Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3844644rdh; Tue, 28 Nov 2023 05:33:10 -0800 (PST) X-Google-Smtp-Source: AGHT+IEJhAxziXOpVN2xBgXqpZSyany89ErlchY1r4qinKWQEVrIXpeHTCZgolJZkZQdFdYJuVc5 X-Received: by 2002:a17:902:d50e:b0:1cf:c518:fa3f with SMTP id b14-20020a170902d50e00b001cfc518fa3fmr7788387plg.35.1701178390212; Tue, 28 Nov 2023 05:33:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701178390; cv=none; d=google.com; s=arc-20160816; b=yrmCZtzXYDiu5BN4kEaoPQvd5+G9mGzoCrA9+ciMByz6dCJgA6Mei/fCfMv+5wR5CD LoL5jR7zUAfWssY+lxckK6ETPqm0XgYFe6XoXxuH/TYnj/PNsvdjIlYpxyxdcSaJwRbB tb0sHY6lqjcKifoTUiPoOwdw3zkFuKGBIybpEkTPtnzF33ksWePcFueYaYIVx8ztUfv0 NlmjT5iCDVt5yKeq1fl4DutPfZ0oyx9jPzg1s7EJIPJ8LeZtMdPGEfFUgUyCpsovTimO ZydWdnPy6mzJNbih460WhWwydoQZ59DK443x2k6NSiZNEWd6gwIymf73RaPl85BphfTl Dd1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=KtshcY4ByastFV2z0iOEElgV3pBUau2RJuJie7bnh18=; fh=3/5z00DksLVABfPDw/iCZrt2KrXhhhnPMbR0aYyKDSs=; b=I+a4GmjfiT0rNrg2vZlCmh4+DwoZ6gZ0Xkh1PtcaQoBDyoSHEpktvmdv3mJ7irQdlN NMhYwK1a0yuSTiC/oSeHfdV7J5tZN3QGGQcFW5kPNMdf9KRrH3Eyc2vt2yTfioiESoIl 4s3/gSwKkJElWRGY/kBhbIHSSUOJvn0rXcrRm5x8MA/3zEjT4qrbZlBsOzhDEWo2sBcy 5e997G+I6/gQUX94tAfeInf4mzloXPaT3BXd2EosAIXGL0VNhW+RMhBLKMAlJ6mAqeF7 FOmb4SEJBCWqRtuIu104m1tywXRVr9InLTSAjfslzHZyCow7r+RZu9yQigLV/D5KZTYo xNfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OfuRN5v7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id a20-20020a170902b59400b001d005be0a4bsi557840pls.399.2023.11.28.05.33.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 05:33:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OfuRN5v7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id E5354807C77E; Tue, 28 Nov 2023 05:33:07 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345217AbjK1Ncx (ORCPT + 99 others); Tue, 28 Nov 2023 08:32:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40156 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344120AbjK1Ncx (ORCPT ); Tue, 28 Nov 2023 08:32:53 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AF94A0 for ; Tue, 28 Nov 2023 05:33:00 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4029EC433C8; Tue, 28 Nov 2023 13:32:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701178379; bh=rVPeT5nmw8qQQiIaFmZSBajpfC/FLGYEM+kVR8C6eHI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=OfuRN5v73BRdDwtDvjVqEUkAx+rPfYn3oODDhKDz0wCkZ0zFl69z2eutxwvQFVs7C Mv92SCFYOLddDui4lzfsEeyOftKENRBdUN/xgoOPwAjXkXW9UevjxziO30/4cYKAu8 GcblBt8q280nOqbtevoOV4V5uK8jq4C/hOPK230N/19LtVMBZmoe/XcXHsSGSCRXLZ E6uFiToI0W+CqdbJzCH4LyDd389+WqEBgRJiJyLKFMyzylCPIIiHqSjTb6MZkPgn8z OjMr5p9S3dCjdjlnifW/BrSMLWBxwf9zIAkTOAi8BcmMLPRSHEKNbtsMrBWYevmcyp oulf8qynZq4mw== Date: Tue, 28 Nov 2023 19:02:52 +0530 From: Manivannan Sadhasivam To: Qiang Yu Cc: quic_jhugo@quicinc.com, mhi@lists.linux.dev, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, quic_cang@quicinc.com, quic_mrana@quicinc.com Subject: Re: [PATCH v4 2/4] bus: mhi: host: Drop chan lock before queuing buffers Message-ID: <20231128133252.GX3088@thinkpad> References: <1699939661-7385-1-git-send-email-quic_qianyu@quicinc.com> <1699939661-7385-3-git-send-email-quic_qianyu@quicinc.com> <20231124100403.GA4536@thinkpad> <639d6008-bdfa-4b6e-b622-e916003ec908@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <639d6008-bdfa-4b6e-b622-e916003ec908@quicinc.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 28 Nov 2023 05:33:08 -0800 (PST) On Mon, Nov 27, 2023 at 03:13:55PM +0800, Qiang Yu wrote: > > On 11/24/2023 6:04 PM, Manivannan Sadhasivam wrote: > > On Tue, Nov 14, 2023 at 01:27:39PM +0800, Qiang Yu wrote: > > > Ensure read and write locks for the channel are not taken in succession by > > > dropping the read lock from parse_xfer_event() such that a callback given > > > to client can potentially queue buffers and acquire the write lock in that > > > process. Any queueing of buffers should be done without channel read lock > > > acquired as it can result in multiple locks and a soft lockup. > > > > > Is this patch trying to fix an existing issue in client drivers or a potential > > issue in the future drivers? > > > > Even if you take care of disabled channels, "mhi_event->lock" acquired during > > mhi_mark_stale_events() can cause deadlock, since event lock is already held by > > mhi_ev_task(). > > > > I'd prefer not to open the window unless this patch is fixing a real issue. > > > > - Mani > In [PATCH v4 1/4] bus: mhi: host: Add spinlock to protect WP access when > queueing > TREs,  we add > write_lock_bh(&mhi_chan->lock)/write_unlock_bh(&mhi_chan->lock) > in mhi_gen_tre, which may be invoked as part of mhi_queue in client xfer > callback, > so we have to use read_unlock_bh(&mhi_chan->lock) here to avoid acquiring > mhi_chan->lock > twice. > > Sorry for confusing you. Do you think we need to sqush this two patch into > one? Well, if patch 1 is introducing a potential deadlock, then we should fix patch 1 itself and not introduce a follow up patch. But there is one more issue that I pointed out in my previous reply. Also, I'm planning to cleanup the locking mess within MHI in the coming days. Perhaps we can revisit this series at that point of time. Will that be OK for you? - Mani > > > Signed-off-by: Qiang Yu > > > --- > > > drivers/bus/mhi/host/main.c | 4 ++++ > > > 1 file changed, 4 insertions(+) > > > > > > diff --git a/drivers/bus/mhi/host/main.c b/drivers/bus/mhi/host/main.c > > > index 6c6d253..c4215b0 100644 > > > --- a/drivers/bus/mhi/host/main.c > > > +++ b/drivers/bus/mhi/host/main.c > > > @@ -642,6 +642,8 @@ static int parse_xfer_event(struct mhi_controller *mhi_cntrl, > > > mhi_del_ring_element(mhi_cntrl, tre_ring); > > > local_rp = tre_ring->rp; > > > + read_unlock_bh(&mhi_chan->lock); > > > + > > > /* notify client */ > > > mhi_chan->xfer_cb(mhi_chan->mhi_dev, &result); > > > @@ -667,6 +669,8 @@ static int parse_xfer_event(struct mhi_controller *mhi_cntrl, > > > kfree(buf_info->cb_buf); > > > } > > > } > > > + > > > + read_lock_bh(&mhi_chan->lock); > > > } > > > break; > > > } /* CC_EOT */ > > > -- > > > 2.7.4 > > > > > > > -- மணிவண்ணன் சதாசிவம்