Return-path: Received: from mail-qa0-f53.google.com ([209.85.216.53]:33621 "EHLO mail-qa0-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030310Ab2LHTtC (ORCPT ); Sat, 8 Dec 2012 14:49:02 -0500 Received: by mail-qa0-f53.google.com with SMTP id a19so512389qad.19 for ; Sat, 08 Dec 2012 11:49:01 -0800 (PST) Message-ID: <50C399A9.2060304@lwfinger.net> (sfid-20121208_204907_540775_5A84A6B8) Date: Sat, 08 Dec 2012 13:48:57 -0600 From: Larry Finger MIME-Version: 1.0 To: Felix Janda CC: John W Linville , b43-dev , linux-wireless Subject: Re: [RFC/RFT] b43: Load initial firmware file asynchronously References: <50C01558.8050102@lwfinger.net> <20121208143032.GA1903@gauss> <50C375BE.9050907@lwfinger.net> <20121208175615.GA10664@gauss> In-Reply-To: <20121208175615.GA10664@gauss> Content-Type: multipart/mixed; boundary="------------090902050309000308030107" Sender: linux-wireless-owner@vger.kernel.org List-ID: This is a multi-part message in MIME format. --------------090902050309000308030107 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit On 12/08/2012 11:56 AM, Felix Janda wrote: > On 12/08/12 at 11:15am, Larry Finger wrote: >> On 12/08/2012 08:30 AM, Felix Janda wrote: >>> Thanks, for coming back to this. >>> >>> It now gives me a kernel panic after 30 seconds. >>> >>> I did some debugging using ssleep and printk. b43_fw_cb seems >>> to be called several times and on the last time the "firmware" >>> argument seems to be zero. The execution then returns to >>> b43_do_request_fw, which tries to deference a zero pointer in >>> the line >>> >>>> + if (ctx->blob->size < sizeof(struct b43_fw_header)) >>> >>> >>> It is another machine then last time, has B4306 (rev 3) and a >>> kernel without modules. The firmware is in /lib/firmware/b43, >>> which is on the root partition. There is no udev installed. >> >> Felix, >> >> Curious. I would have expected a single call to b43_do_request_fw() with the >> async flag set, and thus a single call to the callback routine. >> >> Attached is a new version of the patch. It will give us some instrumentation on >> the calls, and it should prevent the crash. I would like to see the dmesg output >> showing the info. >> >> Thanks for testing, >> >> Larry > > Sorry, I assumed that the callback routine was called several times only > by looking at how much delay I was producing by putting ssleep(10) into it. > > There's no more panic with the new version and the dmesg output looks > interesting. > > Am I missing some firmware? /lib/firmware/b43 contains: > > a0g0bsinitvals5.fw a0g0initvals5.fw a0g1bsinitvals5.fw > a0g1initvals5.fw b0g0bsinitvals5.fw b0g0initvals5.fw pcm5.fw ucode5.fw You have the correct firmware. For some reason, it is failing to load ucode5.fw even though it is available: [ 0.502490] b43-phy0: Broadcom 4306 WLAN found (core revision 5) [ 0.543046] b43-phy0: Found PHY: Analog 2, Type 2 (G), Revision 2 [ 0.705141] async load of b43/ucode5.fw [ 0.738576] Broadcom 43xx driver loaded [ Features: PL ] [ 62.284701] In callback routine, firmware not available The 61.5 second delay is likely the wait while user-space is up and running. The second call happens because the driver will try the open-source firmware when the proprietary fw is not available. The system does not need udev. It uses sysfs and hotplug to complete the operation. I am assuming that both are part of your system. The attached patch first tries to load the ucode fw with an asynchronous call. If that fails, it then tries a synchronous read. By the time the first one returns, user space should be running and the sync call should be OK. Larry --------------090902050309000308030107 Content-Type: text/plain; charset=UTF-8; name="b43_async_firmware" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="b43_async_firmware" Recent versions of udev cause synchronous firmware loading from the probe routine to fail because the request to user space would time out. The original fix for b43 (commit 6b6fa58) moved the firmware load from the probe routine to a work queue, but it still used synchronous firmware loading. This method is OK when b43 is built as a module; however, it fails when the driver is compiled into the kernel. This version changes the code to load the initial firmware file using request_firmware_nowait(). A completion event is used to hold the work queue until that file is available. This driver reads several firmware files - the remainder can be read synchronourly. Signed-off-by: Larry Finger Cc: Stable (V3.4+) --- Index: wireless-testing-new/drivers/net/wireless/b43/b43.h =================================================================== --- wireless-testing-new.orig/drivers/net/wireless/b43/b43.h +++ wireless-testing-new/drivers/net/wireless/b43/b43.h @@ -7,6 +7,7 @@ #include #include #include +#include #include #include "debugfs.h" @@ -722,6 +723,10 @@ enum b43_firmware_file_type { struct b43_request_fw_context { /* The device we are requesting the fw for. */ struct b43_wldev *dev; + /* a completion event structure needed if this call is asynchronous */ + struct completion fw_load_complete; + /* a pointer to the firmware object */ + const struct firmware *blob; /* The type of firmware to request. */ enum b43_firmware_file_type req_type; /* Error messages for each firmware type. */ Index: wireless-testing-new/drivers/net/wireless/b43/main.c =================================================================== --- wireless-testing-new.orig/drivers/net/wireless/b43/main.c +++ wireless-testing-new/drivers/net/wireless/b43/main.c @@ -2088,11 +2088,21 @@ static void b43_print_fw_helptext(struct b43warn(wl, text); } +static void b43_fw_cb(const struct firmware *firmware, void *context) +{ + struct b43_request_fw_context *ctx = context; + + ctx->blob = firmware; + if (!firmware) + pr_err("In callback routine, firmware not available\n"); + complete(&ctx->fw_load_complete); + dump_stack(); +} + int b43_do_request_fw(struct b43_request_fw_context *ctx, const char *name, - struct b43_firmware_file *fw) + struct b43_firmware_file *fw, bool async) { - const struct firmware *blob; struct b43_fw_header *hdr; u32 size; int err; @@ -2131,11 +2141,33 @@ int b43_do_request_fw(struct b43_request B43_WARN_ON(1); return -ENOSYS; } - err = request_firmware(&blob, ctx->fwname, ctx->dev->dev->dev); + if (async) { + /* do this part asynchronously */ + pr_info("async load of %s\n", ctx->fwname); + init_completion(&ctx->fw_load_complete); + err = request_firmware_nowait(THIS_MODULE, 1, ctx->fwname, + ctx->dev->dev->dev, GFP_KERNEL, + ctx, b43_fw_cb); + if (err < 0) { + pr_err("Unable to load firmware\n"); + return err; + } + /* stall here until fw ready */ + wait_for_completion(&ctx->fw_load_complete); + if (!ctx->blob) { + pr_err("Firmware not found\n"); + return -ENOENT; + } else { + goto fw_ready; + } + } + err = request_firmware(&ctx->blob, ctx->fwname, + ctx->dev->dev->dev); if (err == -ENOENT) { snprintf(ctx->errors[ctx->req_type], sizeof(ctx->errors[ctx->req_type]), - "Firmware file \"%s\" not found\n", ctx->fwname); + "Firmware file \"%s\" not found\n", + ctx->fwname); return err; } else if (err) { snprintf(ctx->errors[ctx->req_type], @@ -2144,14 +2176,15 @@ int b43_do_request_fw(struct b43_request ctx->fwname, err); return err; } - if (blob->size < sizeof(struct b43_fw_header)) +fw_ready: + if (ctx->blob->size < sizeof(struct b43_fw_header)) goto err_format; - hdr = (struct b43_fw_header *)(blob->data); + hdr = (struct b43_fw_header *)(ctx->blob->data); switch (hdr->type) { case B43_FW_TYPE_UCODE: case B43_FW_TYPE_PCM: size = be32_to_cpu(hdr->size); - if (size != blob->size - sizeof(struct b43_fw_header)) + if (size != ctx->blob->size - sizeof(struct b43_fw_header)) goto err_format; /* fallthrough */ case B43_FW_TYPE_IV: @@ -2162,7 +2195,7 @@ int b43_do_request_fw(struct b43_request goto err_format; } - fw->data = blob; + fw->data = ctx->blob; fw->filename = name; fw->type = ctx->req_type; @@ -2172,7 +2205,7 @@ err_format: snprintf(ctx->errors[ctx->req_type], sizeof(ctx->errors[ctx->req_type]), "Firmware file \"%s\" format error.\n", ctx->fwname); - release_firmware(blob); + release_firmware(ctx->blob); return -EPROTO; } @@ -2223,7 +2256,7 @@ static int b43_try_request_fw(struct b43 goto err_no_ucode; } } - err = b43_do_request_fw(ctx, filename, &fw->ucode); + err = b43_do_request_fw(ctx, filename, &fw->ucode, true); if (err) goto err_load; @@ -2235,7 +2268,7 @@ static int b43_try_request_fw(struct b43 else goto err_no_pcm; fw->pcm_request_failed = false; - err = b43_do_request_fw(ctx, filename, &fw->pcm); + err = b43_do_request_fw(ctx, filename, &fw->pcm, false); if (err == -ENOENT) { /* We did not find a PCM file? Not fatal, but * core rev <= 10 must do without hwcrypto then. */ @@ -2296,7 +2329,7 @@ static int b43_try_request_fw(struct b43 default: goto err_no_initvals; } - err = b43_do_request_fw(ctx, filename, &fw->initvals); + err = b43_do_request_fw(ctx, filename, &fw->initvals, false); if (err) goto err_load; @@ -2355,7 +2388,7 @@ static int b43_try_request_fw(struct b43 default: goto err_no_initvals; } - err = b43_do_request_fw(ctx, filename, &fw->initvals_band); + err = b43_do_request_fw(ctx, filename, &fw->initvals_band, false); if (err) goto err_load; Index: wireless-testing-new/drivers/net/wireless/b43/main.h =================================================================== --- wireless-testing-new.orig/drivers/net/wireless/b43/main.h +++ wireless-testing-new/drivers/net/wireless/b43/main.h @@ -137,9 +137,8 @@ void b43_mac_phy_clock_set(struct b43_wl struct b43_request_fw_context; -int b43_do_request_fw(struct b43_request_fw_context *ctx, - const char *name, - struct b43_firmware_file *fw); +int b43_do_request_fw(struct b43_request_fw_context *ctx, const char *name, + struct b43_firmware_file *fw, bool async); void b43_do_release_fw(struct b43_firmware_file *fw); #endif /* B43_MAIN_H_ */ --------------090902050309000308030107--