Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp193633pxb; Fri, 15 Oct 2021 03:42:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTMrbGB6iTUypNSXakgVUQJ3QfnbwpOaBy8gbrZb+3Rj49S330mQWer2FYZDLvdfVFoT35 X-Received: by 2002:a17:90a:be02:: with SMTP id a2mr12916402pjs.59.1634294558821; Fri, 15 Oct 2021 03:42:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634294558; cv=none; d=google.com; s=arc-20160816; b=nx/GIgBxTsVuuEHDV48xhbsiWfdnf2HPWJq7C/hNmfXBpxmNQVlL1FmmLSSvKvYxe8 NwfmkQGIKIyxtMQVUqmrlQHGz4fdvgljNtvtswkmrVGEs3IPzw8ZQWlxw9URhLdU6OkG XLLNRMvdKa4jwJ8Ke+8PblQehYV7d2hMMa6jWg8kaeD40/Bql5rsbT2847meAjlE0T+D 2B4RPR42KcE2/Ume8ZS33qtNRUZjpu3uHVn7KLM9uMdWCqfxVwiAsd2D3USUDtvIoNCn bc4eVDMqeeHl1vPhYIyobjrtVLUiMiyTDxcs+R0vZvwqudqJYK34URAkdlmYnPIT4qkU bZRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=Fsg+6xkwddMBXS1pW/vEoy7bfcfb/fxI9vXhgu+h9r0=; b=yrh78V7RENVeGT3JoEO4V99bTD9BKsrHdLTf3l5vS7d/5Nf5APVhsZDsWuOnvK7r2P PYkLD/yfsg/IqTuX3zJYRCXqZp3eplcoqLFRnVtSKOHCxB3VFiAZa9dcCqhBk4Z/HLlS fAVQbjzRvrtCd6Pi+e4tM5SfjXqNtEKIOmgWEjjI1xp8tHi1SSqHWNDhTVrw5qUGvgef 6d37fGYUYNbxys78L+I62IvqO6WVT3UNzwV2Wvj9XYtQlSRcmzqwgQ8c39vqHyD3jJLG qGzaEhCh1BY5KrxaX0dM5a+mnBtKKLcf/F4KD3OhNWGiiujbWRaai4v7KocSCnfeeW3F KaYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=rKMQkGZt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si6713499plz.315.2021.10.15.03.42.25; Fri, 15 Oct 2021 03:42:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=rKMQkGZt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234787AbhJOB4N (ORCPT + 99 others); Thu, 14 Oct 2021 21:56:13 -0400 Received: from alexa-out.qualcomm.com ([129.46.98.28]:44592 "EHLO alexa-out.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232271AbhJOB4M (ORCPT ); Thu, 14 Oct 2021 21:56:12 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; i=@quicinc.com; q=dns/txt; s=qcdkim; t=1634262847; x=1665798847; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=Fsg+6xkwddMBXS1pW/vEoy7bfcfb/fxI9vXhgu+h9r0=; b=rKMQkGZt6MFJTkhnSj05Q1/U+bfuGDd2QEBEajRtdhVKshvQLJv7cwMm 7wCCM6Qh1i769mE6Y16Hb1VKmg7zyMruLVLz17Mg3PO3i/ALO4H/KBQum t5vnBbt/7xEPRfU0UZ62i9DIRYqZgVdA9SXHv+XfUOpTdXs/3/nl0g0dl o=; Received: from ironmsg-lv-alpha.qualcomm.com ([10.47.202.13]) by alexa-out.qualcomm.com with ESMTP; 14 Oct 2021 18:54:07 -0700 X-QCInternal: smtphost Received: from nalasex01c.na.qualcomm.com ([10.47.97.35]) by ironmsg-lv-alpha.qualcomm.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Oct 2021 18:54:06 -0700 Received: from [10.231.205.174] (10.80.80.8) by nalasex01c.na.qualcomm.com (10.47.97.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.922.7; Thu, 14 Oct 2021 18:54:04 -0700 Subject: Re: [RESEND PATCH v1 3/9] spmi: pmic-arb: check apid against limits before calling irq handler To: Stephen Boyd , , CC: , , , References: <1631860384-26608-1-git-send-email-quic_fenglinw@quicinc.com> <1631860384-26608-4-git-send-email-quic_fenglinw@quicinc.com> <163406173869.936959.6395787327312518099@swboyd.mtv.corp.google.com> <7efffba4-5e8b-1b71-8bee-3dffe65cfdf5@quicinc.com> <163415312707.936959.13741150880359468709@swboyd.mtv.corp.google.com> <6ca3f254-90ad-e0e5-ced9-0f12deb408c6@quicinc.com> <163426052104.936959.4574808739645012745@swboyd.mtv.corp.google.com> From: Fenglin Wu Message-ID: Date: Fri, 15 Oct 2021 09:54:01 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: <163426052104.936959.4574808739645012745@swboyd.mtv.corp.google.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01c.na.qualcomm.com (10.47.97.35) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/15/2021 9:15 AM, Stephen Boyd wrote: > Quoting Fenglin Wu (2021-10-13 20:11:40) >> On 10/14/2021 3:25 AM, Stephen Boyd wrote: >>> Quoting Fenglin Wu (2021-10-12 22:31:22) >>>> On 10/13/2021 2:02 AM, Stephen Boyd wrote: >>>>> Quoting Fenglin Wu (2021-09-16 23:32:58) >>>>>> From: David Collins >>>>>> >>>>>> Check that the apid for an SPMI interrupt falls between the >>>>>> min_apid and max_apid that can be handled by the APPS processor >>>>>> before invoking the per-apid interrupt handler: >>>>>> periph_interrupt(). >>>>>> >>>>>> This avoids an access violation in rare cases where the status >>>>>> bit is set for an interrupt that is not owned by the APPS >>>>>> processor. >>>>>> >>>>>> Signed-off-by: David Collins >>>>>> Signed-off-by: Fenglin Wu >>>>>> --- >>>>> Fixes? BTW, a lot of these patches are irqchip specific. It would be >>>>> good to get review from irqchip maintainers. Maybe we should split the >>>>> irqchip driver off via the auxiliary bus so that irqchip maintainers can >>>>> review. Please Cc them on irqchip related patches. >>>>> >>>>> IRQCHIP DRIVERS >>>>> M: Thomas Gleixner >>>>> M: Marc Zyngier >>>> Sure, copied Thomas and Marc for code review. >>>> This is a fix to avoid the register access violation in a case that an >>>> interrupt is fired in a PMIC module which is not owned by APPS >>>> processor. >>> Got it. >>> >>>>>> drivers/spmi/spmi-pmic-arb.c | 6 ++++++ >>>>>> 1 file changed, 6 insertions(+) >>>>>> >>>>>> diff --git a/drivers/spmi/spmi-pmic-arb.c b/drivers/spmi/spmi-pmic-arb.c >>>>>> index 4d7ad004..c4adc06 100644 >>>>>> --- a/drivers/spmi/spmi-pmic-arb.c >>>>>> +++ b/drivers/spmi/spmi-pmic-arb.c >>>>>> @@ -535,6 +535,12 @@ static void pmic_arb_chained_irq(struct irq_desc *desc) >>>>>> id = ffs(status) - 1; >>>>>> status &= ~BIT(id); >>>>>> apid = id + i * 32; >>>>>> + if (apid < pmic_arb->min_apid >>>>>> + || apid > pmic_arb->max_apid) { >>>>> The || goes on the line above. What about making a local variable for >>>>> first and last and then shifting by 5 in the loop? >>>>> >>>>> int first = pmic_arb->min_apid; >>>>> int last = pmic_arb->max_apid; >>>>> >>>>> for (i = first >> 5; i <= last >> 5; i++) >>>>> >>>>> if (apid < first || apid > last) >>>> ACK, will update it following this. >>>>>> + WARN_ONCE(true, "spurious spmi irq received for apid=%d\n", >>>>>> + apid); >>>>> Is there any way to recover from this? Or once the mapping is wrong >>>>> we're going to get interrupts that we don't know what to do with >>>>> forever? >>>> This is a rare case that the unexpected interrupt is fired in a module >>>> not owned by APPS process, so the interrupt itself is not expected hence >>>> no need to recover from this but just bail out to avoid following register >>>> access violation. >>> And then the irq stops coming? It feels like a misconfiguration in the >>> firmware that we're trying to hide, hence the WARN_ONCE(). Can we >>> somehow silence irqs that aren't owned by the APPS when this driver >>> probes so that they can't even happen after probe? >> Actually this is a rarely happened case that couldn't be reproduced easily >> and consistently for further debug. I agreed this should be caused by HW >> misconfiguration or even some unknown HW bug that it would send out SPMI >> interrupt messages with incorrect APID, but we have never had any chance >> to find out the root cause. The patch here simply checked the APID and >> bail out if it's not in the valid range, it won't cause anything bad but >> improves the SW robustness. After that, the IRQ won't be triggered again >> because the latched status in PMIC is not cleared. Also, because of the >> access restriction to the registers corresponding to this APID, there is >> nothing we can do from APPS processor side to keep it silent. > This patch seems like a band-aid for an issue that isn't fully > understood. I suppose it's good that the irq will stay asserted forever > and then it won't happen again until it gets cleared by some other > processor in the SoC. Instead of the WARN_ONCE() can we track if any irq > is handled when the chained irq is raised, and if nothing is handled > then call handle_bad_irq() on the chained descriptor? Take a look at > pinctrl-msm.c to see how they handled spurious irqs that aren't actually > directed at the APPS processor. We should do something similar here. Sure, I will do it that way.