Received: by 10.223.185.116 with SMTP id b49csp766829wrg; Fri, 16 Feb 2018 06:56:03 -0800 (PST) X-Google-Smtp-Source: AH8x224Cvkxp6wo6t/QMJeRzTnZlA0rb8V9GnPkBlyQFW1ew32cqLTvlm6TzdlIxtOxa1NF9UJw9 X-Received: by 2002:a17:902:76c4:: with SMTP id j4-v6mr6259925plt.410.1518792963753; Fri, 16 Feb 2018 06:56:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518792963; cv=none; d=google.com; s=arc-20160816; b=KGbWPtBnROaI9n8nHNp5rPzaxYr6rDeN1C0j9qiwcSBzwi3kLn0E1jTFZeWTEE9ixh QSUFDuHyZewbCEZbaR+/AUtXaKiWp8SSgXcLDk0tg7ArVJzSh5tLgzg1pUh00gWUwFNR vAMT4Kg8H8jNVkpqlIr6X/C4NQT8Le8fVZ75mjLY76+LnUJVlbHoxIajo2twRZZmOTH1 EPVCIuVgamvIcsDrYmKH49oiDz9x0ypqdKg8UYRERzF2T9Rh+stzNb4vY/nCXrKq/eAr EAg98loXVfZOFA53X73pn/N9nvLhWp4q2eZBNxjATJELsv2+MLvKvoUOdrQXpWLMA/sL QSTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dmarc-filter:arc-authentication-results; bh=ND5Z6rXjsfDACd0DyN9VL/HdGa2S1fyygiyeGulKSv8=; b=qHkyZkF7SdBnxcklHI4G+S2X6AVsvKUlpT1Xqs/0BcmuVBX5KcwfCBWz3Nf5j16nXU dAk/E5z5bZq2cIOcBCue7MEIs/1VOipBlkxhfD3Xx7qjoTmfUzNVmvjci8/LxdfmLDEq +vP0PeQCZuZBmLX06IqsXU82S2SUXaOl7HSsD7oMy2s3V4MXyX7zU+OMJlN0ItI7PtGF 9aMBQPwJ0xgbpI7dnJ09oL7OHR7lJb/0pfINQj45+YoOUMDW+rK8/LnemF//pdY2CCfi GMl8bp3/fZLHCjpPIueLZUXHQmmOGCBJm9K84e78/dz7cxs6yNhf4g9yej/TIeZm7RVA MSYQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s13si4640722pfk.177.2018.02.16.06.55.49; Fri, 16 Feb 2018 06:56:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1163560AbeBOUHL (ORCPT + 99 others); Thu, 15 Feb 2018 15:07:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:57204 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1162820AbeBOUHJ (ORCPT ); Thu, 15 Feb 2018 15:07:09 -0500 Received: from gandalf.local.home (cpe-172-100-180-131.stny.res.rr.com [172.100.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D3DBF217B6; Thu, 15 Feb 2018 20:07:08 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D3DBF217B6 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=goodmis.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=rostedt@goodmis.org Date: Thu, 15 Feb 2018 15:07:07 -0500 From: Steven Rostedt To: Sebastian Andrzej Siewior Cc: mingo@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, Ingo Molnar Subject: Re: [PATCH 1/2] kernel/sofirq: consolidate common code in __tasklet_schedule() + _hi_ Message-ID: <20180215150707.49cc2332@gandalf.local.home> In-Reply-To: <20180215172042.31573-2-bigeasy@linutronix.de> References: <20180215172042.31573-1-bigeasy@linutronix.de> <20180215172042.31573-2-bigeasy@linutronix.de> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 15 Feb 2018 18:20:41 +0100 Sebastian Andrzej Siewior wrote: > -void __tasklet_schedule(struct tasklet_struct *t) > +static void __tasklet_schedule_common(struct tasklet_struct *t, > + struct tasklet_head *head, > + unsigned int softirq_nr) > { > unsigned long flags; > > local_irq_save(flags); If you look at the original patch, it did not move local_irq_save() into the common function. > t->next = NULL; > - *__this_cpu_read(tasklet_vec.tail) = t; > - __this_cpu_write(tasklet_vec.tail, &(t->next)); > - raise_softirq_irqoff(TASKLET_SOFTIRQ); > + *head->tail = t; > + head->tail = &(t->next); > + raise_softirq_irqoff(softirq_nr); > local_irq_restore(flags); > } > + > +void __tasklet_schedule(struct tasklet_struct *t) > +{ > + __tasklet_schedule_common(t, this_cpu_ptr(&tasklet_vec), What can happen is, we reference (tasklet_vec) on one CPU, get preempted (running in ksoftirqd), scheduled on another CPU, then when inside the common code, we are executing on a different CPU than the tasklet is for. The rasise_softirq() is happening on the wrong CPU. The local_irq_save() can't be moved to the common function. It must be done by each individual function. -- Steve > + TASKLET_SOFTIRQ); > +} > EXPORT_SYMBOL(__tasklet_schedule);