From patchwork Thu Jun 13 16:32:25 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jiang Liu X-Patchwork-Id: 2717801 X-Patchwork-Delegate: bhelgaas@google.com Return-Path: X-Original-To: patchwork-linux-pci@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 3FE06C0AB1 for ; Thu, 13 Jun 2013 16:37:36 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 19A062045D for ; Thu, 13 Jun 2013 16:37:35 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DBA6C20450 for ; Thu, 13 Jun 2013 16:37:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758570Ab3FMQf2 (ORCPT ); Thu, 13 Jun 2013 12:35:28 -0400 Received: from mail-pd0-f169.google.com ([209.85.192.169]:62112 "EHLO mail-pd0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754770Ab3FMQfZ (ORCPT ); Thu, 13 Jun 2013 12:35:25 -0400 Received: by mail-pd0-f169.google.com with SMTP id y10so11502345pdj.14 for ; Thu, 13 Jun 2013 09:35:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=sender:from:to:cc:subject:date:message-id:x-mailer:in-reply-to :references; bh=Z80/M7V7TdCYdZRqGVUG/Mj6FuKKdsXYLEvq0ya24As=; b=pr3tTb0nxYyCLZ4mIql2LUI1YkQkGhQkr6zOOiBMLH6mrOflFz2sKkC1p8yAI4gbv2 5vdCoriAW7BHnIrml+sxQq7TJwaBHFf2ihXX//yzV6KjlsMVbDU2VpIiDI7e5S47Nn4C Y47z/b/1so1bKay03KKrwskxlh6czvJZZrDjQMS+OeG45RJK/hJJVQUcHqXQsoiErSFi bLB3lkeCI9lYgjycrdUt6hwtzQnf0U/Sxppkg+8I/6J0LtiXUI9wFAESsY671p6Y8S48 rGQzQPW1HkrTA/5WiqSv1BEfoONFWp7B7XhfQicsdIWQ42caSype8FFl+7AfbyutGqK8 fwKQ== X-Received: by 10.66.243.4 with SMTP id wu4mr3601850pac.72.1371141325092; Thu, 13 Jun 2013 09:35:25 -0700 (PDT) Received: from localhost.localdomain ([114.250.95.159]) by mx.google.com with ESMTPSA id ty8sm176964pac.8.2013.06.13.09.35.20 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 13 Jun 2013 09:35:24 -0700 (PDT) From: Jiang Liu To: "Rafael J . Wysocki" , Bjorn Helgaas , Yinghai Lu , "Alexander E . Patrakov" Cc: Jiang Liu , Greg Kroah-Hartman , Yijing Wang , Jiang Liu , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, "Rafael J. Wysocki" , stable@vger.kernel.org Subject: [BUGFIX 2/9] ACPIPHP: fix device destroying order issue when handling dock notification Date: Fri, 14 Jun 2013 00:32:25 +0800 Message-Id: <1371141152-9468-3-git-send-email-jiang.liu@huawei.com> X-Mailer: git-send-email 1.8.1.2 In-Reply-To: <1371141152-9468-1-git-send-email-jiang.liu@huawei.com> References: <1371141152-9468-1-git-send-email-jiang.liu@huawei.com> Sender: linux-pci-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Current ACPI glue logic expects that physical devices are destroyed before destroying companion ACPI devices, otherwise it will break the ACPI unbind logic and cause following warning messages: [ 185.026073] usb usb5: Oops, 'acpi_handle' corrupt [ 185.035150] pci 0000:1b:00.0: Oops, 'acpi_handle' corrupt [ 185.035515] pci 0000:18:02.0: Oops, 'acpi_handle' corrupt [ 180.013656] port1: Oops, 'acpi_handle' corrupt Please refer to https://bugzilla.kernel.org/attachment.cgi?id=104321 for full log message. Above warning messages are caused by following scenario: 1) acpi_dock_notifier_call() queues a task (T1) onto kacpi_hotplug_wq 2) kacpi_hotplug_wq handles T1, which invokes acpi_dock_deferred_cb() ->dock_notify()-> handle_eject_request()->hotplug_dock_devices() 3) hotplug_dock_devices() first invokes registered hotplug callbacks to destroy physical devices, then destroys all affected ACPI devices. Everything seems perfect until now. But the acpiphp dock notification handler will queue another task (T2) onto kacpi_hotplug_wq to really destroy affected physical devices. 4) kacpi_hotplug_wq finishes T1, and all affected ACPI devices have been destroyed. 5) kacpi_hotplug_wq handles T2, which destroys all affected physical devices. So it breaks ACPI glue logic's expection because ACPI devices are destroyed in step 3 and physical devices are destroyed in step 5. Signed-off-by: Jiang Liu Reported-by: Alexander E. Patrakov Cc: Bjorn Helgaas Cc: Yinghai Lu Cc: "Rafael J. Wysocki" Cc: linux-pci@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org --- Hi Bjorn and Rafael, The recursive lock changes haven't been tested yet, need help from Alexander for testing. --- drivers/acpi/dock.c | 33 +++++++++++++++++++++++++++------ drivers/pci/hotplug/acpiphp_glue.c | 32 ++++++++++++++++++-------------- 2 files changed, 45 insertions(+), 20 deletions(-) diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c index 02b0563..79c8d9e 100644 --- a/drivers/acpi/dock.c +++ b/drivers/acpi/dock.c @@ -65,6 +65,7 @@ struct dock_station { u32 flags; spinlock_t dd_lock; struct mutex hp_lock; + struct task_struct *owner; struct list_head dependent_devices; struct list_head hotplug_devices; @@ -131,9 +132,13 @@ static void dock_add_hotplug_device(struct dock_station *ds, struct dock_dependent_device *dd) { - mutex_lock(&ds->hp_lock); - list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); - mutex_unlock(&ds->hp_lock); + if (mutex_is_locked(&ds->hp_lock) && ds->owner == current) { + list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); + } else { + mutex_lock(&ds->hp_lock); + list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); + mutex_unlock(&ds->hp_lock); + } } /** @@ -147,9 +152,13 @@ static void dock_del_hotplug_device(struct dock_station *ds, struct dock_dependent_device *dd) { - mutex_lock(&ds->hp_lock); - list_del(&dd->hotplug_list); - mutex_unlock(&ds->hp_lock); + if (mutex_is_locked(&ds->hp_lock) && ds->owner == current) { + list_del_init(&dd->hotplug_list); + } else { + mutex_lock(&ds->hp_lock); + list_del_init(&dd->hotplug_list); + mutex_unlock(&ds->hp_lock); + } } /** @@ -355,7 +364,17 @@ static void hotplug_dock_devices(struct dock_station *ds, u32 event) { struct dock_dependent_device *dd; + /* + * There is a deadlock scenario as below: + * hotplug_dock_devices() + * mutex_lock(&ds->hp_lock) + * dd->ops->handler() + * register_hotplug_dock_device() + * mutex_lock(&ds->hp_lock) + * So we need recursive lock scematics here, do it by ourselves. + */ mutex_lock(&ds->hp_lock); + ds->owner = current; /* * First call driver specific hotplug functions @@ -376,6 +395,8 @@ static void hotplug_dock_devices(struct dock_station *ds, u32 event) else dock_create_acpi_device(dd->handle); } + + ds->owner = NULL; mutex_unlock(&ds->hp_lock); } diff --git a/drivers/pci/hotplug/acpiphp_glue.c b/drivers/pci/hotplug/acpiphp_glue.c index 716aa93..699b8ca 100644 --- a/drivers/pci/hotplug/acpiphp_glue.c +++ b/drivers/pci/hotplug/acpiphp_glue.c @@ -61,6 +61,8 @@ static DEFINE_MUTEX(bridge_mutex); static void handle_hotplug_event_bridge (acpi_handle, u32, void *); static void acpiphp_sanitize_bus(struct pci_bus *bus); static void acpiphp_set_hpp_values(struct pci_bus *bus); +static void _handle_hotplug_event_func(acpi_handle handle, u32 type, + void *context); static void handle_hotplug_event_func(acpi_handle handle, u32 type, void *context); static void free_bridge(struct kref *kref); @@ -147,7 +149,7 @@ static int post_dock_fixups(struct notifier_block *nb, unsigned long val, static const struct acpi_dock_ops acpiphp_dock_ops = { - .handler = handle_hotplug_event_func, + .handler = _handle_hotplug_event_func, }; /* Check whether the PCI device is managed by native PCIe hotplug driver */ @@ -1065,22 +1067,13 @@ static void handle_hotplug_event_bridge(acpi_handle handle, u32 type, alloc_acpi_hp_work(handle, type, context, _handle_hotplug_event_bridge); } -static void _handle_hotplug_event_func(struct work_struct *work) +static void _handle_hotplug_event_func(acpi_handle handle, u32 type, + void *context) { - struct acpiphp_func *func; + struct acpiphp_func *func = context; char objname[64]; struct acpi_buffer buffer = { .length = sizeof(objname), .pointer = objname }; - struct acpi_hp_work *hp_work; - acpi_handle handle; - u32 type; - - hp_work = container_of(work, struct acpi_hp_work, work); - handle = hp_work->handle; - type = hp_work->type; - func = (struct acpiphp_func *)hp_work->context; - - acpi_scan_lock_acquire(); acpi_get_name(handle, ACPI_FULL_PATHNAME, &buffer); @@ -1113,7 +1106,18 @@ static void _handle_hotplug_event_func(struct work_struct *work) warn("notify_handler: unknown event type 0x%x for %s\n", type, objname); break; } +} + +static void _handle_hotplug_event_cb(struct work_struct *work) +{ + struct acpiphp_func *func; + struct acpi_hp_work *hp_work; + hp_work = container_of(work, struct acpi_hp_work, work); + func = (struct acpiphp_func *)hp_work->context; + acpi_scan_lock_acquire(); + _handle_hotplug_event_func(hp_work->handle, hp_work->type, + hp_work->context); acpi_scan_lock_release(); kfree(hp_work); /* allocated in handle_hotplug_event_func */ put_bridge(func->slot->bridge); @@ -1141,7 +1145,7 @@ static void handle_hotplug_event_func(acpi_handle handle, u32 type, * don't deadlock on hotplug actions. */ get_bridge(func->slot->bridge); - alloc_acpi_hp_work(handle, type, context, _handle_hotplug_event_func); + alloc_acpi_hp_work(handle, type, context, _handle_hotplug_event_cb); } /*