Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1749509ybl; Sat, 11 Jan 2020 02:03:32 -0800 (PST) X-Google-Smtp-Source: APXvYqwMP5lUB+eOrqaZGupBxF+huENwgLSjIcVIeYClU3tUmz093olRcE5ZoKf6Jh5WNbXMxxfM X-Received: by 2002:aca:2407:: with SMTP id n7mr5950274oic.14.1578737012641; Sat, 11 Jan 2020 02:03:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578737012; cv=none; d=google.com; s=arc-20160816; b=Dh0k353CUzNgjZgWotKYpmezqqKit/XxxiavdK26GDJ+RmZEoI+TLpuIT34tWByyqR NzOw0S84MieXxed0TcoHdeRC8MV9BRrUnUHcVCOMVHWgwzf8ftoE3RgUceFl1sGPxXaG LK0ZDSEODOUYp/VM7b/Ee98sZNOOaicEDBOTaxpCSxTjEhCyLZUy4N/wWYw2Kh08URMl P40NLcPu3OMxdxED5soWFb4MA/MDskKee1LvJdBiFhgiPQxngUr3N1vAYSBMbb2vpGUK MFpyuuPYUGE2zaiVRjWTtD6azoq/A7TRIcu61xDFQpaZDdJ3SYT7/9ytfSzlJZPAV95K xAng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bIjvZVJV1ksiiIdbeuiDW2pxEvybKP5KAKcA0r1xr0s=; b=K38GejUhI/aDMh3cbj6vNFtOYP35cdIACePB+Su64OLYkaZGFsndVvkwWEbs8RzYul sBlEKtClpiOcYeGlQdtU89gIOyMSvkte+JZg1hcuewWYutStVR45pFnxSjervCKTIuPp MB1ypeydu3w4U+LYp1tz8baVTTeKulnsD1OkEaMkJc5PrKx7GF3Tsm1/FGegmSDrbPhy JiaFiP9qXL8rvtff6ZEnNMhB6a5db17u7X86vGbD8bkik45yKcILT5YYD1WMQck9U8sZ ABm4PF8/6HA362C1tifZUrIG5PZpfTCyj7G8xQ7H5coEotiT1uKsu1mmCo1OlrZJRm4B gqiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zxzkfUWz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 46si3560799otu.45.2020.01.11.02.03.21; Sat, 11 Jan 2020 02:03:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zxzkfUWz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729409AbgAKKBf (ORCPT + 99 others); Sat, 11 Jan 2020 05:01:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:59000 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729143AbgAKKBd (ORCPT ); Sat, 11 Jan 2020 05:01:33 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0293820842; Sat, 11 Jan 2020 10:01:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578736893; bh=+eCP+1RMX52ZH6Ze/sdrtcDWgKk8QJnkn9Btzvb6h10=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zxzkfUWz+b+2Byi08AVIXreVsHgdVp8ZoL6gsfH0jMrNuo8scbfk61UtC2vmZjJ/A aWA/Rmd0FsrQCI6mQ8Kv4VqfSe3ao7RjmgYLpgL3UEZz+tGOqQgcfo48hxDQ31dslQ zoEcUIRtNGfw5huqASd3KCJCQvcF31EDhNEFEkw0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leo Yan , Jeffrey Hugo Subject: [PATCH 4.9 43/91] tty: serial: msm_serial: Fix lockup for sysrq and oops Date: Sat, 11 Jan 2020 10:49:36 +0100 Message-Id: <20200111094901.413283246@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094844.748507863@linuxfoundation.org> References: <20200111094844.748507863@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Leo Yan commit 0e4f7f920a5c6bfe5e851e989f27b35a0cc7fb7e upstream. As the commit 677fe555cbfb ("serial: imx: Fix recursive locking bug") has mentioned the uart driver might cause recursive locking between normal printing and the kernel debugging facilities (e.g. sysrq and oops). In the commit it gave out suggestion for fixing recursive locking issue: "The solution is to avoid locking in the sysrq case and trylock in the oops_in_progress case." This patch follows the suggestion (also used the exactly same code with other serial drivers, e.g. amba-pl011.c) to fix the recursive locking issue, this can avoid stuck caused by deadlock and print out log for sysrq and oops. Fixes: 04896a77a97b ("msm_serial: serial driver for MSM7K onboard serial peripheral.") Signed-off-by: Leo Yan Reviewed-by: Jeffrey Hugo Link: https://lore.kernel.org/r/20191127141544.4277-2-leo.yan@linaro.org Signed-off-by: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- drivers/tty/serial/msm_serial.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) --- a/drivers/tty/serial/msm_serial.c +++ b/drivers/tty/serial/msm_serial.c @@ -1579,6 +1579,7 @@ static void __msm_console_write(struct u int num_newlines = 0; bool replaced = false; void __iomem *tf; + int locked = 1; if (is_uartdm) tf = port->membase + UARTDM_TF; @@ -1591,7 +1592,13 @@ static void __msm_console_write(struct u num_newlines++; count += num_newlines; - spin_lock(&port->lock); + if (port->sysrq) + locked = 0; + else if (oops_in_progress) + locked = spin_trylock(&port->lock); + else + spin_lock(&port->lock); + if (is_uartdm) msm_reset_dm_count(port, count); @@ -1627,7 +1634,9 @@ static void __msm_console_write(struct u iowrite32_rep(tf, buf, 1); i += num_chars; } - spin_unlock(&port->lock); + + if (locked) + spin_unlock(&port->lock); } static void msm_console_write(struct console *co, const char *s,