[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250715132509.2643305-2-usama.anjum@collabora.com>
Date: Tue, 15 Jul 2025 18:25:07 +0500
From: Muhammad Usama Anjum <usama.anjum@...labora.com>
To: Manivannan Sadhasivam <mani@...nel.org>,
Jeff Hugo <jeff.hugo@....qualcomm.com>,
Muhammad Usama Anjum <usama.anjum@...labora.com>,
Youssef Samir <quic_yabdulra@...cinc.com>,
Matthew Leung <quic_mattleun@...cinc.com>,
Alexander Wilhelm <alexander.wilhelm@...termo.com>,
Kunwu Chan <chentao@...inos.cn>,
Krishna Chaitanya Chundru <krishna.chundru@....qualcomm.com>,
Jacek Lawrynowicz <jacek.lawrynowicz@...ux.intel.com>,
Yan Zhen <yanzhen@...o.com>,
Sujeev Dias <sdias@...eaurora.org>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Siddartha Mohanadoss <smohanad@...eaurora.org>,
mhi@...ts.linux.dev,
linux-arm-msm@...r.kernel.org,
linux-kernel@...r.kernel.org
Cc: kernel@...labora.com,
stable@...r.kernel.org
Subject: [PATCH v2 1/3] bus: mhi: host: keep bhi buffer through suspend cycle
When there is memory pressure, at resume time dma_alloc_coherent()
returns error which in turn fails the loading of firmware and hence
the driver crashes:
kernel: kworker/u33:5: page allocation failure: order:7,
mode:0xc04(GFP_NOIO|GFP_DMA32), nodemask=(null),cpuset=/,mems_allowed=0
kernel: CPU: 1 UID: 0 PID: 7693 Comm: kworker/u33:5 Not tainted 6.11.11-valve17-1-neptune-611-g027868a0ac03 #1 3843143b92e9da0fa2d3d5f21f51beaed15c7d59
kernel: Hardware name: Valve Galileo/Galileo, BIOS F7G0112 08/01/2024
kernel: Workqueue: mhi_hiprio_wq mhi_pm_st_worker [mhi]
kernel: Call Trace:
kernel: <TASK>
kernel: dump_stack_lvl+0x4e/0x70
kernel: warn_alloc+0x164/0x190
kernel: ? srso_return_thunk+0x5/0x5f
kernel: ? __alloc_pages_direct_compact+0xaf/0x360
kernel: __alloc_pages_slowpath.constprop.0+0xc75/0xd70
kernel: __alloc_pages_noprof+0x321/0x350
kernel: __dma_direct_alloc_pages.isra.0+0x14a/0x290
kernel: dma_direct_alloc+0x70/0x270
kernel: mhi_fw_load_handler+0x126/0x340 [mhi a96cb91daba500cc77f86bad60c1f332dc3babdf]
kernel: mhi_pm_st_worker+0x5e8/0xac0 [mhi a96cb91daba500cc77f86bad60c1f332dc3babdf]
kernel: ? srso_return_thunk+0x5/0x5f
kernel: process_one_work+0x17e/0x330
kernel: worker_thread+0x2ce/0x3f0
kernel: ? __pfx_worker_thread+0x10/0x10
kernel: kthread+0xd2/0x100
kernel: ? __pfx_kthread+0x10/0x10
kernel: ret_from_fork+0x34/0x50
kernel: ? __pfx_kthread+0x10/0x10
kernel: ret_from_fork_asm+0x1a/0x30
kernel: </TASK>
kernel: Mem-Info:
kernel: active_anon:513809 inactive_anon:152 isolated_anon:0
active_file:359315 inactive_file:2487001 isolated_file:0
unevictable:637 dirty:19 writeback:0
slab_reclaimable:160391 slab_unreclaimable:39729
mapped:175836 shmem:51039 pagetables:4415
sec_pagetables:0 bounce:0
kernel_misc_reclaimable:0
free:125666 free_pcp:0 free_cma:0
In above example, if we sum all the consumed memory, it comes out
to be 15.5GB and free memory is ~ 500MB from a total of 16GB RAM.
Even though memory is present. But all of the dma memory has been
exhausted or fragmented.
Fix it by allocating it only once and then reuse the same allocated
memory. As we'll allocate this memory only once, this memory will stay
allocated.
Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.6
Fixes: cd457afb1667 ("bus: mhi: core: Add support for downloading firmware over BHIe")
Cc: stable@...r.kernel.org
Cc: Krishna Chaitanya Chundru <krishna.chundru@....qualcomm.com>
Signed-off-by: Muhammad Usama Anjum <usama.anjum@...labora.com>
---
Reported here:
https://lore.kernel.org/all/ead32f5b-730a-4b81-b38f-93d822f990c6@collabora.com
Still a lot of more fixes are required. Hence, I'm not adding closes tag.
Changes since v1:
- fix mhi_load_image_bhi()
- Cc stable and fix tested on tag
---
drivers/bus/mhi/host/boot.c | 25 +++++++++++++++----------
drivers/bus/mhi/host/init.c | 5 +++++
drivers/bus/mhi/host/internal.h | 2 ++
include/linux/mhi.h | 1 +
4 files changed, 23 insertions(+), 10 deletions(-)
diff --git a/drivers/bus/mhi/host/boot.c b/drivers/bus/mhi/host/boot.c
index b3a85aa3c4768..9fc983bc12d49 100644
--- a/drivers/bus/mhi/host/boot.c
+++ b/drivers/bus/mhi/host/boot.c
@@ -302,8 +302,8 @@ static int mhi_fw_load_bhi(struct mhi_controller *mhi_cntrl,
return -EIO;
}
-static void mhi_free_bhi_buffer(struct mhi_controller *mhi_cntrl,
- struct image_info *image_info)
+void mhi_free_bhi_buffer(struct mhi_controller *mhi_cntrl,
+ struct image_info *image_info)
{
struct mhi_buf *mhi_buf = image_info->mhi_buf;
@@ -455,18 +455,23 @@ static enum mhi_fw_load_type mhi_fw_load_type_get(const struct mhi_controller *m
static int mhi_load_image_bhi(struct mhi_controller *mhi_cntrl, const u8 *fw_data, size_t size)
{
- struct image_info *image;
+ struct image_info **image = &mhi_cntrl->bhi_image;
int ret;
- ret = mhi_alloc_bhi_buffer(mhi_cntrl, &image, size);
- if (ret)
- return ret;
+ if (!(*image)) {
+ ret = mhi_alloc_bhi_buffer(mhi_cntrl, image, size);
+ if (ret)
+ return ret;
- /* Load the firmware into BHI vec table */
- memcpy(image->mhi_buf->buf, fw_data, size);
+ /* Load the firmware into BHI vec table */
+ memcpy((*image)->mhi_buf->buf, fw_data, size);
+ }
- ret = mhi_fw_load_bhi(mhi_cntrl, &image->mhi_buf[image->entries - 1]);
- mhi_free_bhi_buffer(mhi_cntrl, image);
+ ret = mhi_fw_load_bhi(mhi_cntrl, &(*image)->mhi_buf[(*image)->entries - 1]);
+ if (ret) {
+ mhi_free_bhi_buffer(mhi_cntrl, *image);
+ *image = NULL;
+ }
return ret;
}
diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c
index 6e06e4efec765..2e0f18c939e68 100644
--- a/drivers/bus/mhi/host/init.c
+++ b/drivers/bus/mhi/host/init.c
@@ -1228,6 +1228,11 @@ void mhi_unprepare_after_power_down(struct mhi_controller *mhi_cntrl)
mhi_cntrl->rddm_image = NULL;
}
+ if (mhi_cntrl->bhi_image) {
+ mhi_free_bhi_buffer(mhi_cntrl, mhi_cntrl->bhi_image);
+ mhi_cntrl->bhi_image = NULL;
+ }
+
mhi_deinit_dev_ctxt(mhi_cntrl);
}
EXPORT_SYMBOL_GPL(mhi_unprepare_after_power_down);
diff --git a/drivers/bus/mhi/host/internal.h b/drivers/bus/mhi/host/internal.h
index 1054e67bb450d..60b0699323375 100644
--- a/drivers/bus/mhi/host/internal.h
+++ b/drivers/bus/mhi/host/internal.h
@@ -324,6 +324,8 @@ int mhi_alloc_bhie_table(struct mhi_controller *mhi_cntrl,
struct image_info **image_info, size_t alloc_size);
void mhi_free_bhie_table(struct mhi_controller *mhi_cntrl,
struct image_info *image_info);
+void mhi_free_bhi_buffer(struct mhi_controller *mhi_cntrl,
+ struct image_info *image_info);
/* Power management APIs */
enum mhi_pm_state __must_check mhi_tryset_pm_state(
diff --git a/include/linux/mhi.h b/include/linux/mhi.h
index 4c567907933a5..593012f779d97 100644
--- a/include/linux/mhi.h
+++ b/include/linux/mhi.h
@@ -391,6 +391,7 @@ struct mhi_controller {
size_t reg_len;
struct image_info *fbc_image;
struct image_info *rddm_image;
+ struct image_info *bhi_image;
struct mhi_chan *mhi_chan;
struct list_head lpm_chans;
int *irq;
--
2.39.5
Powered by blists - more mailing lists