoteproc/remoteproc_core.c b/drivers/remoteproc/remoteproc_core.c > index 097f33e4f1f3..7ac87a75cd1b 100644 > --- a/drivers/remoteproc/remoteproc_core.c > +++ b/drivers/remoteproc/remoteproc_core.c > @@ -1812,7 +1812,7 @@ void rproc_shutdown(struct rproc *rproc) > if (!atomic_dec_and_test(&rproc->power)) > goto out; > > - ret = rproc_stop(rproc, false); > + ret = rproc_stop(rproc, rproc->state == RPROC_CRASHED); Afaict this is unrelated to the problem you're describing in the commit message. > if (ret) { > atomic_inc(&rproc->power); > goto out; > diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c > index 7f8536b73295..1029458a4678 100644 > --- a/drivers/remoteproc/remoteproc_sysfs.c > +++ b/drivers/remoteproc/remoteproc_sysfs.c > @@ -101,7 +101,7 @@ static ssize_t state_store(struct device *dev, > if (ret) > dev_err(&rproc->dev, "Boot failed: %d\n", ret); > } else if (sysfs_streq(buf, "stop")) { > - if (rproc->state != RPROC_RUNNING) > + if (rproc->state != RPROC_RUNNING && rproc->state != RPROC_CRASHED) Analogous to the problem reported by Alex here https://patchwork.kernel.org/patch/11413161/ the handling of stop seems racy. In particular, I believe you're failing to protect against a race with a just scheduled rproc_crash_handler_work() being executed after the mutex_unlock() in rproc_shutdown()... With Alex fix that should be less of a problem though... Regards, Bjorn > return -EINVAL; > > rproc_shutdown(rproc); > -- > 2.7.4 >