Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp295963pxv; Wed, 30 Jun 2021 06:00:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxji1S42qvC1FRcFgZLCb+Bk5k0iMZkqTZtHkPagZqiYgjBJt5cxeLBHDjiHXqujTEUxcF2 X-Received: by 2002:a92:cacf:: with SMTP id m15mr26219735ilq.14.1625058053277; Wed, 30 Jun 2021 06:00:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625058053; cv=none; d=google.com; s=arc-20160816; b=gxKp7DN8f0+eDP5pml1GPDk+R9rFT8psjtZf2XsHsE/OonSBsNnSXozysD/aAQwuH2 S/zw78zdAkEW5+i8Wtl7Hrcn6MbPCMEGF/vf06Ce5MXxUTdAd7IyPL2PTaa5a4XbWtt1 JpTNs2aXRXJXeaqdzRpA9XkbUCFA5CR8zs9ZpmC7ummRcrpI4qmbbn2vKLmR8eNW3DWq vfWS2SRg9Bo7DeGGAU0vw0LJ/J65B9ouzNSwQqBYlXECExvw9HSPLE/4Yw+xGI8WlrlA /S0QRhur90gkkXlfe1ie61HWJkr66duPbTDcO8GMdnmuXeaSsI0ocOFwZbMYp+pWbKhI 3Erg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=y6Gl1u1injMq9uZRz30TrYJMZhcqs5KN31TirEf4DYY=; b=GPW2G5KCBwORRKQYl2RvSpqQLS/x4Zitm1QC67Xl01ZisxOQI8mXZLE0smz0x3zgNX BIf/F9NrgihFsff5IA4kEm5+AmeHgJvxAvU8gUW+E3vbuW5MhKWsA3l9R8Pb2QCW0jSc xWlJ9Ed0cSXrUPGHlmlOvybTsnF2tbbVqTYUiRfpPtal51C8Tb1STUGwLcjxPXaf7iug nKx1USqBW/Lx2HBGDvv7n2CzoxrJjtU5DXvMkNtdtxL/FhCZT6lk3QoMp1/mb5M5ws3M rlmzuwTNy7q6A0XLDXHxhTMWmBUWjUiq0ufMVFG/EP2CQABg7GbsdSCNfYDfmK1UqUjn Vk7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dU0v1zwu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f8si124470jav.58.2021.06.30.06.00.39; Wed, 30 Jun 2021 06:00:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dU0v1zwu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234713AbhF3NCQ (ORCPT + 99 others); Wed, 30 Jun 2021 09:02:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:52386 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234481AbhF3NCP (ORCPT ); Wed, 30 Jun 2021 09:02:15 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4B50961364; Wed, 30 Jun 2021 12:59:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625057986; bh=4UI5RKPIij7TUgl1lgCZCSJpLQ2Uyt70B7pj+JIfU14=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=dU0v1zwuPzsz8RuFIlMI7GqlG64x4T7MGB7PSTKUoHcWcPgpIRNzgVIVu5MLB4Uvs 1A8/Wmc++QCeqkzSJOHkRFhPZhAjb9R0zKhRNB1Ob4lQ+dTuYzUSs7/0Enx6Myzgvc FNyFQ010U0PvFlOFUytjoYE+NyOaFbCdhJX8bpRLGGCEqb8PrONHUSNI9xUgBbkeNl hlrjZnBcz7csJ9FIWy5d5CD6EJfN6S87J9X5kUs3/6Nr1sn7F/OjVbz7p0CmwH65sj QPkqz2gnczZWWQm7cpqLA7HOAwZzVM7vXNyj9bME416DpUTo763YA/kQZ5QsMngLdL agMk7aRtUe27w== Date: Wed, 30 Jun 2021 13:59:40 +0100 From: Will Deacon To: Marek Szyprowski Cc: Amey Narkhede , Rob Clark , Robin Murphy , Joerg Roedel , iommu@lists.linux-foundation.org, linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Jon Hunter , Krishna Reddy , Sai Prakash Ranjan , Jean-Philippe Brucker , Jonathan Cameron , Barry Song , Zenghui Yu Subject: Re: [PATCH] iommu/arm: Cleanup resources in case of probe error path Message-ID: <20210630125940.GA8515@willie-the-truck> References: <20210608164559.204023-1-ameynarkhede03@gmail.com> <26f6a765-37c8-d63a-a779-384f095d5770@samsung.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <26f6a765-37c8-d63a-a779-384f095d5770@samsung.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 30, 2021 at 02:48:15PM +0200, Marek Szyprowski wrote: > On 08.06.2021 18:45, Amey Narkhede wrote: > > If device registration fails, remove sysfs attribute > > and if setting bus callbacks fails, unregister the device > > and cleanup the sysfs attribute. > > > > Signed-off-by: Amey Narkhede > > This patch landed in linux-next some time ago as commit 249c9dc6aa0d > ("iommu/arm: Cleanup resources in case of probe error path"). After > bisecting and some manual searching I finally found that it is > responsible for breaking s2idle on DragonBoard 410c. Here is the log > (captured with no_console_suspend): > > # time rtcwake -s10 -mmem > rtcwake: wakeup from "mem" using /dev/rtc0 at Thu Jan? 1 00:02:13 1970 > PM: suspend entry (s2idle) > Filesystems sync: 0.002 seconds > Freezing user space processes ... (elapsed 0.006 seconds) done. > OOM killer disabled. > Freezing remaining freezable tasks ... (elapsed 0.004 seconds) done. > Unable to handle kernel NULL pointer dereference at virtual address > 0000000000000070 > Mem abort info: > ? ESR = 0x96000006 > ? EC = 0x25: DABT (current EL), IL = 32 bits > ? SET = 0, FnV = 0 > ? EA = 0, S1PTW = 0 > ? FSC = 0x06: level 2 translation fault > Data abort info: > ? ISV = 0, ISS = 0x00000006 > ? CM = 0, WnR = 0 > user pgtable: 4k pages, 48-bit VAs, pgdp=000000008ad08000 > [0000000000000070] pgd=0800000085c3c003, p4d=0800000085c3c003, > pud=0800000088dcf003, pmd=0000000000000000 > Internal error: Oops: 96000006 [#1] PREEMPT SMP > Modules linked in: bluetooth ecdh_generic ecc rfkill ipv6 ax88796b > venus_enc venus_dec videobuf2_dma_contig asix crct10dif_ce adv7511 > snd_soc_msm8916_analog qcom_spmi_temp_alarm rtc_pm8xxx qcom_pon > qcom_camss qcom_spmi_vadc videobuf2_dma_sg qcom_vadc_common msm > venus_core v4l2_fwnode v4l2_async snd_soc_msm8916_digital > videobuf2_memops snd_soc_lpass_apq8016 snd_soc_lpass_cpu v4l2_mem2mem > snd_soc_lpass_platform snd_soc_apq8016_sbc videobuf2_v4l2 > snd_soc_qcom_common qcom_rng videobuf2_common i2c_qcom_cci qnoc_msm8916 > videodev mc icc_smd_rpm mdt_loader socinfo display_connector rmtfs_mem > CPU: 1 PID: 1522 Comm: rtcwake Not tainted 5.13.0-next-20210629 #3592 > Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT) > pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--) > pc : msm_runtime_suspend+0x1c/0x60 [msm] > lr : msm_pm_suspend+0x18/0x38 [msm] > ... > Call trace: > ?msm_runtime_suspend+0x1c/0x60 [msm] > ?msm_pm_suspend+0x18/0x38 [msm] > ?dpm_run_callback+0x84/0x378 I wonder if we're missing a pm_runtime_disable() call on the failure path? i.e. something like the diff below... Will --->8 diff --git a/drivers/iommu/arm/arm-smmu/qcom_iommu.c b/drivers/iommu/arm/arm-smmu/qcom_iommu.c index 25ed444ff94d..ce8f354755d0 100644 --- a/drivers/iommu/arm/arm-smmu/qcom_iommu.c +++ b/drivers/iommu/arm/arm-smmu/qcom_iommu.c @@ -836,14 +836,14 @@ static int qcom_iommu_device_probe(struct platform_device *pdev) ret = devm_of_platform_populate(dev); if (ret) { dev_err(dev, "Failed to populate iommu contexts\n"); - return ret; + goto err_pm_disable; } ret = iommu_device_sysfs_add(&qcom_iommu->iommu, dev, NULL, dev_name(dev)); if (ret) { dev_err(dev, "Failed to register iommu in sysfs\n"); - return ret; + goto err_pm_disable; } ret = iommu_device_register(&qcom_iommu->iommu, &qcom_iommu_ops, dev); @@ -869,6 +869,9 @@ static int qcom_iommu_device_probe(struct platform_device *pdev) err_sysfs_remove: iommu_device_sysfs_remove(&qcom_iommu->iommu); + +err_pm_disable: + pm_runtime_disable(dev); return ret; }