From patchwork Mon Feb 29 15:51:53 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Murali Karicheri X-Patchwork-Id: 63226 Delivered-To: patch@linaro.org Received: by 10.112.199.169 with SMTP id jl9csp1326498lbc; Mon, 29 Feb 2016 07:52:17 -0800 (PST) X-Received: by 10.66.187.36 with SMTP id fp4mr23071190pac.47.1456761137754; Mon, 29 Feb 2016 07:52:17 -0800 (PST) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si9400551pas.37.2016.02.29.07.52.17; Mon, 29 Feb 2016 07:52:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756099AbcB2PwQ (ORCPT + 30 others); Mon, 29 Feb 2016 10:52:16 -0500 Received: from devils.ext.ti.com ([198.47.26.153]:37294 "EHLO devils.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754885AbcB2PwN (ORCPT ); Mon, 29 Feb 2016 10:52:13 -0500 Received: from dflxv15.itg.ti.com ([128.247.5.124]) by devils.ext.ti.com (8.13.7/8.13.7) with ESMTP id u1TFplmi018823; Mon, 29 Feb 2016 09:51:47 -0600 Received: from DLEE70.ent.ti.com (dlemailx.itg.ti.com [157.170.170.113]) by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id u1TFpkrl009479; Mon, 29 Feb 2016 09:51:47 -0600 Received: from dlep32.itg.ti.com (157.170.170.100) by DLEE70.ent.ti.com (157.170.170.113) with Microsoft SMTP Server id 14.3.224.2; Mon, 29 Feb 2016 09:51:47 -0600 Received: from ula0868495.am.dhcp.ti.com (ileax41-snat.itg.ti.com [10.172.224.153]) by dlep32.itg.ti.com (8.14.3/8.13.8) with ESMTP id u1TFpkGm032534; Mon, 29 Feb 2016 09:51:46 -0600 From: Murali Karicheri To: , , , , , Subject: [PATCH v2] PCI: keystone: fix msi code that retrieves the pp struct ptr Date: Mon, 29 Feb 2016 10:51:53 -0500 Message-ID: <1456761113-8416-1-git-send-email-m-karicheri2@ti.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Recent update to pcie-designware core driver, 'commit cbce7900598c ("PCI: designware: Make driver arch-agnostic")' broke the keystone PCI driver. After this commit, we see a kernel crash on Keystone SoC as shown below in the boot log. This is because, the way pp struct ptr is retrieved from msi desc has changed and require similar update in pci-keystone-dw.c as well. This patch fixes this issue. [ 1.012999] pci 0000:00:00.0: PCI bridge to [bus 01] [ 1.018073] pci 0000:00:00.0: bridge window [io 0x1000-0x1fff] [ 1.024308] pci 0000:00:00.0: bridge window [mem 0x60000000-0x600fffff] [ 1.031216] pci 0000:00:00.0: bridge window [mem 0x60100000-0x601fffff pref] [ 1.038736] Unable to handle kernel NULL pointer dereference at virtual address 00000030 [ 1.046950] pgd = c0003000 [ 1.049750] [00000030] *pgd=80000800004003, *pmd=00000000 [ 1.055265] Internal error: Oops: 206 [#1] PREEMPT SMP ARM [ 1.060860] Modules linked in: [ 1.064013] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.4.2-00139-gb74f926 #2 [ 1.071266] Hardware name: Keystone [ 1.074853] task: eb888000 ti: eb890000 task.ti: eb890000 [ 1.080364] PC is at ks_dw_pcie_msi_irq_unmask+0x24/0x58 [ 1.085785] LR is at ks_dw_pcie_msi_irq_unmask+0x18/0x58 [ 1.091206] pc : [] lr : [] psr: 60000093 [ 1.091206] sp : eb891bc8 ip : 00000000 fp : ebb15010 [ 1.102915] r10: 00000051 r9 : 60000013 r8 : ebafaa20 [ 1.108247] r7 : ebaa9f80 r6 : eb9fd0c0 r5 : ebafa9d0 r4 : ebafa9c0 [ 1.114889] r3 : 00000051 r2 : 00000000 r1 : 00000001 r0 : ebb14c18 [ 1.121533] Flags: nZCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment kernel [ 1.129049] Control: 30c5387d Table: 00003000 DAC: fffffffd [ 1.134905] Process swapper/0 (pid: 1, stack limit = 0xeb890210) [ 1.141023] Stack: (0xeb891bc8 to 0xeb892000) Cc: Bjorn Helgaas Cc: # 4.4.x Signed-off-by: Murali Karicheri --- v2 - Looks like I missed the fix version format for stable. Fixed it per best of my knowledge. v1 - Resending as per stable submission procedure drivers/pci/host/pci-keystone-dw.c | 11 +++-------- 1 file changed, 3 insertions(+), 8 deletions(-) -- 1.9.1 diff --git a/drivers/pci/host/pci-keystone-dw.c b/drivers/pci/host/pci-keystone-dw.c index ed34c95..6153853 100644 --- a/drivers/pci/host/pci-keystone-dw.c +++ b/drivers/pci/host/pci-keystone-dw.c @@ -58,11 +58,6 @@ #define to_keystone_pcie(x) container_of(x, struct keystone_pcie, pp) -static inline struct pcie_port *sys_to_pcie(struct pci_sys_data *sys) -{ - return sys->private_data; -} - static inline void update_reg_offset_bit_pos(u32 offset, u32 *reg_offset, u32 *bit_pos) { @@ -108,7 +103,7 @@ static void ks_dw_pcie_msi_irq_ack(struct irq_data *d) struct pcie_port *pp; msi = irq_data_get_msi_desc(d); - pp = sys_to_pcie(msi_desc_to_pci_sysdata(msi)); + pp = (struct pcie_port *) msi_desc_to_pci_sysdata(msi); ks_pcie = to_keystone_pcie(pp); offset = d->irq - irq_linear_revmap(pp->irq_domain, 0); update_reg_offset_bit_pos(offset, ®_offset, &bit_pos); @@ -146,7 +141,7 @@ static void ks_dw_pcie_msi_irq_mask(struct irq_data *d) u32 offset; msi = irq_data_get_msi_desc(d); - pp = sys_to_pcie(msi_desc_to_pci_sysdata(msi)); + pp = (struct pcie_port *) msi_desc_to_pci_sysdata(msi); ks_pcie = to_keystone_pcie(pp); offset = d->irq - irq_linear_revmap(pp->irq_domain, 0); @@ -167,7 +162,7 @@ static void ks_dw_pcie_msi_irq_unmask(struct irq_data *d) u32 offset; msi = irq_data_get_msi_desc(d); - pp = sys_to_pcie(msi_desc_to_pci_sysdata(msi)); + pp = (struct pcie_port *) msi_desc_to_pci_sysdata(msi); ks_pcie = to_keystone_pcie(pp); offset = d->irq - irq_linear_revmap(pp->irq_domain, 0);