Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp4034033rdh; Fri, 29 Sep 2023 09:11:08 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHtvYCYF6CN/FSRPHIxg0MH1alB3EMsLX6pqWXG3paHHmjihCKdcqOao35yoBWHyYI6F+wc X-Received: by 2002:a17:902:744c:b0:1c4:5c05:c3e0 with SMTP id e12-20020a170902744c00b001c45c05c3e0mr4824214plt.56.1696003868336; Fri, 29 Sep 2023 09:11:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696003868; cv=none; d=google.com; s=arc-20160816; b=bqEfdFy0K1Z4Re18deujnaVgahrkHL9Q/Eru61mTDEhrnnNBWyn1L0tJ5MazLtem/t 4gIvH7Lc4fiOyEuIqDJo1a7qyf0PRrWQfHfaCvRN9cs5ScQ0sUB+2r7tBA/GWBsyh5KE NF8gWC+PjKp7exdYYkYDQ0uFyAO6MFtRxl88L3DW3ME7ragB2YhorrOSfn2jgvMJ/yV0 ySjAQROqSlh6MdZ5fVW0mzO3OItXy7olB7DQYbJ/B07r9ZIvr6iIJJCx/xPTvSV0KwON 1woV4hmhd4Kr6BMQpYXU9JFd1VG3qrkxFsA9ahjsC1sBRoUl3uDWsgRdxyDfej0z2xVO 94Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:mime-version:user-agent:message-id :in-reply-to:date:references:cc:to:from; bh=/FfTIvHVzY95ZEzMIhjT/gFYFPm5+eZGvWURn+EbzhU=; fh=lZL1JGkoUiHzCs6eeOzqgQAIfw6MbyT0TYGA9F9oKFY=; b=yGiEUQ/CMNTf/+r8tEkjS7+z4h4ICkTkGuNsF7Kgykuad3uRBtWSCAkceVTbune7nL aIuS4sUzh+ZaUtdVP+sY0MvW1186IFv+JDKzDsm6AIwFQeZDs/REGIeiGOCFq58Pyuyr 1fp17xV40icKO2D0W1u4ih7sHooayh0gjHkE9Wwsue3v0pI9/1/OYu9swaBrQILaRHl6 wFF4KrNbqnVyLl+9OGO6iTP3f9yGpTBDt8Pc+hwT5Ri2hqGZXEpkQ0obDy79knfSQcMI /ESt33urKahHJC3muiW9qYQTWdw+b3SwHgsBiLcOvHdc3aTx2z5iTEEWEpYLEXbb9TFj 3Fhw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id p6-20020a170902780600b001bdc664cd69si20279317pll.153.2023.09.29.09.11.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 09:11:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id C5B97804A72E; Fri, 29 Sep 2023 09:01:18 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233647AbjI2QBD (ORCPT + 99 others); Fri, 29 Sep 2023 12:01:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60036 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233141AbjI2QBC (ORCPT ); Fri, 29 Sep 2023 12:01:02 -0400 Received: from out01.mta.xmission.com (out01.mta.xmission.com [166.70.13.231]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 545D1139 for ; Fri, 29 Sep 2023 09:01:00 -0700 (PDT) Received: from in02.mta.xmission.com ([166.70.13.52]:49814) by out01.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1qmFvG-008vng-VE; Fri, 29 Sep 2023 10:00:59 -0600 Received: from ip68-227-168-167.om.om.cox.net ([68.227.168.167]:42582 helo=email.froward.int.ebiederm.org.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1qmFvF-00H9Oh-8k; Fri, 29 Sep 2023 10:00:58 -0600 From: "Eric W. Biederman" To: "Joel Fernandes (Google)" Cc: linux-kernel@vger.kernel.org, Steven Rostedt , Ricardo Ribalda , Ross Zwisler , Rob Clark , Linus Torvalds , kexec@lists.infradead.org References: <20230929021213.2364883-1-joel@joelfernandes.org> Date: Fri, 29 Sep 2023 11:00:49 -0500 In-Reply-To: <20230929021213.2364883-1-joel@joelfernandes.org> (Joel Fernandes's message of "Fri, 29 Sep 2023 02:12:12 +0000") Message-ID: <87bkdl55qm.fsf@email.froward.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1qmFvF-00H9Oh-8k;;;mid=<87bkdl55qm.fsf@email.froward.int.ebiederm.org>;;;hst=in02.mta.xmission.com;;;ip=68.227.168.167;;;frm=ebiederm@xmission.com;;;spf=pass X-XM-AID: U2FsdGVkX19pIQoI2yAji5xXUZsxi83S5aP6GqyP94M= X-SA-Exim-Connect-IP: 68.227.168.167 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email X-Spam-Level: X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-DCC: XMission; sa06 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;"Joel Fernandes (Google)" X-Spam-Relay-Country: X-Spam-Timing: total 1064 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 9 (0.9%), b_tie_ro: 8 (0.8%), parse: 1.50 (0.1%), extract_message_metadata: 29 (2.7%), get_uri_detail_list: 4.2 (0.4%), tests_pri_-2000: 14 (1.3%), tests_pri_-1000: 3.0 (0.3%), tests_pri_-950: 1.29 (0.1%), tests_pri_-900: 1.05 (0.1%), tests_pri_-200: 0.84 (0.1%), tests_pri_-100: 12 (1.2%), tests_pri_-90: 420 (39.5%), check_bayes: 392 (36.9%), b_tokenize: 10 (0.9%), b_tok_get_all: 204 (19.2%), b_comp_prob: 5 (0.5%), b_tok_touch_all: 167 (15.7%), b_finish: 2.1 (0.2%), tests_pri_0: 480 (45.1%), check_dkim_signature: 0.82 (0.1%), check_dkim_adsp: 7 (0.6%), poll_dns_idle: 0.88 (0.1%), tests_pri_10: 54 (5.1%), tests_pri_500: 33 (3.1%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH] kexec: Fix reboot race during device_shutdown() X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 29 Sep 2023 09:01:19 -0700 (PDT) "Joel Fernandes (Google)" writes: > During kexec reboot, it is possible for a race to occur between > device_shutdown() and userspace. This causes accesses to GPU after pm_runtime > suspend has already happened. Fix this by calling freeze_processes() before > device_shutdown(). Is there any reason why this same race with between sys_kexec and the adreno_ioctl can not happen during a normal reboot? Is there any reason why there is not a .shutdown method to prevent the race? I would think the thing to do is to prevent this race in kernel_restart_prepare or in the GPUs .shutdown method. As I don't see anything that would prevent this during a normal reboot. > > Such freezing is already being done if kernel supports KEXEC_JUMP and > kexec_image->preserve_context is true. However, doing it if either of these are > not true prevents crashes/races. The KEXEC_JUMP case is something else entirely. It is supposed to work like suspend to RAM. Maybe reboot should as well, but I am uncomfortable making a generic device fix kexec specific. > This fixes the following crash during kexec reboot on an ARM64 device > with adreno GPU: > > [ 292.534314] Kernel panic - not syncing: Asynchronous SError Interrupt > [ 292.534323] Hardware name: Google Lazor (rev3 - 8) with LTE (DT) > [ 292.534326] Call trace: > [ 292.534328] dump_backtrace+0x0/0x1d4 > [ 292.534337] show_stack+0x20/0x2c > [ 292.534342] dump_stack_lvl+0x60/0x78 > [ 292.534347] dump_stack+0x18/0x38 > [ 292.534352] panic+0x148/0x3b0 > [ 292.534357] nmi_panic+0x80/0x94 > [ 292.534364] arm64_serror_panic+0x70/0x7c > [ 292.534369] do_serror+0x0/0x7c > [ 292.534372] do_serror+0x54/0x7c > [ 292.534377] el1h_64_error_handler+0x34/0x4c > [ 292.534381] el1h_64_error+0x7c/0x80 > [ 292.534386] el1_interrupt+0x20/0x58 > [ 292.534389] el1h_64_irq_handler+0x18/0x24 > [ 292.534395] el1h_64_irq+0x7c/0x80 > [ 292.534399] local_daif_inherit+0x10/0x18 > [ 292.534405] el1h_64_sync_handler+0x48/0xb4 > [ 292.534410] el1h_64_sync+0x7c/0x80 > [ 292.534414] a6xx_gmu_set_oob+0xbc/0x1fc > [ 292.534422] a6xx_get_timestamp+0x40/0xb4 > [ 292.534426] adreno_get_param+0x12c/0x1e0 > [ 292.534433] msm_ioctl_get_param+0x64/0x70 > [ 292.534440] drm_ioctl_kernel+0xe8/0x158 > [ 292.534448] drm_ioctl+0x208/0x320 > [ 292.534453] __arm64_sys_ioctl+0x98/0xd0 > [ 292.534461] invoke_syscall+0x4c/0x118 > > Cc: Steven Rostedt > Cc: Ricardo Ribalda > Cc: Ross Zwisler > Cc: Rob Clark > Cc: Linus Torvalds > Tested-by: Ricardo Ribalda > Signed-off-by: Joel Fernandes (Google) > --- > kernel/kexec_core.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c > index e2f2574d8b74..6599f485e42d 100644 > --- a/kernel/kexec_core.c > +++ b/kernel/kexec_core.c > @@ -1299,6 +1299,12 @@ int kernel_kexec(void) > } else > #endif > { > + error = freeze_processes(); > + if (error) { > + error = -EBUSY; > + goto Unlock; > + } > + > kexec_in_progress = true; > kernel_restart_prepare("kexec reboot"); > migrate_to_reboot_cpu(); Eric