[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20220902140421.GB29761@pathway.suse.cz>
Date: Fri, 2 Sep 2022 16:04:21 +0200
From: Petr Mladek <pmladek@...e.com>
To: Daniel Vetter <daniel.vetter@...ll.ch>
Cc: LKML <linux-kernel@...r.kernel.org>,
DRI Development <dri-devel@...ts.freedesktop.org>,
Daniel Vetter <daniel.vetter@...el.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Jiri Slaby <jirislaby@...nel.org>,
Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>,
Xuezhi Zhang <zhangxuezhi1@...lpad.com>,
Yangxi Xiang <xyangxi5@...il.com>,
Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>,
nick black <dankamongmen@...il.com>,
Sergey Senozhatsky <senozhatsky@...omium.org>,
Steven Rostedt <rostedt@...dmis.org>,
John Ogness <john.ogness@...utronix.de>,
Sam Ravnborg <sam@...nborg.org>
Subject: Re: [PATCH] tty/vt: Add console_lock check to vt_console_print()
On Tue 2022-08-30 15:28:03, Daniel Vetter wrote:
> I'm scratching my head why we have this printing_lock. Digging through
> historical git trees shows that:
> - Added in 1.1.73, and I found absolutely no reason why.
> - Converted to atomic bitops in 2.1.125pre2, I guess as part of SMP
> enabling/bugfixes.
> - Converted to a proper spinlock in b0940003f25d ("vt: bitlock fix")
> because the hand-rolled atomic version lacked necessary memory
> barriers.
>
> Digging around in lore for that time period did also not shed further
> light.
>
> The only reason I think this might still be relevant today is that (to
> my understanding at least, ymmv) during an oops we might be printing
> without console_lock held. See console_flush_on_panic() and the
> comments in there - we flush out the console buffers irrespective of
> whether we managed to acquire the right locks.
>
> The strange thing is that this reason is fairly recent, because the
> console flushing was historically done without oops_in_progress set.
> This only changed in c7c3f05e341a ("panic: avoid deadlocks in
> re-entrant console drivers"), which removed the call to
> bust_spinlocks(0) (which decrements oops_in_progress again) before
> flushing out the console (which back then was open coded as a
> console_trylock/unlock pair).
>
> Note that this entire mess should be properly fixed in the
> printk/console layer, and not inflicted on each implementation.
>
> For now just document what's going on and check that in all other
> cases callers obey the locking rules.
>
> Signed-off-by: Daniel Vetter <daniel.vetter@...el.com>
> Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
> Cc: Jiri Slaby <jirislaby@...nel.org>
> Cc: "Ilpo Järvinen" <ilpo.jarvinen@...ux.intel.com>
> Cc: Daniel Vetter <daniel.vetter@...ll.ch>
> Cc: Xuezhi Zhang <zhangxuezhi1@...lpad.com>
> Cc: Yangxi Xiang <xyangxi5@...il.com>
> Cc: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
> Cc: nick black <dankamongmen@...il.com>
> Cc: Petr Mladek <pmladek@...e.com>
> Cc: Sergey Senozhatsky <senozhatsky@...omium.org>
> Cc: Steven Rostedt <rostedt@...dmis.org>
> Cc: John Ogness <john.ogness@...utronix.de>
> Cc: Sam Ravnborg <sam@...nborg.org>
> --
> Note that this applies on top of my earlier vt patch:
>
> https://lore.kernel.org/lkml/20220826202419.198535-1-daniel.vetter@ffwll.ch/
>
> Expect more, I'm digging around in here a bit ...
> -Daniel
> ---
> drivers/tty/vt/vt.c | 5 ++++-
> 1 file changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/tty/vt/vt.c b/drivers/tty/vt/vt.c
> index 4d29e4a17db7..54399dcc334e 100644
> --- a/drivers/tty/vt/vt.c
> +++ b/drivers/tty/vt/vt.c
> @@ -3083,7 +3083,10 @@ static void vt_console_print(struct console *co, const char *b, unsigned count)
> ushort start_x, cnt;
> int kmsg_console;
>
> - /* console busy or not yet initialized */
> + if (!oops_in_progress)
> + WARN_CONSOLE_UNLOCKED();
> +
> + /* this protects against concurrent oops only */
> if (!spin_trylock(&printing_lock))
> return;
I am not sure how this was supposed to work. But it reminds me
similar games in other console drivers, see how oops_in_progress
is used.
Typical code looks like:
void serial8250_console_write(struct uart_8250_port *up, const char *s,
unsigned int count)
{
int locked = 1;
if (oops_in_progress)
locked = spin_trylock_irqsave(&port->lock, flags);
else
spin_lock_irqsave(&port->lock, flags);
/* Write the given string to the serial port */
if (locked)
spin_unlock_irqrestore(&port->lock, flags);
}
The logic is actually opposite in compare with vt_console().
Most console drivers allow to re-enter console->write() callback
during Oops or panic().
The "locked" variable is used to prevent double unlock in Oops
message when the system might try to continue working after
the Oops messages are printed.
IMHO, it works this way because there is a high-chance that the serial
console will print the message even when con->write() is called twice
in parallel. The message might be messed but it might be better than
nothing.
I am not sure how vt-code could deal with re-entrance. I guess that
there will be a big risk of deadlocks. It might explain why
printing_lock prevents the re-entrance completely.
Anyway, this explains why it is not solved on the higher level.
Serial consoles actually allow re-entrance. And they need
to handle the port->lock the special way.
The atomic consoles might eventually allow to remove these hacks.
Best Regards,
Petr
Powered by blists - more mailing lists