Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp820356pxb; Tue, 3 Nov 2020 13:28:44 -0800 (PST) X-Google-Smtp-Source: ABdhPJzZgLklf/41q0zfti4ZJ6rnCd5XnFs/uL1JlU5t4xK34dXwKRwtjOpGM1k4vG2WV5RGtz5n X-Received: by 2002:a17:906:c357:: with SMTP id ci23mr3292595ejb.311.1604438924237; Tue, 03 Nov 2020 13:28:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604438924; cv=none; d=google.com; s=arc-20160816; b=n3acs+GUvJZcmp5DpcvnJvTDX3D87OMZrLu09cr50WOpVJVjP13DQzNHkQZlVNt43X 3VR/EOy1fooFKBvaJUw0nDiac1DjdycuQ6sZ3h2lQEcKmFaoG5J0nfM86JBw+vivzDyz ChL2cCreP3f6vlVDLQkUbbwcR1AYPTcGtGcQs3rDdDdq4bui5DeoZ2aVB94cLRH8Yhyt Ovsrx6E7HURuZJozfDfLmLMsL48j7SWxMNd9TPjGC5vyYV374c3vQjgGvlANjPTO8q6C KhMs4g92R0hn3x6vqUUCJgt510UMeaMemHKYVWlRd7WiDpBlV1S27RpdysOVZLRL2p6B 9xjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=I4+6vREL8BlpAGTR4oV8+q0LTGmaYITC+eqi12Hpeq8=; b=LXjyrVcPLC+Y13muPWWSffQyX333M1u03Fn2MxeUxAF+hdSqdczmZgBd4849mVKGrm IHuS0JdSR5Z3MGL63Lo3/wuWJeoBNb4isM/3fVzqRJ57Xt90XkDBNr7IpxzAU8pKp2Kh QV+h2TO+hw/EgWT4tyJscxhCTQVO7Wj86x3IqQSdpn4Y/sNIwK6RL1WvEH5x74EdF4zz 4SK79p9JdDd10N9kgXYJ0DgSfPZ5+RdQK800GZP9Xmtz5YXm64kvmz+auKtjH7lU/tXy bLT6EhEx4KWWwN30MD84g6MrjjDTcus1dJfnzPRDkaUVo24OXw6mxkNJVNCRh07YBfnS fvzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G9jJbSky; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rh9si10379ejb.71.2020.11.03.13.28.21; Tue, 03 Nov 2020 13:28:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G9jJbSky; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387576AbgKCVCI (ORCPT + 99 others); Tue, 3 Nov 2020 16:02:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:38994 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387560AbgKCVCE (ORCPT ); Tue, 3 Nov 2020 16:02:04 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6EABF205ED; Tue, 3 Nov 2020 21:02:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604437323; bh=VaJBdPvv6oADudM62GhWYNgpH+/EyjWa0c704nJQWw0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G9jJbSkyy+XRPCdWqh1EhAQBwv4rMVDxuWXVw1DqybWFjpg0izJpf3CNRBLzAYm1V FSOqaJpH8luqLAlqnh2Cbq/2xjdP9RplLf98dpXIVaRaGwbF4oVCOOZQ9aiv1bFG8K MR9GBgZKwObQ1nrbvoE3+fCSoQQR4rSweesFielw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Russell King , Jiri Slaby , Peter Zijlstra , Will Deacon Subject: [PATCH 4.19 027/191] serial: pl011: Fix lockdep splat when handling magic-sysrq interrupt Date: Tue, 3 Nov 2020 21:35:19 +0100 Message-Id: <20201103203236.236104871@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203232.656475008@linuxfoundation.org> References: <20201103203232.656475008@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peter Zijlstra commit 534cf755d9df99e214ddbe26b91cd4d81d2603e2 upstream. Issuing a magic-sysrq via the PL011 causes the following lockdep splat, which is easily reproducible under QEMU: | sysrq: Changing Loglevel | sysrq: Loglevel set to 9 | | ====================================================== | WARNING: possible circular locking dependency detected | 5.9.0-rc7 #1 Not tainted | ------------------------------------------------------ | systemd-journal/138 is trying to acquire lock: | ffffab133ad950c0 (console_owner){-.-.}-{0:0}, at: console_lock_spinning_enable+0x34/0x70 | | but task is already holding lock: | ffff0001fd47b098 (&port_lock_key){-.-.}-{2:2}, at: pl011_int+0x40/0x488 | | which lock already depends on the new lock. [...] | Possible unsafe locking scenario: | | CPU0 CPU1 | ---- ---- | lock(&port_lock_key); | lock(console_owner); | lock(&port_lock_key); | lock(console_owner); | | *** DEADLOCK *** The issue being that CPU0 takes 'port_lock' on the irq path in pl011_int() before taking 'console_owner' on the printk() path, whereas CPU1 takes the two locks in the opposite order on the printk() path due to setting the "console_owner" prior to calling into into the actual console driver. Fix this in the same way as the msm-serial driver by dropping 'port_lock' before handling the sysrq. Cc: # 4.19+ Cc: Russell King Cc: Greg Kroah-Hartman Cc: Jiri Slaby Link: https://lore.kernel.org/r/20200811101313.GA6970@willie-the-truck Signed-off-by: Peter Zijlstra Tested-by: Will Deacon Signed-off-by: Will Deacon Link: https://lore.kernel.org/r/20200930120432.16551-1-will@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/tty/serial/amba-pl011.c | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) --- a/drivers/tty/serial/amba-pl011.c +++ b/drivers/tty/serial/amba-pl011.c @@ -313,8 +313,9 @@ static void pl011_write(unsigned int val */ static int pl011_fifo_to_tty(struct uart_amba_port *uap) { - u16 status; unsigned int ch, flag, fifotaken; + int sysrq; + u16 status; for (fifotaken = 0; fifotaken != 256; fifotaken++) { status = pl011_read(uap, REG_FR); @@ -349,10 +350,12 @@ static int pl011_fifo_to_tty(struct uart flag = TTY_FRAME; } - if (uart_handle_sysrq_char(&uap->port, ch & 255)) - continue; + spin_unlock(&uap->port.lock); + sysrq = uart_handle_sysrq_char(&uap->port, ch & 255); + spin_lock(&uap->port.lock); - uart_insert_char(&uap->port, ch, UART011_DR_OE, ch, flag); + if (!sysrq) + uart_insert_char(&uap->port, ch, UART011_DR_OE, ch, flag); } return fifotaken;