Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp4121334pxb; Tue, 19 Apr 2022 17:44:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJylN3EcnL8N+6nWD1VYt2xnRbhWwwxF6vrJxoMGVGIRebOe1wIwaVatmJcZsAlMr/gTXjHW X-Received: by 2002:a17:906:c151:b0:6e8:9cbc:ac04 with SMTP id dp17-20020a170906c15100b006e89cbcac04mr15751589ejc.423.1650415459148; Tue, 19 Apr 2022 17:44:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650415459; cv=none; d=google.com; s=arc-20160816; b=rDkdiMPes4A/DnF6+yTFWgtdmWEDJEHJ+5e8zS3Rck0LpI0jSeS9ZlgxfREek18laM w076pDehRk/oJ8ALYKcZoq34KUhkt7PpTWCFsRHS4v4WIdkTpeD4qVj3/r2YG42Y58tl VyNbjZ16EDLxZybjV9aXmKsGMMQnACY4fKH5JXmTRrGcSVx+W6xJhHDbuMF8J6v48aeA DT6OgoUgruJRRKYKgMxKE9PCYEynBnroso12O+ExViSLZVF40rg4vY3QpKihxAVolJcz fsZM+k+EL6D/i8QAeJtjLS0Bp37RH0Qhln8j7im1jf5LatRfFxXugT4WchUJqZrAR52Y te2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=oZHnRkPCm8T5oXIKxLsR0BkDUMS+EsF7CIAupgKOdV0=; b=aC7DrbB8/XCgh2+2rNUQIPHgQc9CThaKSpgBaYrZZCuTMycA2hyb1bGRbjVJbYBH7U YRIwBVrX0sGReML8cdCI5YH3+2n0seuVFQDOpAIVQ4t58Q0NMvTZJGAjSLoePOAjiDPm A2nfitAOnPhEUvmfa9s/su/F992MPdtBLfTn8S7OgX6O8qGsWwanSs2/HlOZSlwp/nxa DjrDuJdZI7KuUjq1pFZR8E3+4f8cJBLxfnO8Wl9z9Ld1DFENSPjqAGtaE50bld6ukwz8 lCDX9E2hw+5qQCkWMjCmFq5Nl6oSegbwnUb1Uxw+JHPmek7cV2v6ciXUAorYvfvJ4bD+ Euhw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=MikVig0b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v10-20020a50a44a000000b0041d799aa068si353149edb.147.2022.04.19.17.43.55; Tue, 19 Apr 2022 17:44:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=MikVig0b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350712AbiDSKbT (ORCPT + 99 others); Tue, 19 Apr 2022 06:31:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57340 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350670AbiDSKa7 (ORCPT ); Tue, 19 Apr 2022 06:30:59 -0400 Received: from alexa-out.qualcomm.com (alexa-out.qualcomm.com [129.46.98.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD927275F6 for ; Tue, 19 Apr 2022 03:28:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; i=@quicinc.com; q=dns/txt; s=qcdkim; t=1650364096; x=1681900096; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=oZHnRkPCm8T5oXIKxLsR0BkDUMS+EsF7CIAupgKOdV0=; b=MikVig0b5Bh4EB6MDcY9L4pBB71HgkqSQu8lTzqndFzrsp9gBCYAjbPe Jggg0/Fgs9BZ/AjHphJv9vdPXOkwz2ZR+qBzistvbVAqUHj4z2eevSUql NwiAobKDwbz9c65b6+vQXduQBJwUZpNCtU+WGtAOY5Z+Bm73jLQBopgpw Y=; Received: from ironmsg-lv-alpha.qualcomm.com ([10.47.202.13]) by alexa-out.qualcomm.com with ESMTP; 19 Apr 2022 03:28:16 -0700 X-QCInternal: smtphost Received: from nasanex01c.na.qualcomm.com ([10.47.97.222]) by ironmsg-lv-alpha.qualcomm.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Apr 2022 03:28:16 -0700 Received: from hu-mojha-hyd.qualcomm.com (10.80.80.8) by nasanex01c.na.qualcomm.com (10.47.97.222) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.22; Tue, 19 Apr 2022 03:28:13 -0700 From: Mukesh Ojha To: CC: , , , , Mukesh Ojha Subject: [PATCH] devcoredump : Serialize devcd_del work Date: Tue, 19 Apr 2022 15:57:57 +0530 Message-ID: <1650364077-22694-1-git-send-email-quic_mojha@quicinc.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nasanex01c.na.qualcomm.com (10.47.97.222) X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In following scenario(diagram), when one thread X running dev_coredumpm() adds devcd device to the framework which sends uevent notification to userspace and another thread Y reads this uevent and call to devcd_data_write() which eventually try to delete the queued timer that is not initialized/queued yet. So, debug object reports some warning and in the meantime, timer is initialized and queued from X path. and from Y path, it gets reinitialized again and timer->entry.pprev=NULL and try_to_grab_pending() stucks. To fix this, introduce mutex to serialize the behaviour. cpu0(X) cpu1(Y) dev_coredump() uevent sent to userspace device_add() =========================> userspace process Y reads the uevents writes to devcd fd which results into writes to devcd_data_write() mod_delayed_work() try_to_grab_pending() del_timer() debug_assert_init() INIT_DELAYED_WORK schedule_delayed_work debug_object_fixup() timer_fixup_assert_init() timer_setup() do_init_timer()   ==> reinitialized the timer to timer->entry.pprev=NULL timer_pending() !hlist_unhashed_lockless(&timer->entry) !h->pprev ==> del_timer checks and finds it to be NULL try_to_grab_pending() stucks. Link: https://lore.kernel.org/lkml/2e1f81e2-428c-f11f-ce92-eb11048cb271@quicinc.com/ Signed-off-by: Mukesh Ojha --- drivers/base/devcoredump.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/base/devcoredump.c b/drivers/base/devcoredump.c index f4d794d..316f566 100644 --- a/drivers/base/devcoredump.c +++ b/drivers/base/devcoredump.c @@ -25,6 +25,7 @@ struct devcd_entry { struct device devcd_dev; void *data; size_t datalen; + struct mutex mutex; struct module *owner; ssize_t (*read)(char *buffer, loff_t offset, size_t count, void *data, size_t datalen); @@ -84,7 +85,9 @@ static ssize_t devcd_data_write(struct file *filp, struct kobject *kobj, struct device *dev = kobj_to_dev(kobj); struct devcd_entry *devcd = dev_to_devcd(dev); + mutex_lock(&devcd->mutex); mod_delayed_work(system_wq, &devcd->del_wk, 0); + mutex_unlock(&devcd->mutex); return count; } @@ -112,7 +115,9 @@ static int devcd_free(struct device *dev, void *data) { struct devcd_entry *devcd = dev_to_devcd(dev); + mutex_lock(&devcd->mutex); flush_delayed_work(&devcd->del_wk); + mutex_unlock(&devcd->mutex); return 0; } @@ -278,13 +283,14 @@ void dev_coredumpm(struct device *dev, struct module *owner, devcd->read = read; devcd->free = free; devcd->failing_dev = get_device(dev); - + mutex_init(&devcd->mutex); device_initialize(&devcd->devcd_dev); dev_set_name(&devcd->devcd_dev, "devcd%d", atomic_inc_return(&devcd_count)); devcd->devcd_dev.class = &devcd_class; + mutex_lock(&devcd->mutex); if (device_add(&devcd->devcd_dev)) goto put_device; @@ -301,10 +307,11 @@ void dev_coredumpm(struct device *dev, struct module *owner, INIT_DELAYED_WORK(&devcd->del_wk, devcd_del); schedule_delayed_work(&devcd->del_wk, DEVCD_TIMEOUT); - + mutex_unlock(&devcd->mutex); return; put_device: put_device(&devcd->devcd_dev); + mutex_unlock(&devcd->mutex); put_module: module_put(owner); free: -- 2.7.4