Received: by 10.223.185.116 with SMTP id b49csp307826wrg; Fri, 2 Mar 2018 19:54:45 -0800 (PST) X-Google-Smtp-Source: AG47ELvYxOeiOxTlVCDLKFhhs61X793WsuJJ9WWL2z4AyEVTvHLymwjKMBqW0dr9QQOHGmr4XCrx X-Received: by 2002:a17:902:aa0b:: with SMTP id be11-v6mr7137505plb.250.1520049285224; Fri, 02 Mar 2018 19:54:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520049285; cv=none; d=google.com; s=arc-20160816; b=A6DJXdKOkggi7b+crDuXk22yy+4tI2MN12yyQw3IDyMk4TGoZ9Ml/f51BrSUr7JDMI PWU8qYfZoOrO+69/aHunKyqnMM5m37cVIrZGHYjjSLQp5lKltHECMt5qHbEqO9dVawdh jaDEyOmuryT3fnERuyKK42fM4JfIvTr6GfTQAp7B4vszN2W44RxUEzQ59uS50Zoij83L wDZLAEyPH6DODO2lftwu9tqcSG97yQ0xEUHMO5dT4S2q9KoKBpKROHMyySRmjeyKTjFm AIMpgOC9mD7evLq3pll4YUeFwTK61aIY0sccWjZVsPN14tbKTUeo/EXCAYxXI/DfGycO 2kUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :spamdiagnosticmetadata:spamdiagnosticoutput:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=k9RBo9q+bm0Fx8LnwlLFD6qT5G7PbIyBR5iD1d6FUoo=; b=wT5Fvh9QOkATptwYsJDGPEkFOxCFLL8fktW4Ld1ld0e7RfscNCvNDajAYpTP8xzLCP o2ElaFwEmwIOLIUQ+wvkYraRmiIT5bxpNqEQgn5Sh07d0gHE403K8Q9aymIzwdDCcA3d VBBDt/Lmo4fcq3whUCaLndNShL2/HRlK+24rCdYgQaGw4qRjrWrmrtgK9ICBEAGC4b3c RfM/0Wy1+vGERHTCyvv68skC+UmayozvdctCtzWP9vZAIYf5mOUD3tU+pO5T1x1zUsmf 1EWB3UrnG+UlaLQDViJbT+57eQ5zgkdkd3RMXDrSg2mJQg1ZQZFcZrfoKZNMgGs71OLc EaSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=Rxi4IzjO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h34-v6si5849177pld.26.2018.03.02.19.54.30; Fri, 02 Mar 2018 19:54:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@microsoft.com header.s=selector1 header.b=Rxi4IzjO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935440AbeCCAU6 (ORCPT + 99 others); Fri, 2 Mar 2018 19:20:58 -0500 Received: from mail-sg2apc01on0106.outbound.protection.outlook.com ([104.47.125.106]:49948 "EHLO APC01-SG2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932890AbeCCAUz (ORCPT ); Fri, 2 Mar 2018 19:20:55 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=k9RBo9q+bm0Fx8LnwlLFD6qT5G7PbIyBR5iD1d6FUoo=; b=Rxi4IzjOExqUEmd3l67yg/ucyxd+Wdwmw8badXxroVJjmBSsHvcglQ6N9G1Fnj055gdT122zegAFiAQqES2qVFc4pmRPBZ8YOOPKkl/gydLFz8nppdhQ4yLIROSxi11oct4R3odeHq+NM41Vuny0BDhk8C06vvhDJYiniK/76nc= Received: from KL1P15301MB0006.APCP153.PROD.OUTLOOK.COM (10.170.167.17) by KL1P15301MB0054.APCP153.PROD.OUTLOOK.COM (10.170.168.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.567.6; Sat, 3 Mar 2018 00:20:47 +0000 Received: from KL1P15301MB0006.APCP153.PROD.OUTLOOK.COM ([10.170.167.17]) by KL1P15301MB0006.APCP153.PROD.OUTLOOK.COM ([10.170.167.17]) with mapi id 15.20.0567.002; Sat, 3 Mar 2018 00:20:47 +0000 From: Dexuan Cui To: "bhelgaas@google.com" , "linux-pci@vger.kernel.org" , KY Srinivasan , Stephen Hemminger CC: "linux-kernel@vger.kernel.org" , "driverdev-devel@linuxdriverproject.org" , Haiyang Zhang , "olaf@aepfle.de" , "apw@canonical.com" , "jasowang@redhat.com" , "vkuznets@redhat.com" , "marcelo.cerri@canonical.com" , Dexuan Cui , Jack Morgenstein , "stable@vger.kernel.org" Subject: [PATCH 2/3] PCI: hv: serialize the present/eject work items Thread-Topic: [PATCH 2/3] PCI: hv: serialize the present/eject work items Thread-Index: AQHTsoV58ygEHWMoYEeyKVqO+bn/hg== Date: Sat, 3 Mar 2018 00:20:46 +0000 Message-ID: <20180303001947.20564-2-decui@microsoft.com> References: <20180303001947.20564-1-decui@microsoft.com> In-Reply-To: <20180303001947.20564-1-decui@microsoft.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.15.1 authentication-results: spf=none (sender IP is ) smtp.mailfrom=decui@microsoft.com; x-originating-ip: [52.168.54.252] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;KL1P15301MB0054;7:wDzumdb6lZ67JknReSiPtUA1miPqv881sYQobViJf0PKUmPqwDcKlKVsCcP3KvmNhyeK4K/hQ63efKX4LW1et0eF8OUQ4kJ6Ps9QUW39X5vkYWmAohTHojOLc08AawsjpBBw1jyaw0hjSI7uPmm1ybR20HfIZkczEV64zF45Wpsy16vMj5SvrGTDrBszh+zSYPFEa+sA66FU34f4toac43RevpJXc8KzEdw2k66f83DUXPnuZQVeZD0payGa6XfL x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR; x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: b436957e-4694-4cd3-441f-08d5809c9c6c x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603307)(7193020);SRVR:KL1P15301MB0054; x-ms-traffictypediagnostic: KL1P15301MB0054: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(9452136761055); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(61425038)(6040501)(2401047)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(3231220)(944501244)(52105095)(6055026)(61426038)(61427038)(6041288)(20161123564045)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011);SRVR:KL1P15301MB0054;BCL:0;PCL:0;RULEID:;SRVR:KL1P15301MB0054; x-forefront-prvs: 0600F93FE1 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(39860400002)(396003)(39380400002)(346002)(366004)(376002)(189003)(199004)(5660300001)(2906002)(4326008)(6116002)(8936002)(86362001)(2501003)(8676002)(6506007)(2900100001)(6436002)(14454004)(3660700001)(86612001)(305945005)(36756003)(99286004)(316002)(97736004)(25786009)(110136005)(1511001)(102836004)(54906003)(81166006)(10090500001)(81156014)(59450400001)(3280700002)(26005)(186003)(77096007)(6512007)(6636002)(76176011)(478600001)(2950100002)(3846002)(1076002)(22452003)(10290500003)(106356001)(66066001)(6486002)(50226002)(7416002)(68736007)(7736002)(105586002)(53936002)(22906009);DIR:OUT;SFP:1102;SCL:1;SRVR:KL1P15301MB0054;H:KL1P15301MB0006.APCP153.PROD.OUTLOOK.COM;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: Mj9aJtiXsvrFx9T2zzJx57+enhmhSUFyZDe6/LUEhK4laVmj/Ut7W/D8tt3C0CgvIk5VG3K282CikeJenqembZN3Qd3cB16zzf66j/tFU/1yV40A5E/HbNATXgp6o7BtRhn8cWmmafFn/BdMZMDB37nzLO0qm+6ya9fGDGcEs1A= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: b436957e-4694-4cd3-441f-08d5809c9c6c X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2018 00:20:46.6174 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: KL1P15301MB0054 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When we hot-remove the device, we first receive a PCI_EJECT message and then receive a PCI_BUS_RELATIONS message with bus_rel->device_count =3D=3D = 0. The first message is offloaded to hv_eject_device_work(), and the second is offloaded to pci_devices_present_work(). Both the paths can be running list_del(&hpdev->list_entry), causing general protection fault, because system_wq can run them concurrently. The patch eliminates the race condition. Signed-off-by: Dexuan Cui Tested-by: Adrian Suhov Tested-by: Chris Valean Cc: Vitaly Kuznetsov Cc: Jack Morgenstein Cc: stable@vger.kernel.org Cc: Stephen Hemminger Cc: K. Y. Srinivasan --- drivers/pci/host/pci-hyperv.c | 19 ++++++++++++++++--- 1 file changed, 16 insertions(+), 3 deletions(-) diff --git a/drivers/pci/host/pci-hyperv.c b/drivers/pci/host/pci-hyperv.c index 1233300f41c6..57b1fb3ebdb9 100644 --- a/drivers/pci/host/pci-hyperv.c +++ b/drivers/pci/host/pci-hyperv.c @@ -461,6 +461,8 @@ struct hv_pcibus_device { struct retarget_msi_interrupt retarget_msi_interrupt_params; =20 spinlock_t retarget_msi_interrupt_lock; + + struct workqueue_struct *wq; }; =20 /* @@ -1770,7 +1772,7 @@ static void hv_pci_devices_present(struct hv_pcibus_d= evice *hbus, spin_unlock_irqrestore(&hbus->device_list_lock, flags); =20 get_hvpcibus(hbus); - schedule_work(&dr_wrk->wrk); + queue_work(hbus->wq, &dr_wrk->wrk); } =20 /** @@ -1848,7 +1850,7 @@ static void hv_pci_eject_device(struct hv_pci_dev *hp= dev) get_pcichild(hpdev, hv_pcidev_ref_pnp); INIT_WORK(&hpdev->wrk, hv_eject_device_work); get_hvpcibus(hpdev->hbus); - schedule_work(&hpdev->wrk); + queue_work(hpdev->hbus->wq, &hpdev->wrk); } =20 /** @@ -2463,11 +2465,17 @@ static int hv_pci_probe(struct hv_device *hdev, spin_lock_init(&hbus->retarget_msi_interrupt_lock); sema_init(&hbus->enum_sem, 1); init_completion(&hbus->remove_event); + hbus->wq =3D alloc_ordered_workqueue("hv_pci_%x", 0, + hbus->sysdata.domain); + if (!hbus->wq) { + ret =3D -ENOMEM; + goto free_bus; + } =20 ret =3D vmbus_open(hdev->channel, pci_ring_size, pci_ring_size, NULL, 0, hv_pci_onchannelcallback, hbus); if (ret) - goto free_bus; + goto destroy_wq; =20 hv_set_drvdata(hdev, hbus); =20 @@ -2536,6 +2544,9 @@ static int hv_pci_probe(struct hv_device *hdev, hv_free_config_window(hbus); close: vmbus_close(hdev->channel); +destroy_wq: + drain_workqueue(hbus->wq); + destroy_workqueue(hbus->wq); free_bus: free_page((unsigned long)hbus); return ret; @@ -2615,6 +2626,8 @@ static int hv_pci_remove(struct hv_device *hdev) irq_domain_free_fwnode(hbus->sysdata.fwnode); put_hvpcibus(hbus); wait_for_completion(&hbus->remove_event); + drain_workqueue(hbus->wq); + destroy_workqueue(hbus->wq); free_page((unsigned long)hbus); return 0; } --=20 2.7.4