Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2340263ybz; Thu, 23 Apr 2020 16:20:10 -0700 (PDT) X-Google-Smtp-Source: APiQypIbOwzpHQ3QFdrdz9IK8zV395cRrxmwqITwZzFNkCvCiZRFpIlKaI8PVucCb3SQJN881kBT X-Received: by 2002:a17:907:20a2:: with SMTP id pw2mr4899950ejb.252.1587684010299; Thu, 23 Apr 2020 16:20:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587684010; cv=none; d=google.com; s=arc-20160816; b=LOeopUVYQ6nQs03WkX0kfdoBsphrQLf96D9THZKOXLrjMR/XlBWPrcpHfGUIgtiTeQ KN2VkBplbxTNyxGBPVRH6yYHJ+cKVPFhXIB9+XJfRXuhdkhV9kJ2uJa4U4dFC+A7kwhS eqrSAw2h6tpGu+HiP0Ou9H9IccAoXk08Lxv9fTUlz1iBuq7GtS/IlIyr47YzOEKLxbqr FnMIxkC60ZqvVMYosT15gqM2b3/HSfkZOezmLWjljWdNcBzrEjPkcsnKVq5N4owQAFIX fhEmpkcotR/6gdQAZWSHFV1BugBqmjdsYaWtXJC208CH4FCaU+YiN54J2c0gvgIzm1E+ 7pWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=+bAx8lqYV9JPXbPPicOB0adhxLPGfIOZOzEtU2jNRiQ=; b=uJ1CBuH46HD9kxYQfTGb8M5uBBXo4a48zp5bz8YArUYum9ytpIEIpttDjQRa1YCX8L 3ZMkW5JCqBDudlHyJFpB6cIux3McV8hegPa+DtRPLpcLyBET+CCLZxyFzXsTJDcZeR6a FDXeLXzEqIQcIz/z8fZF4nEw2oUGe9Cgtx5NznpRavs9SfKE406vtXRSf0EmdCTNllfP 1TQMG4lalPf373pCDTPKvLi8mmNaDAP6Z0khw1SyPrxirQb73YgMxJIPQy8C3AWt0muw 3H2p2jOpsa/LRNiECKOZdAXooAs4Ml5y8cVPe2gtCOBFwiLBAzlABxwu3EPl194k4BtB /GPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p7si2086101edx.98.2020.04.23.16.19.46; Thu, 23 Apr 2020 16:20:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728899AbgDWXOu (ORCPT + 99 others); Thu, 23 Apr 2020 19:14:50 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:49782 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728435AbgDWXGs (ORCPT ); Thu, 23 Apr 2020 19:06:48 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1jRkvS-0004hJ-DJ; Fri, 24 Apr 2020 00:06:34 +0100 Received: from ben by deadeye with local (Exim 4.93) (envelope-from ) id 1jRkvP-00E6nm-JO; Fri, 24 Apr 2020 00:06:31 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "Leo Yan" , "Jeffrey Hugo" , "Greg Kroah-Hartman" Date: Fri, 24 Apr 2020 00:05:36 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 109/245] tty: serial: msm_serial: Fix lockup for sysrq and oops In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.83-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Leo Yan commit 0e4f7f920a5c6bfe5e851e989f27b35a0cc7fb7e upstream. As the commit 677fe555cbfb ("serial: imx: Fix recursive locking bug") has mentioned the uart driver might cause recursive locking between normal printing and the kernel debugging facilities (e.g. sysrq and oops). In the commit it gave out suggestion for fixing recursive locking issue: "The solution is to avoid locking in the sysrq case and trylock in the oops_in_progress case." This patch follows the suggestion (also used the exactly same code with other serial drivers, e.g. amba-pl011.c) to fix the recursive locking issue, this can avoid stuck caused by deadlock and print out log for sysrq and oops. Fixes: 04896a77a97b ("msm_serial: serial driver for MSM7K onboard serial peripheral.") Signed-off-by: Leo Yan Reviewed-by: Jeffrey Hugo Link: https://lore.kernel.org/r/20191127141544.4277-2-leo.yan@linaro.org Signed-off-by: Greg Kroah-Hartman Signed-off-by: Ben Hutchings --- drivers/tty/serial/msm_serial.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) --- a/drivers/tty/serial/msm_serial.c +++ b/drivers/tty/serial/msm_serial.c @@ -857,6 +857,7 @@ static void msm_console_write(struct con struct msm_port *msm_port; int num_newlines = 0; bool replaced = false; + int locked = 1; BUG_ON(co->index < 0 || co->index >= UART_NR); @@ -869,7 +870,13 @@ static void msm_console_write(struct con num_newlines++; count += num_newlines; - spin_lock(&port->lock); + if (port->sysrq) + locked = 0; + else if (oops_in_progress) + locked = spin_trylock(&port->lock); + else + spin_lock(&port->lock); + if (msm_port->is_uartdm) reset_dm_count(port, count); @@ -906,7 +913,9 @@ static void msm_console_write(struct con msm_write(port, *bf, msm_port->is_uartdm ? UARTDM_TF : UART_TF); i += num_chars; } - spin_unlock(&port->lock); + + if (locked) + spin_unlock(&port->lock); } static int __init msm_console_setup(struct console *co, char *options)