From nobody Thu Dec 18 00:09:13 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D501EC001B0 for ; Tue, 15 Aug 2023 15:29:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238104AbjHOP3A (ORCPT ); Tue, 15 Aug 2023 11:29:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237987AbjHOP2g (ORCPT ); Tue, 15 Aug 2023 11:28:36 -0400 Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57932172A for ; Tue, 15 Aug 2023 08:28:35 -0700 (PDT) Received: by mail-pl1-x629.google.com with SMTP id d9443c01a7336-1bbff6b2679so35044705ad.1 for ; Tue, 15 Aug 2023 08:28:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1692113315; x=1692718115; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=LDaNmvu0t+IVJSOxdRgpYAMrOwamW5o6s4fUavxCLCc=; b=lGqKzg0uCL5ZyGphrhgCcHVeAOyPMpeC2IAType9piBAyNebL89YSRisTt3RotClx+ jMTGOSRblKc+GHGTDZZJkxz2eT9j9k7ljWANX0JLN04fk/7b7/8hM9pNOnqgAgm11kaz DH9dyoCvNmtqp6SvbW7Gy5HwOWTMYBGgAGAfA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692113315; x=1692718115; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=LDaNmvu0t+IVJSOxdRgpYAMrOwamW5o6s4fUavxCLCc=; b=DNS3xMimK7pXNhNQ4ltnWmv8VfblzYBQe2Dn/iSGHCprsKL4UeK1uYyKd71ckVjiS8 GZRsypyeMYqst4NwofMFTwGEISoD8PLdBK1TzEPnqC4bw1esQClXJyKV0BG+uM+3mxyz /aGZ12d67iHlLOHL6UeiBSWt7QUKx6vOAkFj7y31fjA2Wpg6Y9VFLfT6L9Vjdlkh4neH gJYAT71/kfMEhXJK2YMAQG7c5cyKBd6rFcDv3+l7UDkCq8J+lIgc2IA3uwf36TktsN5K FGwcFbz/EjzFwoukdmJ/uBiPVWwWsEE/rr8zX1IAkTuJqikLqzdxmf475nSgpZaeVTfz aa3A== X-Gm-Message-State: AOJu0YwU+eRtyyFfdDLcuKues8AT7C6PN+Rt+r/d/Ckk/zfs9gWRt8t3 ihmmY6lBkLLcsTebktAJocMt8Q== X-Google-Smtp-Source: AGHT+IF7GGbJ8ioumjXbwaTaJTPkyJQUTvdoKe10QY/02znGZOZbyq4qK3NwYYlAAedB7KD7/Fs6Mg== X-Received: by 2002:a17:902:da86:b0:1b8:1b79:a78c with SMTP id j6-20020a170902da8600b001b81b79a78cmr13232285plx.44.1692113314712; Tue, 15 Aug 2023 08:28:34 -0700 (PDT) Received: from tigerii.tok.corp.google.com ([2401:fa00:8f:203:898b:9016:5235:af21]) by smtp.gmail.com with ESMTPSA id a7-20020a170902ecc700b001aaecc0b6ffsm11195960plh.160.2023.08.15.08.28.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Aug 2023 08:28:34 -0700 (PDT) From: Sergey Senozhatsky To: Christoph Hellwig , Marek Szyprowski , Robin Murphy , Petr Mladek Cc: Rob Clark , John Ogness , linux-kernel@vger.kernel.org, Sergey Senozhatsky Subject: [PATCH] dma-debug: defer __dma_entry_alloc_check_leak() printk output Date: Wed, 16 Aug 2023 00:26:43 +0900 Message-ID: <20230815152822.3660784-1-senozhatsky@chromium.org> X-Mailer: git-send-email 2.41.0.694.ge786442a9b-goog MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" __dma_entry_alloc_check_leak() calls printk -> serial console output (qcom geni) and grabs port->lock under free_entries_lock, which is a conflicting locking dependency chain as qcom_geni IRQ handler can call into dma-debug code and grab free_entries_lock under port->lock. Use deferred printk in __dma_entry_alloc_check_leak() so that we don't acquire serial console's port->lock under free_entries_lock. Trimmed-down lockdep splat: The existing dependency chain (in reverse order) is: -> #2 (free_entries_lock){-.-.}-{2:2}: _raw_spin_lock_irqsave+0x60/0x80 dma_entry_alloc+0x38/0x110 debug_dma_map_page+0x60/0xf8 dma_map_page_attrs+0x1e0/0x230 dma_map_single_attrs.constprop.0+0x6c/0xc8 geni_se_rx_dma_prep+0x40/0xcc qcom_geni_serial_isr+0x310/0x510 __handle_irq_event_percpu+0x110/0x244 handle_irq_event_percpu+0x20/0x54 handle_irq_event+0x50/0x88 handle_fasteoi_irq+0xa4/0xcc handle_irq_desc+0x28/0x40 generic_handle_domain_irq+0x24/0x30 gic_handle_irq+0xc4/0x148 do_interrupt_handler+0xa4/0xb0 el1_interrupt+0x34/0x64 el1h_64_irq_handler+0x18/0x24 el1h_64_irq+0x64/0x68 arch_local_irq_enable+0x4/0x8 ____do_softirq+0x18/0x24 ... -> #1 (&port_lock_key){-.-.}-{2:2}: _raw_spin_lock_irqsave+0x60/0x80 qcom_geni_serial_console_write+0x184/0x1dc console_flush_all+0x344/0x454 console_unlock+0x94/0xf0 vprintk_emit+0x238/0x24c vprintk_default+0x3c/0x48 vprintk+0xb4/0xbc _printk+0x68/0x90 register_console+0x230/0x38c uart_add_one_port+0x338/0x494 qcom_geni_serial_probe+0x390/0x424 platform_probe+0x70/0xc0 really_probe+0x148/0x280 __driver_probe_device+0xfc/0x114 driver_probe_device+0x44/0x100 __device_attach_driver+0x64/0xdc bus_for_each_drv+0xb0/0xd8 __device_attach+0xe4/0x140 device_initial_probe+0x1c/0x28 bus_probe_device+0x44/0xb0 device_add+0x538/0x668 of_device_add+0x44/0x50 of_platform_device_create_pdata+0x94/0xc8 of_platform_bus_create+0x270/0x304 of_platform_populate+0xac/0xc4 devm_of_platform_populate+0x60/0xac geni_se_probe+0x154/0x160 platform_probe+0x70/0xc0 ... -> #0 (console_owner){-...}-{0:0}: __lock_acquire+0xdf8/0x109c lock_acquire+0x234/0x284 console_flush_all+0x330/0x454 console_unlock+0x94/0xf0 vprintk_emit+0x238/0x24c vprintk_default+0x3c/0x48 vprintk+0xb4/0xbc _printk+0x68/0x90 dma_entry_alloc+0xb4/0x110 debug_dma_map_sg+0xdc/0x2f8 __dma_map_sg_attrs+0xac/0xe4 dma_map_sgtable+0x30/0x4c get_pages+0x1d4/0x1e4 [msm] msm_gem_pin_pages_locked+0x38/0xac [msm] msm_gem_pin_vma_locked+0x58/0x88 [msm] msm_ioctl_gem_submit+0xde4/0x13ac [msm] drm_ioctl_kernel+0xe0/0x15c drm_ioctl+0x2e8/0x3f4 vfs_ioctl+0x30/0x50 ... Chain exists of: console_owner --> &port_lock_key --> free_entries_lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(free_entries_lock); lock(&port_lock_key); lock(free_entries_lock); lock(console_owner); *** DEADLOCK *** Call trace: dump_backtrace+0xb4/0xf0 show_stack+0x20/0x30 dump_stack_lvl+0x60/0x84 dump_stack+0x18/0x24 print_circular_bug+0x1cc/0x234 check_noncircular+0x78/0xac __lock_acquire+0xdf8/0x109c lock_acquire+0x234/0x284 console_flush_all+0x330/0x454 console_unlock+0x94/0xf0 vprintk_emit+0x238/0x24c vprintk_default+0x3c/0x48 vprintk+0xb4/0xbc _printk+0x68/0x90 dma_entry_alloc+0xb4/0x110 debug_dma_map_sg+0xdc/0x2f8 __dma_map_sg_attrs+0xac/0xe4 dma_map_sgtable+0x30/0x4c get_pages+0x1d4/0x1e4 [msm] msm_gem_pin_pages_locked+0x38/0xac [msm] msm_gem_pin_vma_locked+0x58/0x88 [msm] msm_ioctl_gem_submit+0xde4/0x13ac [msm] drm_ioctl_kernel+0xe0/0x15c drm_ioctl+0x2e8/0x3f4 vfs_ioctl+0x30/0x50 ... Reported-by: Rob Clark Signed-off-by: Sergey Senozhatsky Tested-by: Rob Clark --- kernel/dma/debug.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/dma/debug.c b/kernel/dma/debug.c index f190651bcadd..9e11ceadc69d 100644 --- a/kernel/dma/debug.c +++ b/kernel/dma/debug.c @@ -643,9 +643,9 @@ static void __dma_entry_alloc_check_leak(void) =20 /* Shout each time we tick over some multiple of the initial pool */ if (tmp < DMA_DEBUG_DYNAMIC_ENTRIES) { - pr_info("dma_debug_entry pool grown to %u (%u00%%)\n", - nr_total_entries, - (nr_total_entries / nr_prealloc_entries)); + printk_deferred(KERN_INFO "dma_debug_entry pool grown to %u (%u00%%)\n", + nr_total_entries, + (nr_total_entries / nr_prealloc_entries)); } } =20 --=20 2.41.0.694.ge786442a9b-goog