Received: by 2002:a05:7412:bb8d:b0:d7:7d3a:4fe2 with SMTP id js13csp319462rdb; Mon, 14 Aug 2023 19:07:26 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEkV+ITo4KupCw8x9jTy40ERM2HC1Ocd3HZmjpaXz6tvJssRZAeaz06im496liheN7uKZv4 X-Received: by 2002:a17:906:cc4f:b0:99c:6671:66d7 with SMTP id mm15-20020a170906cc4f00b0099c667166d7mr9901563ejb.39.1692065246736; Mon, 14 Aug 2023 19:07:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692065246; cv=none; d=google.com; s=arc-20160816; b=e4lLp1qad82MuoKuCVOEkn9baJsqs6OGP14c8ISN9fT7MKP0NoRMpMSdKDlnec0Vqh Fl7CEmioqY5SIK/7UEtRe8NTtKRG1ew9IClm0Fg46WM/HpJAeIQTSOpb3X5ES12kXSEa v3bIvzbnzKofTBKnUuV+AHEC1WRfshMUsNa7I1WEtNQ6AqjpVEnzICXgg9ypuGQH98Mu 5lDwwJP9/1+B0BEHBGXK9j3d0tUA62WSaWY9Q1GTzETLfMjyvv+jf0eLAVugPdRPX2WJ wT90C4ylvjHKg3Uk7BFfYtypWmwCf1K0EpSRap2ebxFi8BQdPvxj5sdUxmknTlnUXTtn cYAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=KVAHmtEqhQ3ecgRXuwnBQ7/m2Ly7lQWmBhYId01aUpg=; fh=fvn3odVbohOWB1D4cRiHuScBFjxiJl/FEnzPdxU8Mg8=; b=NYjUDl+UiVVQuX3vup8YShRkOyxDEXHvl2sjU72Kkntl70Kyn1m0JtV3q+Zgj4UWUP 3pgko/jlabfAJtvMBzbAo0mNKnF4qj3IOQOro1W5tVtpQ69xcvRZMM1e1jQ5Jcs3uFv5 sYrxdGJYcNilljdPrMYn+VCz3TLSQswhqBP3jEhJoWAKWyFMwFUKAn5gxn7tRLBYYLCa evDjdvAjN8zTItYHH0RJRtTUG6kkBlAqMUhaif99uqNSwXrLIJD3OP4CBM2aokyYH5n6 0rKa6jBoD278btGOH6hKIUKPdtj9OzFbCVJ+ncwpn0wOIOLIMcrMyH3vn5uUwRG1gFwW nFvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s12-20020a170906060c00b00992169858f2si8569907ejb.3.2023.08.14.19.07.01; Mon, 14 Aug 2023 19:07:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233383AbjHNWrr (ORCPT + 99 others); Mon, 14 Aug 2023 18:47:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60188 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233387AbjHNWrr (ORCPT ); Mon, 14 Aug 2023 18:47:47 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5717BA2 for ; Mon, 14 Aug 2023 15:47:45 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 11E411063; Mon, 14 Aug 2023 15:48:27 -0700 (PDT) Received: from [10.57.90.230] (unknown [10.57.90.230]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 008533F6C4; Mon, 14 Aug 2023 15:47:42 -0700 (PDT) Message-ID: <2b69bd4e-5ef4-16c7-f908-7c70187e12b6@arm.com> Date: Mon, 14 Aug 2023 23:47:41 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH 2/2] coresight: core: Fix multiple free TRBE platform data resource To: Junhao He , mike.leach@linaro.org, leo.yan@linaro.org, anshuman.khandual@arm.com, jonathan.cameron@huawei.com, James Clark Cc: coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linuxarm@huawei.com, yangyicong@huawei.com, prime.zeng@hisilicon.com References: <20230814093813.19152-1-hejunhao3@huawei.com> <20230814093813.19152-3-hejunhao3@huawei.com> From: Suzuki K Poulose In-Reply-To: <20230814093813.19152-3-hejunhao3@huawei.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org + James Clark On 14/08/2023 10:38, Junhao He wrote: > Current the TRBE driver supports matching TRBE platform device through > id_table. The ACPI created a dummy TRBE platform device inside > drivers/perf/arm_pmu_acpi.c. So the TRBE platform driver will probe only > once and allocate just one TRBE platform data resource. > > If the system supports the TRBE feature, Each CPU in the systems can > have at least one TRBE present, and the coresight_unregister gets called > multiple times, once for each of them. > Therefore, when unregister TRBE coresight devices, the TRBE platform data > resource will multiple free in function coresight_unregister. > > root@localhost:# insmod coresight-trbe.ko > root@localhost:# rmmod coresight-trbe.ko > [ 423.455932] ------------[ cut here ]------------ > [ 423.461987] WARNING: CPU: 1 PID: 0 at drivers/base/devres.c:1064 devm_kfree+0x88/0x98 > [ 423.483821] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G O 6.5.0-rc4+ #1 > [ 423.505842] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) > ... > [ 423.601301] Call trace: > [ 423.604202] devm_kfree+0x88/0x98 > [ 423.608369] coresight_release_platform_data+0xb8/0xe0 [coresight] > [ 423.616589] coresight_unregister+0x120/0x170 [coresight] > [ 423.623533] arm_trbe_remove_coresight_cpu+0x70/0xa0 [coresight_trbe] > [ 423.631082] __flush_smp_call_function_queue+0x1e4/0x4e0 > [ 423.637471] generic_smp_call_function_single_interrupt+0x1c/0x30 > [ 423.644796] ipi_handler+0x90/0x278 > [ 423.648992] handle_percpu_devid_irq+0x90/0x250 > [ 423.654636] generic_handle_domain_irq+0x34/0x58 > [ 423.659786] gic_handle_irq+0x12c/0x270 > [ 423.664039] call_on_irq_stack+0x24/0x30 > [ 423.668452] do_interrupt_handler+0x88/0x98 > [ 423.673027] el1_interrupt+0x48/0xe8 > [ 423.677413] el1h_64_irq_handler+0x18/0x28 > [ 423.681781] el1h_64_irq+0x78/0x80 > [ 423.685550] default_idle_call+0x5c/0x180 > [ 423.689855] do_idle+0x25c/0x2c0 > [ 423.694196] cpu_startup_entry+0x2c/0x40 > [ 423.698373] secondary_start_kernel+0x144/0x188 > [ 423.703920] __secondary_switched+0xb8/0xc0 > [ 423.708972] ---[ end trace 0000000000000000 ]--- > [ 423.729209] ------------[ cut here ]------------ > ... > [ 423.735217] WARNING: CPU: 2 PID: 40 at drivers/base/devres.c:1064 devm_kfree+0x88/0x98 > ... > [ 424.012385] WARNING: CPU: 3 PID: 0 at drivers/base/devres.c:1064 devm_kfree+0x88/0x98 > ... > > This patch does the following: > 1.TRBE coresight devices do not need regular connections information, We > can free connections resource when the nr_conns is valid. > 2.And we can ignore the free platform data resource, it will be > automatically free in platform_driver_unregister(). Do we need a Fixes tag here ? > > Signed-off-by: Junhao He > --- > drivers/hwtracing/coresight/coresight-core.c | 7 ++++--- > 1 file changed, 4 insertions(+), 3 deletions(-) > > diff --git a/drivers/hwtracing/coresight/coresight-core.c b/drivers/hwtracing/coresight/coresight-core.c > index 118fcf27854d..c6f7889d1b4d 100644 > --- a/drivers/hwtracing/coresight/coresight-core.c > +++ b/drivers/hwtracing/coresight/coresight-core.c > @@ -1555,9 +1555,10 @@ void coresight_release_platform_data(struct coresight_device *csdev, > conns[i]->dest_fwnode = NULL; > devm_kfree(dev, conns[i]); > } > - devm_kfree(dev, pdata->out_conns); > - devm_kfree(dev, pdata->in_conns); > - devm_kfree(dev, pdata); > + if (pdata->nr_outconns) > + devm_kfree(dev, pdata->out_conns); > + if (pdata->nr_inconns) > + devm_kfree(dev, pdata->in_conns); These allocations are made on the parent device and that may never get unregistered (e.g., AMBA device, platform device, stay forever, even when the "coresight" modules are unloaded). Thus the memory will be left unused, literally leaking. This specific devm_kfree() was added to fix that. May be we should fix this in the TRBE driver to use separate pdata for the TRBE device instances. Suzuki > if (csdev) > coresight_remove_conns_sysfs_group(csdev); > }