Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp161908rwb; Fri, 4 Aug 2023 10:36:07 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF8xfWPdT4abil1YO9ca3CUq7gNlb1VEoCjk/CtXmOpMdNkMv7Vp7BNnxUUqNqeK3/uwRpk X-Received: by 2002:a17:902:f688:b0:1b7:f64b:378a with SMTP id l8-20020a170902f68800b001b7f64b378amr2445350plg.16.1691170567607; Fri, 04 Aug 2023 10:36:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691170567; cv=none; d=google.com; s=arc-20160816; b=qJXXmDhlCJcZO/91mcS7F0NgBVh4x0McGM2s5swQdDVkq9YWM0wUu5dBhbJ1AXCAuV +qL/p5Ok0lAIQmzviFLEcjvvdw/FtFAaDoM/9zcGA1UYYfYdzmEv/0JKDh88CwSbhOye 9QuLmaKFD2r4Q0Pw+hp/goXOSvzmVSoMaWMF7oXxmlb+KGYrJYtMhynK+0QaMzq3PQeP z0CzKcF0s3EAbOdkqNrOHAQHrF9OmNur6AvM6RvgtxI8FGDHPoN2Gjq8cJJpoyEOaFji juHEg+0F1rQ0qU1jFD5zd13JYZKEDY+pwYbkXH8h7NzbPwwQEcNZRT1M9HfjuyYQwdKK poRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=YMYV5WTpu3JuqN0BD2J7/xLExQ3Ou/wJxlYIyCYObjQ=; fh=UwM/W5HGM/nEetHB+ilkGPwa1zcrcWVE+39xMMwarLk=; b=psORChu2C5vjExOIV22TWoK1c17lPK+Kbti8LOD8D2ekwbwk55tWgpvsVFxGRLMf83 xB5HczqDuCSmJRor6+rB5xkoiQS888W51s4uyudZLgvdcTRRv9gUMqMIc/ImaaDvNT+x K/MelxrTEfLb6350AHFzihfNnIyMawNimidyeHp0blVOlPeJ85AAHDfpgc7V8CqiUtkp DNCwJGfwP7hzfWrlsk9wyYGPPN48pc/hd44o3/YPyjwb2+GTpCbJfRD3ZHL/l7XYKnCq I0u5XGAm1ZeZpxgMwGobOm9s10uvGqR9JGZoC7+1lAeYqGpm2UILsk+Jc2otBLxaF9W0 Ev2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HNYerY+y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u13-20020a170903124d00b001b89fd6bec4si434873plh.144.2023.08.04.10.35.48; Fri, 04 Aug 2023 10:36:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HNYerY+y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229685AbjHDQaG (ORCPT + 99 others); Fri, 4 Aug 2023 12:30:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44248 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230040AbjHDQaD (ORCPT ); Fri, 4 Aug 2023 12:30:03 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AA34746B2 for ; Fri, 4 Aug 2023 09:30:00 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3EA9162098 for ; Fri, 4 Aug 2023 16:30:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9C0E8C433C8; Fri, 4 Aug 2023 16:29:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1691166599; bh=XL+TUm/cXgohgwGkYWj9XkK8SBBw8h6QNYCVPvifeQM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=HNYerY+yUIUJBz5YL0oOZ8vw55MUccK+08B8znHM0LONs65dW2ic1rSzHwx6ajgGc jl8uKCPWoGfqD8EjEMbf+rNUt7T+3nQDcqS3IGBKWABl3TdNTDlw882ZsHF7kQwCoI 2qoMaO7kMSp5bTblLT4kc6DTVUKYZ0v30bXDBPA2jRgAdzbWrfw+WnulloXXwoGEIf BF3J9iFyFgeFFJadXSVez5dSmS3LXXD3590tJ3Gx2XtgTb4+B27oYXtLUiIqKroYck AStuNSxw8qcTa6UdfdRf0YzlEswgjSeyxBib3OyMByOdUZ5ZJfjPsEVTN4jfGAeQi0 KUZ4/JeUBZOaA== Date: Fri, 4 Aug 2023 17:29:55 +0100 From: Will Deacon To: Waiman Long Cc: Mark Rutland , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Robin Murphy Subject: Re: [PATCH v3] perf/arm-dmc620: Fix dmc620_pmu_irqs_lock/cpu_hotplug_lock circular lock dependency Message-ID: <20230804162954.GD30679@willie-the-truck> References: <20230722031729.3913953-1-longman@redhat.com> <20230728150614.GF21718@willie-the-truck> <62d4b353-0237-9ec6-a63e-8a7a6764aba5@redhat.com> <3e6a9ca3-3be5-8207-4923-8ecd141c04eb@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3e6a9ca3-3be5-8207-4923-8ecd141c04eb@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 02, 2023 at 09:44:58PM -0400, Waiman Long wrote: > > On 8/2/23 21:37, Waiman Long wrote: > > > > On 7/28/23 11:06, Will Deacon wrote: > > > On Fri, Jul 21, 2023 at 11:17:28PM -0400, Waiman Long wrote: > > > > The following circular locking dependency was reported when running > > > > cpus online/offline test on an arm64 system. > > > > > > > > [?? 84.195923] Chain exists of: > > > > ????????????????? dmc620_pmu_irqs_lock --> cpu_hotplug_lock --> > > > > cpuhp_state-down > > > > > > > > [?? 84.207305]? Possible unsafe locking scenario: > > > > > > > > [?? 84.213212]??????? CPU0??????????????????? CPU1 > > > > [?? 84.217729]??????? ----??????????????????? ---- > > > > [?? 84.222247]?? lock(cpuhp_state-down); > > > > [?? 84.225899] lock(cpu_hotplug_lock); > > > > [?? 84.232068] lock(cpuhp_state-down); > > > > [?? 84.238237]?? lock(dmc620_pmu_irqs_lock); > > > > [?? 84.242236] > > > > ???????????????? *** DEADLOCK *** > > > > > > > > The problematic locking order seems to be > > > > > > > > ????lock(dmc620_pmu_irqs_lock) --> lock(cpu_hotplug_lock) > > > > > > > > This locking order happens when dmc620_pmu_get_irq() is called from > > > > dmc620_pmu_device_probe(). Since dmc620_pmu_irqs_lock is used for > > > > protecting the dmc620_pmu_irqs structure only, we don't actually need > > > > to hold the lock when adding a new instance to the CPU hotplug > > > > subsystem. > > > > > > > > Fix this possible deadlock scenario by releasing the lock before > > > > calling cpuhp_state_add_instance_nocalls() and reacquiring it > > > > afterward. > > > > To avoid the possibility of 2 racing dmc620_pmu_get_irq() calls > > > > inserting > > > > duplicated dmc620_pmu_irq structures with the same irq number, a dummy > > > > entry is inserted before releasing the lock which will block a > > > > competing > > > > thread from inserting another irq structure of the same irq number. > > > > > > > > Suggested-by: Robin Murphy > > > > Signed-off-by: Waiman Long > > > > --- > > > > ? drivers/perf/arm_dmc620_pmu.c | 28 ++++++++++++++++++++++------ > > > > ? 1 file changed, 22 insertions(+), 6 deletions(-) > > > > > > > > diff --git a/drivers/perf/arm_dmc620_pmu.c > > > > b/drivers/perf/arm_dmc620_pmu.c > > > > index 9d0f01c4455a..7cafd4dd4522 100644 > > > > --- a/drivers/perf/arm_dmc620_pmu.c > > > > +++ b/drivers/perf/arm_dmc620_pmu.c > > > > @@ -76,6 +76,7 @@ struct dmc620_pmu_irq { > > > > ????? refcount_t refcount; > > > > ????? unsigned int irq_num; > > > > ????? unsigned int cpu; > > > > +??? unsigned int valid; > > > > ? }; > > > > ? ? struct dmc620_pmu { > > > > @@ -423,9 +424,14 @@ static struct dmc620_pmu_irq > > > > *__dmc620_pmu_get_irq(int irq_num) > > > > ????? struct dmc620_pmu_irq *irq; > > > > ????? int ret; > > > > ? -??? list_for_each_entry(irq, &dmc620_pmu_irqs, irqs_node) > > > > -??????? if (irq->irq_num == irq_num && > > > > refcount_inc_not_zero(&irq->refcount)) > > > > +??? list_for_each_entry(irq, &dmc620_pmu_irqs, irqs_node) { > > > > +??????? if (irq->irq_num != irq_num) > > > > +??????????? continue; > > > > +??????? if (!irq->valid) > > > > +??????????? return ERR_PTR(-EAGAIN);??? /* Try again later */ > > > It looks like this can bubble up to the probe() routine. Does the driver > > > core handle -EAGAIN coming back from a probe routine? > > Right, I should add code to handle this error condition. I think it can > > be handled in dmc620_pmu_get_irq(). The important thing is to release > > the mutex, wait a few ms and try again. What do you think? > > > > > > > +??????? if (refcount_inc_not_zero(&irq->refcount)) > > > > ????????????? return irq; > > > > +??? } > > > > ? ????? irq = kzalloc(sizeof(*irq), GFP_KERNEL); > > > > ????? if (!irq) > > > > @@ -447,13 +453,23 @@ static struct dmc620_pmu_irq > > > > *__dmc620_pmu_get_irq(int irq_num) > > > > ????? if (ret) > > > > ????????? goto out_free_irq; > > > > ? -??? ret = cpuhp_state_add_instance_nocalls(cpuhp_state_num, > > > > &irq->node); > > > > -??? if (ret) > > > > -??????? goto out_free_irq; > > > > - > > > > ????? irq->irq_num = irq_num; > > > > ????? list_add(&irq->irqs_node, &dmc620_pmu_irqs); > > > > ? +??? /* > > > > +???? * Release dmc620_pmu_irqs_lock before calling > > > > +???? * cpuhp_state_add_instance_nocalls() and reacquire it afterward. > > > > +???? */ > > > > +??? mutex_unlock(&dmc620_pmu_irqs_lock); > > > > +??? ret = cpuhp_state_add_instance_nocalls(cpuhp_state_num, > > > > &irq->node); > > > > +??? mutex_lock(&dmc620_pmu_irqs_lock); > > > > + > > > > +??? if (ret) { > > > > +??????? list_del(&irq->irqs_node); > > > > +??????? goto out_free_irq; > > > > +??? } > > > > + > > > > +??? irq->valid = true; > > > Do you actually need a new flag here, or could we use a refcount of zero > > > to indicate that the irq descriptor is still being constructed? > > > > A refcount of zero can also mean that an existing irq is about to be > > removed. Right? So I don't think we can use that for this purpose. > > Besides, there is a 4-byte hole in the structure anyway for arm64. > > Alternatively, I can use a special reference count value, say -1, to signal > that the irq is not valid yet. What do you think? If the device is being removed, we should teardown the irq handler first, so I don't see why the refcount isn't the right thing. Will