Received: by 10.223.176.5 with SMTP id f5csp3439173wra; Mon, 29 Jan 2018 13:11:38 -0800 (PST) X-Google-Smtp-Source: AH8x225IopEt/9LRGnMi9/MpUGtmdmprtjxG4mnMavBBIzXn9YF0arcVEStA43TS24lSzFixpjUn X-Received: by 10.99.113.67 with SMTP id b3mr18426225pgn.134.1517260298151; Mon, 29 Jan 2018 13:11:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517260298; cv=none; d=google.com; s=arc-20160816; b=XOj6GSJp6cHyT6Kn/xq1PsA4jDmXpsq59ZZssAmVosLvfxRyFQKwpW8emBAgOjqyBG fmvkkm8OFsBnaIlUv+A1fq0Z9G9C6961WRU1qxbSTFDKZHlbJ+2/c07HRTnuzy3TKI3H +Swe2rEii3hZq5mGsEPbVa5Tk9lWthKcFmsq+ZxBWG+y7urWvxpayaH13ZE5jarqNJRk 1L1F5CK4hXpKACeI8+1BUPK/nA+2tMr3IUfHvTXWIMqcDQBMsEg0g8QaC43ltL7ShePM Hwn3ZIiegha86tY8caWgj4VJN6a95p/B1iHL33E6U3IGgUxyq72wWykw8pREnPAdE40C oT4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=NxVrdJrwDJr91GD5Hs7ibZFUWL0MwydvSnciWWMsMX4=; b=DapimLs52KENIhsIsuZtqtaewDYnUaH5bOmpXllQXsVKdM7+IB/PzeutrAanD8+pgH w3svHPNeHgLr6Tj37ilxLF4IgCqR7vY80lEIXvB5/0lqec/E2YKMeAlYJnQwUystkPwg 1kZz19bM1SjxN6k2sKpEmUT/R6FHQmkW30V4i/gu7lVuXotSNN2LcF5LGr4+6alxFLce RULcKcmWjChK94AJKzRHjsm0Ye5TCUPCVXwcnPm8gEHClqUfaH9Auuz5btr5T+/pSpV0 vGgO8JvrTig+K8a7ztdL47X9hUHCNlxUvFU540Y1YiIwNPU+Mmc40QwnqBhhBFMHwrvG n+4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p5si99118pgn.197.2018.01.29.13.11.23; Mon, 29 Jan 2018 13:11:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752309AbeA2VJr (ORCPT + 99 others); Mon, 29 Jan 2018 16:09:47 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:47996 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752565AbeA2UGW (ORCPT ); Mon, 29 Jan 2018 15:06:22 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 279563034; Mon, 29 Jan 2018 13:10:37 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Paul E. McKenney" , Thomas Gleixner , Peter Zijlstra , Sebastian Sewior , Anna-Maria Gleixner Subject: [PATCH 4.14 64/71] hrtimer: Reset hrtimer cpu base proper on CPU hotplug Date: Mon, 29 Jan 2018 13:57:32 +0100 Message-Id: <20180129123831.898060947@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123827.271171825@linuxfoundation.org> References: <20180129123827.271171825@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit d5421ea43d30701e03cadc56a38854c36a8b4433 upstream. The hrtimer interrupt code contains a hang detection and mitigation mechanism, which prevents that a long delayed hrtimer interrupt causes a continous retriggering of interrupts which prevent the system from making progress. If a hang is detected then the timer hardware is programmed with a certain delay into the future and a flag is set in the hrtimer cpu base which prevents newly enqueued timers from reprogramming the timer hardware prior to the chosen delay. The subsequent hrtimer interrupt after the delay clears the flag and resumes normal operation. If such a hang happens in the last hrtimer interrupt before a CPU is unplugged then the hang_detected flag is set and stays that way when the CPU is plugged in again. At that point the timer hardware is not armed and it cannot be armed because the hang_detected flag is still active, so nothing clears that flag. As a consequence the CPU does not receive hrtimer interrupts and no timers expire on that CPU which results in RCU stalls and other malfunctions. Clear the flag along with some other less critical members of the hrtimer cpu base to ensure starting from a clean state when a CPU is plugged in. Thanks to Paul, Sebastian and Anna-Maria for their help to get down to the root cause of that hard to reproduce heisenbug. Once understood it's trivial and certainly justifies a brown paperbag. Fixes: 41d2e4949377 ("hrtimer: Tune hrtimer_interrupt hang logic") Reported-by: Paul E. McKenney Signed-off-by: Thomas Gleixner Cc: Peter Zijlstra Cc: Sebastian Sewior Cc: Anna-Maria Gleixner Link: https://lkml.kernel.org/r/alpine.DEB.2.20.1801261447590.2067@nanos Signed-off-by: Greg Kroah-Hartman --- kernel/time/hrtimer.c | 3 +++ 1 file changed, 3 insertions(+) --- a/kernel/time/hrtimer.c +++ b/kernel/time/hrtimer.c @@ -655,7 +655,9 @@ static void hrtimer_reprogram(struct hrt static inline void hrtimer_init_hres(struct hrtimer_cpu_base *base) { base->expires_next = KTIME_MAX; + base->hang_detected = 0; base->hres_active = 0; + base->next_timer = NULL; } /* @@ -1591,6 +1593,7 @@ int hrtimers_prepare_cpu(unsigned int cp timerqueue_init_head(&cpu_base->clock_base[i].active); } + cpu_base->active_bases = 0; cpu_base->cpu = cpu; hrtimer_init_hres(cpu_base); return 0;