Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3327795pxv; Sun, 18 Jul 2021 19:10:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyKFlMHAl1R+RlxL8IsWIeOnRIEiOaTHO2UQeocemuZX7VkgD4wappuesSKIA35uunBtDee X-Received: by 2002:a05:6602:2595:: with SMTP id p21mr17083673ioo.51.1626660611079; Sun, 18 Jul 2021 19:10:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626660611; cv=none; d=google.com; s=arc-20160816; b=sEay0vU5RtYeu6/mrGyBGHuVbk/klZe8GKdVSXmCrjq+u7lV2sqjjInVxCrAKcisaa dMz9Ex466p0yYXO10sLSO2Q2SP8NbdU2VgpqW9VxkTEnGChmtqF21F8Cz18XZ10eksXu /ZeB7BJwS52PUpdwknHoMhuN0cCPqtn+FA8duMGTVqTZZSj/jfxy1T2y6tXN3ULNGjkn iA0Z649Fv7iRKrSGqb2yoY5ccgJMuZ2/qGc+H+vBCsbr8tX5UNQKuO3OPEs1M14AE5fH g+4qqz6VtNn9KenqIN7UHE7CEDLrKRDR45IgkGfO4VSGl8QTka+t8oqFmZ8NTzp7zLA5 r0OA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=9lv01krC1Ir3cayjbUkot1Snxc1f9rBCVOiKjknUIP0=; b=BfTg7uJu2WC0CjxQYhToPLmNY6cNafukofn6Vt96pt5i6oFpOZbK4KHMUMa4H0c2V4 DARjh13aoH6/C4qseGfox8uetlHLTIrNMKBeF2NK5+HMjiY7cWbVqCUxKRM/LXbAg+zB kxVBBVMZ0xJJeRAXK58FTHsOGGQEhN5yfENjHAVuRYDFK3lIE5M8YPEeAD0x7zssGp1i txaFTVzbMuCJlRnEGAVleLPXzetDSq4np0w2l30SeGSKbZk5+HoYkki5v8xa6d8TlFQF 9/oDhBOtgsyq2YL75y8n91uSuNRnbux/oQi3K8sXlOuWOj6zie4o5NSUKfPqWrYLlAxB 0DBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ftGSn3Te; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y22si8216882iol.65.2021.07.18.19.09.59; Sun, 18 Jul 2021 19:10:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ftGSn3Te; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233894AbhGSCL7 (ORCPT + 99 others); Sun, 18 Jul 2021 22:11:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34120 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233713AbhGSCL7 (ORCPT ); Sun, 18 Jul 2021 22:11:59 -0400 Received: from mail-pl1-x62d.google.com (mail-pl1-x62d.google.com [IPv6:2607:f8b0:4864:20::62d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65AC8C061762; Sun, 18 Jul 2021 19:08:59 -0700 (PDT) Received: by mail-pl1-x62d.google.com with SMTP id e14so6035411plh.8; Sun, 18 Jul 2021 19:08:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=9lv01krC1Ir3cayjbUkot1Snxc1f9rBCVOiKjknUIP0=; b=ftGSn3Te9lfAd2fA/jvbEyqJ39OHlaJi5nieMP/BpV0GGNYRxIpA6JICntdXkwmJWo 7OUYi1HCrXBChZPh3iVZ/ys1rk95lPHFimvNhR/Vej7V94HrbK5yVOii03TUjX8p7yQ2 LL8eKCUjqdA/IRSPApzDOFSEDwvCgeF3HCvk06thDk9BL9k1wei9CRzBh/hfBW+GnWWu LTcSpPhi+SV0zjc9nbs6Qm81V0b9F1JQSyTc+5xUkiaU1fIzfgol4s/HZEm9I2Q9ojEb 5XVJRO8y5gkvn61RiwKTMOlJF3hfQlYkGP6aP1mzhvA+OznqJO4DHkfXp71z8SBtWIK2 HcMw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=9lv01krC1Ir3cayjbUkot1Snxc1f9rBCVOiKjknUIP0=; b=cntNGiWYahu/GtiiCzK9DXGvQORsczJ42hmUTAYGmtqlgKHMTUI1J+URGYjPA9xMv+ yC9eQ0iV7at1lFZArwIQ933O2nJ4V95QNp6750YNVWuLDYMmnJuTz+//StWJjvUJqrKh EjEl5T6U/+aBSDhAuPbPw2cHTDPltpyVY5tAGVpiglEd4zUujOEmBqLZrnRO2sWSfe6f HPf9tBqpg/va4KWPKwc0jOoG+HnK0fkbC86lqbp5kmg4TLpAMHDeOVna+oyXMZVxN0GW y374wJBjqIxs3fgjqYMzTXg/pz30eqBBOz6j3bCqBzkhIMu2NiNmoxYq9LYUDmssKdD/ fHIQ== X-Gm-Message-State: AOAM531oYA05S6E8m/IhSynpPwbp7SRXSxJZByhDGhf4vut7UuQYVCxQ IPsvzsQnzyNY15jsOqOo5rzsqKzRV14= X-Received: by 2002:a17:90a:bd04:: with SMTP id y4mr28337661pjr.127.1626660538648; Sun, 18 Jul 2021 19:08:58 -0700 (PDT) Received: from [10.144.0.86] ([45.135.186.26]) by smtp.gmail.com with ESMTPSA id v10sm18084837pjd.29.2021.07.18.19.08.56 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 18 Jul 2021 19:08:58 -0700 (PDT) Subject: Re: [BUG] bus: mhi: possible ABBA deadlock in mhi_pm_m0_transition() and mhi_send_cmd() To: Manivannan Sadhasivam , Bhaumik Bhatt Cc: hemantk@codeaurora.org, linux-arm-msm@vger.kernel.org, linux-kernel References: <0a213c92-32d5-efc8-079b-dd20d5ecfe20@gmail.com> <2fbeeb8dc647dc88e69ec6624c2078d1@codeaurora.org> <20210716064512.GE3323@workstation> From: Jia-Ju Bai Message-ID: <34ea09b0-8622-90f5-ee70-68c27081de39@gmail.com> Date: Mon, 19 Jul 2021 10:08:55 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <20210716064512.GE3323@workstation> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/7/16 14:45, Manivannan Sadhasivam wrote: > On Thu, Jul 15, 2021 at 09:57:22AM -0700, Bhaumik Bhatt wrote: >> On 2021-07-15 02:45 AM, Jia-Ju Bai wrote: >>> Hello, >>> >>> I find there is a possible ABBA deadlock in the MHI driver in Linux >>> 5.10: >>> >>> In mhi_pm_m0_transition(): >>> 262:     read_lock_bh(&mhi_cntrl->pm_lock); >>> 281:     spin_lock_irq(&mhi_cmd->lock); >>> >>> In mhi_send_cmd(): >>> 1181:   spin_lock_bh(&mhi_cmd->lock); >>> 1207:   read_lock_bh(&mhi_cntrl->pm_lock); >>> >>> When mhi_pm_m0_transition() and mhi_send_cmd() are concurrently >>> executed, the deadlock can occur. >>> >>> I check the code and find a possible case of such concurrent execution: >>> >>> #CPU1: >>> mhi_poll (mhi_event->process_event(...)) >>>   mhi_process_ctrl_ev_ring >>>     mhi_pm_m0_transition >>> >>> #CPU2: >>> mhi_prepare_for_transfer >>>   mhi_prepare_channel >>>     mhi_send_cmd >>> >>> Note that mhi_poll() and mhi_prepare_for_transfer() are both exported >>> by EXPORT_SYMBOL. >>> Thus, I guess these two functions could be concurrently called by a MHI >>> driver. >>> >>> I am not quite sure whether this possible deadlock is real and how to >>> fix it if it is real. >>> Any feedback would be appreciated, thanks :) >>> >>> >>> Best wishes, >>> Jia-Ju Bai >> Few pointers from your example: >> >> 1. mhi_poll() is currently not used by any client upstream yet. > Then this shouldn't be added in first place... :/ > >> 2. Polling is not to be used for single event ring (shared control + data) >> cases >> since it is meant to be for client drivers with dedicated data packets only. >> 3. mhi_send_cmd() will always be called after an mhi_pm_m0_transition() has >> completed by design since we wait for the device to be held in M0 prior to >> it. >> > But client can be unloaded during M0 event! > > Anyway, I don't think the deadlock scenario is valid because of the usage > of "read_lock_bh()". So if "mhi_send_cmd()" has acquired > "spin_lock_bh(&mhi_cmd->lock)", it can always acquire > "read_lock_bh(&mhi_cntrl->pm_lock)" as multiple readers can acquire the > read lock. > > Deadlock would only occur if one of the functions take write lock. > > Thanks for auditing. Thanks for the feedback and explanation :) Best wishes, Jia-Ju Bai