Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp411161pxj; Fri, 11 Jun 2021 02:11:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzsNSlZn7bKkACB/DnnBR640WRcS1Aqc17KO4ilDDXhNGukD0Xz+f8ddykLsLhF1fjOTB6M X-Received: by 2002:a17:906:c212:: with SMTP id d18mr2767648ejz.291.1623402681334; Fri, 11 Jun 2021 02:11:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623402681; cv=none; d=google.com; s=arc-20160816; b=WUBE+uEUBy9k5TCIVNmCKWUf8SlNbP2yHTowhRpdeTZazhxKsVNUBJLCsGAHkSSE7d uxZYKD7NoU1LGHi1boxtFypcoIbPl+G+pNHcnIar9TibAhWApg2yshG9hzHE6mRKrin+ dIWmwxBEm44pIQvCaESdYgrwdYUiqoSQTK/b99JPvPNM+PhfWxvjtsKskTBoeaQJ4HhA Qj4Tjuu8E0RpvIMK+4RoDctwoCLP2b2abkhK1y21IfMS9e8C35dRp+9PXNHb7Mq1SPK/ 3ElDQeQQU9wYQHQr8FQYOMyKED7BsKLOTJRIwf71OZLTsuCsjYbjoJHvmLxbySb1Smb0 omGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=1Egx3T+r+MdqwKDRFu2oj7ToUZ/M+AjkRGEvdLGmyR0=; b=bnHkx9TEwTRkozxkXf5T2zIlJqKH9kPXXdV3eUMqdY94siBjctETQtkHhQNYyDPKiz m/AnVpp2c12G8X9uednNNb+keWGrICUWFJzGwaTBZQqdFkoG6VtGVN3scuwRrdlMskH8 sarCCIVpV2pLFtAs07Gx3ZHsn22AmYnpm1DE8Wz0bk83vSpaIMCXq2eYPTThEnRVEW7W qxaBbJxNKbLGWW6RJcT1Bk3LimJvWE8Nm+46S9xhOcrB9NB4R7pnIWIxIDrRSdgYEajn CMSwayEWFRokITd68pMNQksIrTO7O7gDSj0rhJbrGj2t14MzIC0fQxtyEXi99cdnTic1 LO+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=rZfaoDUn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x15si4228061edd.555.2021.06.11.02.10.58; Fri, 11 Jun 2021 02:11:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=rZfaoDUn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231350AbhFKJME (ORCPT + 99 others); Fri, 11 Jun 2021 05:12:04 -0400 Received: from mail-wm1-f52.google.com ([209.85.128.52]:42690 "EHLO mail-wm1-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231145AbhFKJMD (ORCPT ); Fri, 11 Jun 2021 05:12:03 -0400 Received: by mail-wm1-f52.google.com with SMTP id l7-20020a05600c1d07b02901b0e2ebd6deso8054259wms.1 for ; Fri, 11 Jun 2021 02:09:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=1Egx3T+r+MdqwKDRFu2oj7ToUZ/M+AjkRGEvdLGmyR0=; b=rZfaoDUnOmmtnXLuSumOibA5QNMCiMlQ80NgjHRY0Shk27yj3NfbvwJfg6HLwrNGsQ MZmn0iJ7rTMWg6Zrazz6eZVpBFfKISTNYlJzDhje0d9DxqZMuvip9tgAuSdRIX7TCij2 5+NFIjRh/OASeCDEbuMnbPDQBVf+sQyGH8KFEjTdVnAEZjtt8l08imL6UU11G/iJECnY WPbH7Vk4DSMomRmti8r2X5RsYK/g6H9o7ZrWDkSh050129aUcCZ3LSQ63V2UbWWQ4upG Vkl5PcUwYvhDULREMhlevbgGM5pmAI0YHHXYaK6AENNYo7Un8Q99OH1B3q8sI0SVh4Tw +Wdw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=1Egx3T+r+MdqwKDRFu2oj7ToUZ/M+AjkRGEvdLGmyR0=; b=n8I4gWQOOKdSa/SM2z4a23wg9AETBDE3LJPCGWnCoYUCqUN3ii82MsPej/2HX2M5NR igq+mJbDDOqQKmJvo201PWh5HQLCIxRbFbxYyb2vSZh5VZi2g0AW19wifRpBoO+54rja QQIzO9ifgQFwoG1bPfxBAB1sCfwgCTxevlhJ2nO092ytEpZ/JmaXIPg1MR/i1I6u4aGv iFfIuCtPjYrHWRLmxmpUwFmfO2wb6OTM6YlEDhnDR9EQQFqIJ2MAZlUmetHv6thaZX67 r+vEukBFTGD1Z+YUdWkwh6cIfVsSmDABP5P/obAUQFLog1fuUQz7Sd50m2Jh0VaVoKKk PVBA== X-Gm-Message-State: AOAM532vM27hGhy7Nq8eojHvk8Ac+YZp2q9cja0f3fpL7tg64a0ye9hB XdlYF6VIdmmnEx057xu8pi2qPiAVQjwhAoYjz8u46w== X-Received: by 2002:a1c:41c5:: with SMTP id o188mr19063241wma.60.1623402539314; Fri, 11 Jun 2021 02:08:59 -0700 (PDT) MIME-Version: 1.0 References: <20210610210913.536081-1-tyhicks@linux.microsoft.com> <20210610210913.536081-3-tyhicks@linux.microsoft.com> In-Reply-To: <20210610210913.536081-3-tyhicks@linux.microsoft.com> From: Jens Wiklander Date: Fri, 11 Jun 2021 11:08:48 +0200 Message-ID: Subject: Re: [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel To: Tyler Hicks Cc: Allen Pais , Sumit Garg , Peter Huewe , Jarkko Sakkinen , Jason Gunthorpe , Vikas Gupta , Thirupathaiah Annapureddy , Pavel Tatashin , =?UTF-8?B?UmFmYcWCIE1pxYJlY2tp?= , OP-TEE TrustedFirmware , linux-integrity , bcm-kernel-feedback-list@broadcom.com, linux-mips@vger.kernel.org, Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 10, 2021 at 11:09 PM Tyler Hicks wrote: > > Fix a hung task issue, seen when booting the kdump kernel, that is > caused by all of the secure world threads being in a permanent suspended > state: > > INFO: task swapper/0:1 blocked for more than 120 seconds. > Not tainted 5.4.83 #1 > "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. > swapper/0 D 0 1 0 0x00000028 > Call trace: > __switch_to+0xc8/0x118 > __schedule+0x2e0/0x700 > schedule+0x38/0xb8 > schedule_timeout+0x258/0x388 > wait_for_completion+0x16c/0x4b8 > optee_cq_wait_for_completion+0x28/0xa8 > optee_disable_shm_cache+0xb8/0xf8 > optee_probe+0x560/0x61c > platform_drv_probe+0x58/0xa8 > really_probe+0xe0/0x338 > driver_probe_device+0x5c/0xf0 > device_driver_attach+0x74/0x80 > __driver_attach+0x64/0xe0 > bus_for_each_dev+0x84/0xd8 > driver_attach+0x30/0x40 > bus_add_driver+0x188/0x1e8 > driver_register+0x64/0x110 > __platform_driver_register+0x54/0x60 > optee_driver_init+0x20/0x28 > do_one_initcall+0x54/0x24c > kernel_init_freeable+0x1e8/0x2c0 > kernel_init+0x18/0x118 > ret_from_fork+0x10/0x18 > > The invoke_fn hook returned OPTEE_SMC_RETURN_ETHREAD_LIMIT, indicating > that the secure world threads were all in a suspended state at the time > of the kernel crash. This intermittently prevented the kdump kernel from > booting, resulting in a failure to collect the kernel dump. > > Make kernel dump collection more reliable on systems utilizing OP-TEE by > refusing to load the driver under the kdump kernel. > > Signed-off-by: Tyler Hicks > --- > drivers/tee/optee/core.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) Looks good Reviewed-by: Jens Wiklander