From patchwork Wed Nov 27 14:15:44 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Leo Yan X-Patchwork-Id: 180308 Delivered-To: patch@linaro.org Received: by 2002:a92:38d5:0:0:0:0:0 with SMTP id g82csp6179777ilf; Wed, 27 Nov 2019 06:16:49 -0800 (PST) X-Google-Smtp-Source: APXvYqzEP6RHtKIvBY6JirDk9BdwMHsRKuCH+rICXHbCQT9QX8nWFb8I379zyh9b3VwghvbQOBNT X-Received: by 2002:a17:906:1fcf:: with SMTP id e15mr47625097ejt.317.1574864209638; Wed, 27 Nov 2019 06:16:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574864209; cv=none; d=google.com; s=arc-20160816; b=S6kxtN2xggp3xDuJdMyDzUyezW87M7pB03TTQbE4C5GWa5GjegYc7u9fQYKX74986K ZbPz0Iuv1niobMZBg3lZ8jn5l11qICoooFWmyB3J62BflZECu72oCwvYGoP7jmAwf0J1 uErHJqstK4J6A8t1Nd6LhJaxAHr6IaToHMkbaGR2kuf2KojXwgBaUV0WJJT5FHQN0IrP cJy7AIs5qIW8hr/dsXyJOunGUSHT3p9uZHxVeOfpwgujvsb64GvXLDKpZm22WUm327Tz 8PbLCoxFIujExDxrRXUGtWQJCcjKTzVw8WAfSt9OQiKP5r+aNEWFkNK9Gt0kg4lPnfGv oBsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=Q7g3g9npAzkK8xZ5a4hvEUAgGO4Fs0nsH32bKzdrbRA=; b=VNDlzZINzuwgJ7NXY/11djckpujJrnTG8k4NXDlXFaJavfWs+GE1ANhEkVUNPBcxqM ZxtIWDC8Pl5u7BwuMS7DTtAt+ANFUspaGoJi+dyRNIR+EVrFTpPvjjhOUXYkkPetF7L+ 9cMWEQzTMZxeA+pjEFluaGHdRsoWUY/S9MUI6d4mwgr/rmOpPEJyNuK7w4DAp+n01wKp Kr4tHDmEZixylv47vAgn2OZNTTVjOV68YADWrEEwO1VaYsmFOPaOa6TlPmQVgd6g5Q2/ L4zfxhTtG3u5EQWKwyMaGfXW+SYHJIGIzfOioI/2oUdNkvgauKeQYZq3BfD1rHYRoS7X r/Lg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=KCxbHt3E; spf=pass (google.com: best guess record for domain of linux-arm-msm-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-arm-msm-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id op11si9163036ejb.107.2019.11.27.06.16.49; Wed, 27 Nov 2019 06:16:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-arm-msm-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=KCxbHt3E; spf=pass (google.com: best guess record for domain of linux-arm-msm-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-arm-msm-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727010AbfK0OQq (ORCPT + 15 others); Wed, 27 Nov 2019 09:16:46 -0500 Received: from mail-yb1-f193.google.com ([209.85.219.193]:41651 "EHLO mail-yb1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727120AbfK0OQq (ORCPT ); Wed, 27 Nov 2019 09:16:46 -0500 Received: by mail-yb1-f193.google.com with SMTP id d95so9013033ybi.8 for ; Wed, 27 Nov 2019 06:16:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=Q7g3g9npAzkK8xZ5a4hvEUAgGO4Fs0nsH32bKzdrbRA=; b=KCxbHt3EBBOVhGaQx6fFPLHK6Biu+/hbggYWU0ZelReZ4qFl2zY+9n1pry0+68I4H6 n3IwhRL0QgpF+HAaM+l+ucUa8Al8amR9u2kThc/MNsVDkI+nlrrvEL9kFS4403k4JZ23 ko5vh+cBkxhe3KsZi/8kPK9lNXHBwH/0ln7iuScWn5s5PcoIErYtk6xhDNlbsp4Hln23 x4zJ+0Kgc1YMuaeZNWXk1MITps1xs2DAg/CRdNzpWGxGhe2TiDeJs68hMCAnR6golVCo gaEi9C5qRKkf4V5s9fA7itbYyLrZEn+R2pAQcSJRWKcsWj4XaADUNaDly+IPhPOK7yqm NofQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=Q7g3g9npAzkK8xZ5a4hvEUAgGO4Fs0nsH32bKzdrbRA=; b=PUbyT7qVwlTW+147yB8gMdlpMfLlLoHGYZ66CGQjjLY8UoOl/t0RgBe+ODFs0/T7M8 mie/LyBqNske9xXnHUn4Sz3z2XDrkLq3OhC4ihePwMhEKAnIy1bhHqGCfB2NGxT/qQ9O grN6aPkiiZMBt5PDGhc0Mm5pZzSHQO8cxY570jY+PjNOUxVVcZ8Ggfvoh1AU/kiKBWkZ AYDis0dTod4wUvbOfdRBAC7QykwHKc0+GOFptDnRNQ+1pqlB4UTn54JiQVGs9s0YOpbO yLwgIVkZAZTK2GfcGUimDSt7xf4BSdn/xAJs+PmuillDeJs2KxC4kQy3Le1S6uQ+qb2y FyZg== X-Gm-Message-State: APjAAAW/B6VeZc3wRVL6ENngB64B3bMG9P5HiYBvLQn3vilP7+k5Wd/n NnvD9VdO5ui7U3PxG+nAYiZBfw== X-Received: by 2002:a25:3848:: with SMTP id f69mr32588371yba.498.1574864205023; Wed, 27 Nov 2019 06:16:45 -0800 (PST) Received: from localhost.localdomain (li2093-158.members.linode.com. [172.105.159.158]) by smtp.gmail.com with ESMTPSA id u123sm6911115ywd.105.2019.11.27.06.16.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Nov 2019 06:16:44 -0800 (PST) From: Leo Yan To: Andy Gross , Greg Kroah-Hartman , Jiri Slaby , Bjorn Andersson , Stephen Boyd , Nicolas Dechesne , Jeffrey Hugo , linux-arm-msm@vger.kernel.org, linux-serial@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Leo Yan Subject: [PATCH v2 2/2] tty: serial: msm_serial: Fix deadlock caused by recursive output Date: Wed, 27 Nov 2019 22:15:44 +0800 Message-Id: <20191127141544.4277-3-leo.yan@linaro.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20191127141544.4277-1-leo.yan@linaro.org> References: <20191127141544.4277-1-leo.yan@linaro.org> Sender: linux-arm-msm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-arm-msm@vger.kernel.org The uart driver might run into deadlock caused by recursive output; the basic flow is after uart driver has acquired the port spinlock, then it invokes some functions, e.g. dma engine operations and allocate dma descriptor with kzalloc(), if the system has very less free memory, the kernel will give out warning by printing logs, thus recursive output will happen and at the second time the attempting to acquire lock will cause deadlock. The detailed flow is shown as below: msm_uart_irq() spin_lock_irqsave(&port->lock, flags) => First time to acquire lock msm_handle_tx(port) msm_handle_tx_dma() dmaengine_prep_slave_single() bam_prep_slave_sg() kzalloc() __kmalloc() ___slab_alloc() alloc_pages_current() __alloc_pages_nodemask() warn_alloc() printk() msm_console_write() __msm_console_write() spin_lock(&port->lock) => Cause deadlock This patch fixes the deadlock issue for recursive output; it adds a variable 'curr_user' to indicate the uart port is used by which CPU, if the CPU has acquired spinlock and wants to execute recursive output, it will directly bail out. Here we don't choose to avoid locking and print out log, the reason is in this case we don't want to reset the uart port with function msm_reset_dm_count(); otherwise it can introduce confliction with other flows and results in uart port malfunction and later cannot output anymore. Fixes: 99693945013a ("tty: serial: msm: Add RX DMA support") Fixes: 3a878c430fd6 ("tty: serial: msm: Add TX DMA support") Signed-off-by: Leo Yan --- drivers/tty/serial/msm_serial.c | 10 ++++++++++ 1 file changed, 10 insertions(+) -- 2.17.1 diff --git a/drivers/tty/serial/msm_serial.c b/drivers/tty/serial/msm_serial.c index 889538182e83..06076cd2948f 100644 --- a/drivers/tty/serial/msm_serial.c +++ b/drivers/tty/serial/msm_serial.c @@ -182,6 +182,7 @@ struct msm_port { bool break_detected; struct msm_dma tx_dma; struct msm_dma rx_dma; + struct cpumask curr_user; }; #define UART_TO_MSM(uart_port) container_of(uart_port, struct msm_port, uart) @@ -436,6 +437,7 @@ static void msm_complete_tx_dma(void *args) u32 val; spin_lock_irqsave(&port->lock, flags); + cpumask_set_cpu(smp_processor_id(), &msm_port->curr_user); /* Already stopped */ if (!dma->count) @@ -470,6 +472,7 @@ static void msm_complete_tx_dma(void *args) msm_handle_tx(port); done: + cpumask_clear_cpu(smp_processor_id(), &msm_port->curr_user); spin_unlock_irqrestore(&port->lock, flags); } @@ -544,6 +547,7 @@ static void msm_complete_rx_dma(void *args) u32 val; spin_lock_irqsave(&port->lock, flags); + cpumask_set_cpu(smp_processor_id(), &msm_port->curr_user); /* Already stopped */ if (!dma->count) @@ -590,6 +594,7 @@ static void msm_complete_rx_dma(void *args) msm_start_rx_dma(msm_port); done: + cpumask_clear_cpu(smp_processor_id(), &msm_port->curr_user); spin_unlock_irqrestore(&port->lock, flags); if (count) @@ -931,6 +936,7 @@ static irqreturn_t msm_uart_irq(int irq, void *dev_id) u32 val; spin_lock_irqsave(&port->lock, flags); + cpumask_set_cpu(smp_processor_id(), &msm_port->curr_user); misr = msm_read(port, UART_MISR); msm_write(port, 0, UART_IMR); /* disable interrupt */ @@ -962,6 +968,7 @@ static irqreturn_t msm_uart_irq(int irq, void *dev_id) msm_handle_delta_cts(port); msm_write(port, msm_port->imr, UART_IMR); /* restore interrupt */ + cpumask_clear_cpu(smp_processor_id(), &msm_port->curr_user); spin_unlock_irqrestore(&port->lock, flags); return IRQ_HANDLED; @@ -1572,6 +1579,7 @@ static inline struct uart_port *msm_get_port_from_line(unsigned int line) static void __msm_console_write(struct uart_port *port, const char *s, unsigned int count, bool is_uartdm) { + struct msm_port *msm_port = UART_TO_MSM(port); int i; int num_newlines = 0; bool replaced = false; @@ -1593,6 +1601,8 @@ static void __msm_console_write(struct uart_port *port, const char *s, locked = 0; else if (oops_in_progress) locked = spin_trylock(&port->lock); + else if (cpumask_test_cpu(smp_processor_id(), &msm_port->curr_user)) + return; else spin_lock(&port->lock);