Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp254242ybh; Thu, 12 Mar 2020 01:13:10 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsV9lQ5q1Fq7LVqXLQCP5B3JgjnpLPntV/sfwRvdvC/E1/qYUl5IUvHPbCCZKxVXgAI7QFj X-Received: by 2002:aca:57d6:: with SMTP id l205mr1692303oib.20.1584000789858; Thu, 12 Mar 2020 01:13:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584000789; cv=none; d=google.com; s=arc-20160816; b=qW1CZFrmE+jHYTBVheA4b//ZsQP2EiGFwCq9g18D4JvayVo84Iv7klPlEZ0se3uLrV B8iPcNkCIAouonbigvAYe0on4weeBm3XKQaCRn/+wc51vCeX6MAxm+rsq0XhfEH/IKtF yULXvATrFfLR7ZqWY/ax1yMfI6KaVo3GAanKJHqoYip8yujOXJphzwCtncrw5qkt0f97 1lI9WLBjNUUREm8yv1Gzopmw0iixfWXrgHwji0zJXy5jRa8h4pgwEXuE40drRo9mb9y+ DkZBCB+HZ8ap7Z1Z9N7MdYvXZKCsmj3IlcOyj++p4MoC1CUzJDYIXtzIEWBn3WCJ2QNp dllQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=RwEJBp8wHCul5X0rCg/SvUcmZaexxdJBwvrno11VP9w=; b=oYCUZ0P71AxZItsDXx3VuzVp4onkuhi4lTi8jXNkpgsnb6giSVqpp5Cv+5bygHir6O DuqFNt6D+P6mePyRwi4XYR4miabPN2Ql1l1QeEAOM3NFjIpVFSMxyp3USAyehDe9ee8f BatBX1ezN5vvTX49e4qFNrbka8+Dtni+bgHW1MS9+bfPik7cMLBr06RmyfFW6HPWUXaT JMeTapT+v+x6bh6XojHmZyfzrnhUpVRf733yGzgER40glVVU9C5X8kpBBtVyp/elzEGC FukTRwSLxykelv470cf3QRJkNzztM4hYxOru6tOiuNg8RUkO81q57bxu83044LxfcmRn a0Mw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=n2Ns6GKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t132si2378018oih.173.2020.03.12.01.12.56; Thu, 12 Mar 2020 01:13:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=n2Ns6GKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726299AbgCLIMk (ORCPT + 99 others); Thu, 12 Mar 2020 04:12:40 -0400 Received: from mx07-00178001.pphosted.com ([62.209.51.94]:11920 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725268AbgCLIMk (ORCPT ); Thu, 12 Mar 2020 04:12:40 -0400 Received: from pps.filterd (m0046668.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 02C7rCGI031103; Thu, 12 Mar 2020 09:12:33 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=st.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=STMicroelectronics; bh=RwEJBp8wHCul5X0rCg/SvUcmZaexxdJBwvrno11VP9w=; b=n2Ns6GKJ/MPlczw8pswUq5NEBuk9m7/5pJHgZnNsYPm56MZAa9szNHhd3m69q12o855S FIBr75IItjNH+Wg5KvGSXic2afygEua6bb0nBSQKBbVvNWu0bPhVoc0u1ZEnA11f+2tz YA3a84Ofn7/MNuC9GfHM+sYIBDkEpc9GIbCd/kvc4rh2DplvypE/NFLfKZawS9uPcJZD 2c2IouNQKxJRLzGGFDqGZH0/49r0+nWYtHQFX/F8mztOQlIUW9qtQSlrEnGs3ldOcQdo +LQjd9C/i9ypJcvPqITAzhEsAeLgQbNrNJFTMQhodr8LlRd98EkUpdvVOqQdZKICUeog VQ== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 2ym1y70eyt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 12 Mar 2020 09:12:33 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 4050410002A; Thu, 12 Mar 2020 09:12:33 +0100 (CET) Received: from Webmail-eu.st.com (sfhdag5node3.st.com [10.75.127.15]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 2E38C21046A; Thu, 12 Mar 2020 09:12:33 +0100 (CET) Received: from SFHDAG7NODE2.st.com (10.75.127.20) by SFHDAG5NODE3.st.com (10.75.127.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 12 Mar 2020 09:12:32 +0100 Received: from SFHDAG7NODE2.st.com ([fe80::d548:6a8f:2ca4:2090]) by SFHDAG7NODE2.st.com ([fe80::d548:6a8f:2ca4:2090%20]) with mapi id 15.00.1473.003; Thu, 12 Mar 2020 09:12:32 +0100 From: Loic PALLARDY To: Bjorn Andersson CC: "ohad@wizery.com" , "mathieu.poirier@linaro.org" , "linux-remoteproc@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Arnaud POULIQUEN , "benjamin.gaignard@linaro.org" , "Fabien DESSENNE" , "s-anna@ti.com" Subject: RE: [RFC 1/2] remoteproc: sysfs: authorize rproc shutdown when rproc is crashed Thread-Topic: [RFC 1/2] remoteproc: sysfs: authorize rproc shutdown when rproc is crashed Thread-Index: AQHV95N1/mW6m1ZqkUyhqMT4RCAmr6hD+T6AgACgTkA= Date: Thu, 12 Mar 2020 08:12:32 +0000 Message-ID: <1161f034ddc64d6aa782f06c3c4996cd@SFHDAG7NODE2.st.com> References: <1583924072-20648-1-git-send-email-loic.pallardy@st.com> <1583924072-20648-2-git-send-email-loic.pallardy@st.com> <20200311232707.GA1214176@minitux> In-Reply-To: <20200311232707.GA1214176@minitux> Accept-Language: fr-FR, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.75.127.46] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138,18.0.572 definitions=2020-03-11_15:2020-03-11,2020-03-11 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Bjorn, > -----Original Message----- > From: Bjorn Andersson > Sent: jeudi 12 mars 2020 00:27 > To: Loic PALLARDY > Cc: ohad@wizery.com; mathieu.poirier@linaro.org; linux- > remoteproc@vger.kernel.org; linux-kernel@vger.kernel.org; Arnaud > POULIQUEN ; benjamin.gaignard@linaro.org; > Fabien DESSENNE ; s-anna@ti.com > Subject: Re: [RFC 1/2] remoteproc: sysfs: authorize rproc shutdown when > rproc is crashed >=20 > On Wed 11 Mar 03:54 PDT 2020, Loic Pallardy wrote: >=20 > > When remoteproc recovery is disabled and rproc crashed, user space > > client has no way to reboot co-processor except by a complete platform > > reboot. > > Indeed rproc_shutdown() is called by sysfs state_store() only is rproc > > state is RPROC_RUNNING. > > > > This patch offers the possibility to shutdown the co-processor if > > it is in RPROC_CRASHED state and so to restart properly co-processor > > from sysfs interface. > > >=20 > I did recently run into a similar problem when I fed my remoteproc > faulty firmware, which lead to it recovering immediately upon boot. The > amount of time spent in !CRASHED state was minimal, so I didn't have any > way to stop the remoteproc. >=20 > > Signed-off-by: Loic Pallardy > > --- > > drivers/remoteproc/remoteproc_core.c | 2 +- > > drivers/remoteproc/remoteproc_sysfs.c | 2 +- > > 2 files changed, 2 insertions(+), 2 deletions(-) > > > > diff --git a/drivers/remoteproc/remoteproc_core.c > b/drivers/remoteproc/remoteproc_core.c > > index 097f33e4f1f3..7ac87a75cd1b 100644 > > --- a/drivers/remoteproc/remoteproc_core.c > > +++ b/drivers/remoteproc/remoteproc_core.c > > @@ -1812,7 +1812,7 @@ void rproc_shutdown(struct rproc *rproc) > > if (!atomic_dec_and_test(&rproc->power)) > > goto out; > > > > - ret =3D rproc_stop(rproc, false); > > + ret =3D rproc_stop(rproc, rproc->state =3D=3D RPROC_CRASHED); >=20 > Afaict this is unrelated to the problem you're describing in the commit > message. Right, it is because now rproc_shudown could be could in a context where rp= roc is in RPROC_CRASHED state and so false is no more the default value. Could be split in another patch. >=20 > > if (ret) { > > atomic_inc(&rproc->power); > > goto out; > > diff --git a/drivers/remoteproc/remoteproc_sysfs.c > b/drivers/remoteproc/remoteproc_sysfs.c > > index 7f8536b73295..1029458a4678 100644 > > --- a/drivers/remoteproc/remoteproc_sysfs.c > > +++ b/drivers/remoteproc/remoteproc_sysfs.c > > @@ -101,7 +101,7 @@ static ssize_t state_store(struct device *dev, > > if (ret) > > dev_err(&rproc->dev, "Boot failed: %d\n", ret); > > } else if (sysfs_streq(buf, "stop")) { > > - if (rproc->state !=3D RPROC_RUNNING) > > + if (rproc->state !=3D RPROC_RUNNING && rproc->state !=3D > RPROC_CRASHED) >=20 > Analogous to the problem reported by Alex here > https://patchwork.kernel.org/patch/11413161/ the handling of stop seems > racy. >=20 > In particular, I believe you're failing to protect against a race > with a just scheduled rproc_crash_handler_work() being executed after > the mutex_unlock() in rproc_shutdown()... >=20 > With Alex fix that should be less of a problem though... Thanks for pointing me Alex's patch. But I don't think it is exactly the sa= me issue as it concerns the recovery procedure itself. In my case, the recovery is disabled. On a crash detection, rproc->state is= simply set to RPROC_CRASHED and recovery is not triggered. Without client action, rproc will stay forever in RPROC_CRASHED test. Today without this modification, it is not possible to shutdown rproc prope= rly, putting coprocessor under reset, disabling clocks... Regards, Loic >=20 > Regards, > Bjorn >=20 > > return -EINVAL; > > > > rproc_shutdown(rproc); > > -- > > 2.7.4 > >