Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp3153322rwb; Mon, 16 Jan 2023 04:33:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXsaKt6GC2cYVs8S1uSdZrn7/EdHUtQ+eaXPmcx98CtG7ZLwyHGxA+ecN07g7XOv9afij73m X-Received: by 2002:a05:6a21:86a8:b0:ad:6305:a4 with SMTP id ox40-20020a056a2186a800b000ad630500a4mr87078076pzb.48.1673872409852; Mon, 16 Jan 2023 04:33:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673872409; cv=none; d=google.com; s=arc-20160816; b=nCLem/zjgMV1yc4F8/d0RwfZE954XMmJqromgxGNSOdCy+guhGeqbDyCtqRIE0z3xU l60YIFObIvVlsjvYqvUOL5a6TC7sFWBF/gRS/KZUlSZm98Cj2XeyRdRPQ4k28FahFjw2 IuVd949soaDQxZXT/1tCk+VSMewjZQ5RK2suMpOfo8E3+mFIHmrH+bE5xKbkn9yhEu8I iRjTAvw3RRNOQZuoFjEFBeSaKfJFL/SyOxYh++ihHY3295aBYCY5tS1OnL7Hon9ASbu5 8HX8yiiLcBmiaaDM7ioNuIpxDM7qwPY+2wb78zM1dvqnmuclxt5Ip+50wVOxSjMhSCYZ fsRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=n13e2VqHLxLRe9cp1HHj0fkYLyFcxnPzWYOlz6hjObc=; b=YOpSqTb3AXQCF2QmqXiaslyob4o3KtGqf2GBNT59aW4b3P9SxtFf84WGUKKucIimzc dkNf18CKgvIxkxBXdtehTFAkFhxeSO87SHy9SYd+UNPiShkrTu1SudJ+mrI/vnGqhzxD MNunQNYi7q/qUtsqYIoQG2ca5V6H0o2rfAqkufFCsicbIxJ5YqdTIjFjCfrU+xSkl9g0 CF3hH3W7sEwq5KG77QMMQnfr9hI8ol+d7ap6loSYWe+jjnrj9qRzYMCVUAumPNfhkQC4 MVWScm3EmUEd5X+KarLSVgdDFWW7jdHjf80wWuxAEXryQeTip6IXU4vEwOJQoASNC3bp 76Hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mailserver.it header.s=mailsrv header.b=uXGcYwb3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t31-20020a056a00139f00b0056e4c95266bsi7701839pfg.77.2023.01.16.04.33.18; Mon, 16 Jan 2023 04:33:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mailserver.it header.s=mailsrv header.b=uXGcYwb3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229460AbjAPMQJ (ORCPT + 51 others); Mon, 16 Jan 2023 07:16:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48396 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229517AbjAPMQG (ORCPT ); Mon, 16 Jan 2023 07:16:06 -0500 X-Greylist: delayed 576 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Mon, 16 Jan 2023 04:16:01 PST Received: from smtp-out-07.comm2000.it (smtp-out-07.comm2000.it [212.97.32.77]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4FF3E270C; Mon, 16 Jan 2023 04:16:01 -0800 (PST) Received: from francesco-nb.int.toradex.com (31-10-206-125.static.upc.ch [31.10.206.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: francesco@dolcini.it) by smtp-out-07.comm2000.it (Postfix) with ESMTPSA id CF6653C2901; Mon, 16 Jan 2023 13:06:23 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=mailserver.it; s=mailsrv; t=1673870784; bh=ww3wNkm2WTEAwlFgREQLZhocFDwbXyOXH1fBRgEgaL4=; h=Date:From:To:Cc:Subject; b=uXGcYwb3+5pn9KIDDhsxnjBf1hJEeDy+YDO0map1xvvdCpieM+o5ZrUseMm2V+eWo ZOY1l2NA2mQJuaSP27Z14/JNzRXKOsJjBLTAQ0QqYa1WaKQ+Tr4NOtg3adl2ty1bP3 TX9iyKW+t63ZsCqENFs/YXqcCKAnbvIViqH6xDYj2MBXQiAHCxKAJ/J0O14sycRQFD k18kGoEZGFr4Kah6SZ2AYOJ6JZfFCCs5BIluvej07r1z5yHKvu/90gTZwt74hp0fPe AMUEUGHA7k0brU8u9ov16M1+ETCbq9HC3uUVplwZJhpM6x2vMO20MZvJfp8mwTUDsQ ZhuCWvfo+I+ug== Date: Mon, 16 Jan 2023 13:06:22 +0100 From: Francesco Dolcini To: Bartosz Golaszewski , Mark Brown , bartosz.golaszewski@linaro.org Cc: linux-spi@vger.kernel.org, linux-kernel@vger.kernel.org, max.krummenacher@toradex.com Subject: spidev regression in 6.2-rc kernel Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, we spotted a regression on spidev on latest 6.2-rc kernel. [ 214.047619] [ 214.049198] ============================================ [ 214.054533] WARNING: possible recursive locking detected [ 214.059858] 6.2.0-rc3-0.0.0-devel+git.97ec4d559d93 #1 Not tainted [ 214.065969] -------------------------------------------- [ 214.071290] spidev_test/1454 is trying to acquire lock: [ 214.076530] c4925dbc (&spidev->spi_lock){+.+.}-{3:3}, at: spidev_ioctl+0x8e0/0xab8 [ 214.084164] [ 214.084164] but task is already holding lock: [ 214.090007] c4925dbc (&spidev->spi_lock){+.+.}-{3:3}, at: spidev_ioctl+0x44/0xab8 [ 214.097537] [ 214.097537] other info that might help us debug this: [ 214.104075] Possible unsafe locking scenario: [ 214.104075] [ 214.110004] CPU0 [ 214.112461] ---- [ 214.114916] lock(&spidev->spi_lock); [ 214.118687] lock(&spidev->spi_lock); [ 214.122457] [ 214.122457] *** DEADLOCK *** [ 214.122457] [ 214.128386] May be due to missing lock nesting notation [ 214.128386] [ 214.135183] 2 locks held by spidev_test/1454: [ 214.139553] #0: c4925dbc (&spidev->spi_lock){+.+.}-{3:3}, at: spidev_ioctl+0x44/0xab8 [ 214.147524] #1: c4925e14 (&spidev->buf_lock){+.+.}-{3:3}, at: spidev_ioctl+0x70/0xab8 [ 214.155493] [ 214.155493] stack backtrace: [ 214.159861] CPU: 0 PID: 1454 Comm: spidev_test Not tainted 6.2.0-rc3-0.0.0-devel+git.97ec4d559d93 #1 [ 214.169012] Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree) [ 214.175555] unwind_backtrace from show_stack+0x10/0x14 [ 214.180819] show_stack from dump_stack_lvl+0x60/0x90 [ 214.185900] dump_stack_lvl from __lock_acquire+0x874/0x2858 [ 214.191584] __lock_acquire from lock_acquire+0xfc/0x378 [ 214.196918] lock_acquire from __mutex_lock+0x9c/0x8a8 [ 214.202083] __mutex_lock from mutex_lock_nested+0x1c/0x24 [ 214.207597] mutex_lock_nested from spidev_ioctl+0x8e0/0xab8 [ 214.213284] spidev_ioctl from sys_ioctl+0x4d0/0xe2c [ 214.218277] sys_ioctl from ret_fast_syscall+0x0/0x1c [ 214.223351] Exception stack(0xe75cdfa8 to 0xe75cdff0) [ 214.228422] dfa0: 00000000 00001000 00000003 40206b00 bee266e8 bee266e0 [ 214.236617] dfc0: 00000000 00001000 006a71a0 00000036 004c0040 004bfd18 00000000 00000003 [ 214.244809] dfe0: 00000036 bee266c8 b6f16dc5 b6e8e5f6 This is not running the latest rc4, but on sha 97ec4d559d93 (this is just what our CI had available when this test was run). I was not able to bisect it, but it seems something that you could have introduced. The log is from an apalis-imx6, but I have the same on other ARM SOC. Can you have a look? Thanks Francesco