Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2399949pxb; Tue, 13 Apr 2021 00:32:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzHx/uwguyZXZxYLG6ZY/cHfWwVDbhMNcyw06LOITiHy8h85iqAecgTjafOVpo8PgB5W0nf X-Received: by 2002:a50:9b18:: with SMTP id o24mr33316787edi.227.1618299142185; Tue, 13 Apr 2021 00:32:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618299142; cv=none; d=google.com; s=arc-20160816; b=o1TKC7wM1D6r6eOTH7+6f+t/YNe96KZr2hKQqUqQJKXQz3jwWkl+yiplN4qug5g2po u/A5VFwslMAVTRe2k8cO9u+Qqdmfa4XgInH1JJ+g/8jLGpQ4f3LTsU+TEsm4Uq8CCyKb 7+YzUmkiXBQfCgS4wkjv/LrQBWJvIVkG6gVzEbd4FQCl0cgFYcYKGmhq/OpleWk4r9xw ti2papKt8rJdTJ/IxwDvZcBOh6rR2N/bl5NMIMbz9fmBp6o16kMhn97vAnh6RA8Zogl+ HEyRgUzvZxjlT3GI0VUnDz9VQaEGj21G0jVD5rOw9BosZ2pX3am34t0QNUiuVCcer6Qc Zj9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=C9NHfRlVevF4M8K/rHQEyVi0J60392z2vn7IG56hY1E=; b=Sfpo9XUuyz+NsloEtTtcryJaErIYoKCpdQJn1T5R8dy4N8sGLR50CmBhVRoqte7e0O rqYbML8CWSKbJ+y7aiJqYTUSMY7GCkuB9kC/XpOIHnvNe2abXkwXp0fe22vw/wnQeGDK fG/6JOgCwKu1xZVADXrmYOFY9RWIV17E5+JzznDSYu9diaLfr0Hc2j48rL0LQphMfmOO QExAxm1ixIcId11aFJM2GbE3sQahQN0s1BC6+T8Air/LO+8JhfkfqeTQVtxnmP/BuToD J/wpM9+JLtbhodFs3BH5DHpbot0TRFTrqcoUpTE2I8rntUb35rzMiq8O+aShof0vsUce tgJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HR2eqOSk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x18si9295914ejd.75.2021.04.13.00.31.58; Tue, 13 Apr 2021 00:32:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HR2eqOSk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243972AbhDLXpg (ORCPT + 99 others); Mon, 12 Apr 2021 19:45:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35830 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238646AbhDLXpf (ORCPT ); Mon, 12 Apr 2021 19:45:35 -0400 Received: from mail-il1-x12b.google.com (mail-il1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE1D3C061574; Mon, 12 Apr 2021 16:45:15 -0700 (PDT) Received: by mail-il1-x12b.google.com with SMTP id c18so12561040iln.7; Mon, 12 Apr 2021 16:45:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=C9NHfRlVevF4M8K/rHQEyVi0J60392z2vn7IG56hY1E=; b=HR2eqOSk+FnonmNwmQAIfbMDUnYeOBV3DWZdEKQZu/yWDhDOV4buDmV+PGPI9J1iJU Ls5quVrlRHuwlGZxfubXLN1MvZ1P9NTnNdZIPSI5Q1+jrcTNpvxPT0QV2FKuWZBvhmVK jA7//CSgMPE2dPpn+aY7EpIHHvUAXr1Z1SUWtzizy9KtD4qxQWePwaBC7wzhlIHAv69t jT3n6MwDEjIykpSGG6HQWg3rDPj8bcfGOGMveb/L0/tVWTTwG055rpcCEhRcKIFayf0J bZQjRV8iZiWKTdVpHnYzImsZwJT2SA5SRXbjyRt0R835c8x5XHS/NYxeODv4lg7LWINM 9tLg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=C9NHfRlVevF4M8K/rHQEyVi0J60392z2vn7IG56hY1E=; b=jHpjGb4+5REORs7kR2ng2xHzKGj+5Da2hwoDwLhmzebPa5QsJTVSvrjbu98ekI9Rnj 064iPuHO7CVu1f7m9z0P/RRz8RiyAq04EfsnjriuI0zuDlAq2y8UNFJx/5I0kBVx1oUC 2/L0xLekQUsweg00YVxPBoWpNHsbNsAECnQrL8RbZex8TaT4vAHCiflq+w4ElKaVUfMT piwaqGFQw6Pnmk7Mj3MC0mlk9HUgQO+oMWaYPxdtkLH7qTZmsreOid7/Q0asn0mVIdvY 0G3Eplis73jUQ32ZvecFdn8UF2QT77AxBaHnSRZfkQA2jxgWG7lj1ZG8EOep45DcGYfx j2Pw== X-Gm-Message-State: AOAM531om4VE4OXMRbyWIKwUMFB/bmlS8qQe/tY6udPTaw1UWDhSVR9a vp9mz0/SCWGrk6Ql396/QsCGxCw8YguySawAhYQ= X-Received: by 2002:a05:6e02:672:: with SMTP id l18mr24345668ilt.271.1618271115374; Mon, 12 Apr 2021 16:45:15 -0700 (PDT) MIME-Version: 1.0 References: <1618219898-4600-1-git-send-email-dillon.minfei@gmail.com> In-Reply-To: From: dillon min Date: Tue, 13 Apr 2021 07:44:39 +0800 Message-ID: Subject: Re: [PATCH v2] serial: stm32: optimize spin lock usage To: Johan Hovold Cc: Greg KH , jirislaby@kernel.org, Maxime Coquelin , Alexandre TORGUE , kernel test robot , linux-serial@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, Linux ARM , Linux Kernel Mailing List , kbuild-all@lists.01.org, clang-built-linux@googlegroups.com, Gerald Baeza , Erwan Le Ray Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Johan, Erwan It seems still a bit of a problem in the current version, not deadlock but access register at the same time. For driver , we should consider it running under smp, let's think about it for this case: static void stm32_usart_console_write(struct console *co, const char *s, unsigned int cnt) { ..... local_irq_save(flags); if (port->sysrq) locked = 0; ..... access register cr1, tdr, isr ..... local_irq_restore(flags); } if port->sysrq is 1, stm32_usart_console_write() just disable local irq response by local_irq_save(), at the time of access register cr1, tdr, isr. an TXE interrupt raised, for other cores(I know stm32 mpu/mcu do not have multi cores, just assume it has), it still has a chance to handle interrupt. Then there is no lock to protect the uart register. changes to below, should be more safe: ..... if (port->sysrq || oops_in_progress) locked = spin_trylock_irqsave(&port->lock, flags); else spin_lock_irqsave(&port->lock, flags); .... if (locked) spin_unlock_irqrestore(&port->lock, flags); For current stm32 soc, it shouldn't happen. just a reminder for future. Thanks. Dillon On Mon, Apr 12, 2021 at 10:04 PM dillon min wrote: > > Hi Johan, > > Yes, there is no deadlock. my fault. > I forget the local_irq_save() plus spin_lock() is spin_lock_irqsave(). > > Thanks for your review. please ignore this patch. > > Best regards > > Dillon > > On Mon, Apr 12, 2021 at 9:08 PM Johan Hovold wrote: > > > > On Mon, Apr 12, 2021 at 05:31:38PM +0800, dillon.minfei@gmail.com wrote: > > > From: dillon min > > > > > > To avoid potential deadlock in spin_lock usage, use spin_lock_irqsave, > > > spin_trylock_irqsave(), spin_unlock_irqrestore() in process context. > > > > This doesn't make much sense as console_write can be called in any > > context. And where's the deadlock you claim to be fixing here? > > > > > remove unused local_irq_save/restore call. > > > > > > Cc: Alexandre Torgue > > > Cc: Maxime Coquelin > > > Cc: Gerald Baeza > > > Cc: Erwan Le Ray > > > Reported-by: kernel test robot > > > Signed-off-by: dillon min > > > --- > > > v2: remove unused code from stm32_usart_threaded_interrupt() according from > > > Greg's review. > > > > > > drivers/tty/serial/stm32-usart.c | 8 +++----- > > > 1 file changed, 3 insertions(+), 5 deletions(-) > > > > > > diff --git a/drivers/tty/serial/stm32-usart.c b/drivers/tty/serial/stm32-usart.c > > > index b3675cf25a69..b1ba5e36e36e 100644 > > > --- a/drivers/tty/serial/stm32-usart.c > > > +++ b/drivers/tty/serial/stm32-usart.c > > > @@ -1354,13 +1354,12 @@ static void stm32_usart_console_write(struct console *co, const char *s, > > > u32 old_cr1, new_cr1; > > > int locked = 1; > > > > > > - local_irq_save(flags); > > > if (port->sysrq) > > > locked = 0; > > > else if (oops_in_progress) > > > - locked = spin_trylock(&port->lock); > > > + locked = spin_trylock_irqsave(&port->lock, flags); > > > else > > > - spin_lock(&port->lock); > > > + spin_lock_irqsave(&port->lock, flags); > > > > > > /* Save and disable interrupts, enable the transmitter */ > > > old_cr1 = readl_relaxed(port->membase + ofs->cr1); > > > @@ -1374,8 +1373,7 @@ static void stm32_usart_console_write(struct console *co, const char *s, > > > writel_relaxed(old_cr1, port->membase + ofs->cr1); > > > > > > if (locked) > > > - spin_unlock(&port->lock); > > > - local_irq_restore(flags); > > > + spin_unlock_irqrestore(&port->lock, flags); > > > } > > > > > > static int stm32_usart_console_setup(struct console *co, char *options) > > > > Johan