Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1248013imm; Fri, 29 Jun 2018 14:19:01 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdok+AEuYNfJes+nJD95heCzmiXiV4jedmSwEZRCbogk1fo/Dd5kO9Qwy+p3CyMlOuZXA7+ X-Received: by 2002:a17:902:9695:: with SMTP id n21-v6mr3583755plp.6.1530307141920; Fri, 29 Jun 2018 14:19:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530307141; cv=none; d=google.com; s=arc-20160816; b=HqcB/Gk0IirCEGD8fx4I0Tx+heTMzMdsbrpXBA8/3NPSG4zOjplJo6U79UF5GZ8eLl SxDhwCZffCs/G91F2Du8lkFuTZpjcSI0r+KC3NrluipLEY5YhIXDvw46fH5pbwO0ADcC tMSPdzb5OOHROMd7ArGr/cv/TUIaRIeb9DFLjwKCWFAakyOzJA76eSJrdCSg4oPoKYWD YFf97k1ov4i1h4n1Sl7Q9vR18iMaRwU03jMhQCrCjg15JUHNdm3peeD2YycAdAfjP4D6 +W9CzxLVJ+11TALCmeHbIRHiMKcnmsWO+ChoWrexlnp6b6PzRm686BgY8lPp5b9tanGQ 0DIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dmarc-filter:dkim-signature:dkim-signature :arc-authentication-results; bh=64TGocef+UyWhR6eiOBdZyvd3X90Z6IqTeFrH/9oohw=; b=Iq8gUcyBX6B5eeSuVkv0LRTX9+b2g9C/OQwZ3fmZ4f37101uNG5DoucoCiKIaguauL 2P8l26/HTr6D030xaWk5gT+qxbcvY8gqO51smIVh6azez07E0/T2I1tiYd5L5XhFMJ3C 7dDU7lft4pHwrrCea0Lg9kUyD1NrRb6Cd/Pnlfre37B+37MCDJGiR2U3HNEDHvlG0LB/ wttBUp0NCeM+GDSi9eSj/f249mHaNfDq+O0Aeouf5Ty5crQp14BvqDfDNprN8tEuIOMc VwKCBJpTeSWHQL2qll0kw8i0inOfyMrKX8WMqxBcvLLb5cVgmD72pGbAg8OmTiJXAogM taLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b="V/2PE+cQ"; dkim=pass header.i=@codeaurora.org header.s=default header.b=XEzIOVFx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d4-v6si4663333pla.81.2018.06.29.14.18.47; Fri, 29 Jun 2018 14:19:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b="V/2PE+cQ"; dkim=pass header.i=@codeaurora.org header.s=default header.b=XEzIOVFx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964850AbeF2Uzr (ORCPT + 99 others); Fri, 29 Jun 2018 16:55:47 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:36628 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935367AbeF2Uzq (ORCPT ); Fri, 29 Jun 2018 16:55:46 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 68E3A606FC; Fri, 29 Jun 2018 20:55:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1530305745; bh=gA/kPjPELSX2SceOdc5Ath9eFmCbah6z1PbNCGTfPuU=; h=From:To:Cc:Subject:Date:From; b=V/2PE+cQ1X2UlV8DkIpJ2gSsB3hcydrO1LhEOvyMMCfch0QcZxigHvCB6WktDi8Ab nsbwRINhcmS7RrQRJydN9KHU4/QfzDjofpiEIwgxWI+hrtTonnhtu6s9upqIiKfZUA m1C01RZ/UCB1D3Ts7/vqqN7wrxkpJrOe7xkLTA7I= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from isaacm-linux.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: isaacm@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 4C2BD6031A; Fri, 29 Jun 2018 20:55:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1530305744; bh=gA/kPjPELSX2SceOdc5Ath9eFmCbah6z1PbNCGTfPuU=; h=From:To:Cc:Subject:Date:From; b=XEzIOVFx/fMOvOEmhSre5UTtV6iRDx+V4WZniS/rff2YhSdJM3a6vbiJFXEc4WpIB 82SIIEeybEnCvEam+GiX6zbmmt0rvnERk/W1Lvypx2CD67XjEix1NO3RyEZ8+T5tGI iK65cYozyyIMbq+7mCrOg3JodaotOHj9hhaqMIHs= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 4C2BD6031A Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=isaacm@codeaurora.org From: "Isaac J. Manjarres" To: peterz@infradead.org, matt@codeblueprint.co.uk, mingo@kernel.org, tglx@linutronix.de, bigeasy@linutronix.de Cc: "Isaac J. Manjarres" , linux-kernel@vger.kernel.org, psodagud@codeaurora.org, pkondeti@codeaurora.org Subject: [PATCH v2] stop_machine: Disable preemption when waking two stopper threads Date: Fri, 29 Jun 2018 13:55:12 -0700 Message-Id: <1530305712-16416-1-git-send-email-isaacm@codeaurora.org> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When cpu_stop_queue_two_works() begins to wake the stopper threads, it does so without preemption disabled, which leads to the following race condition: The source CPU calls cpu_stop_queue_two_works(), with cpu1 as the source CPU, and cpu2 as the destination CPU. When adding the stopper threads to the wake queue used in this function, the source CPU stopper thread is added first, and the destination CPU stopper thread is added last. When wake_up_q() is invoked to wake the stopper threads, the threads are woken up in the order that they are queued in, so the source CPU's stopper thread is woken up first, and it preempts the thread running on the source CPU. The stopper thread will then execute on the source CPU, disable preemption, and begin executing multi_cpu_stop(), and wait for an ack from the destination CPU's stopper thread, with preemption still disabled. Since the worker thread that woke up the stopper thread on the source CPU is affine to the source CPU, and preemption is disabled on the source CPU, that thread will never run to dequeue the destination CPU's stopper thread from the wake queue, and thus, the destination CPU's stopper thread will never run, causing the source CPU's stopper thread to wait forever, and stall. Disable preemption when waking the stopper threads in cpu_stop_queue_two_works() to ensure that the worker thread that is waking up the stopper threads isn't preempted by the source CPU's stopper thread, and permanently scheduled out, leaving the remaining stopper thread asleep in the wake queue. Co-developed-by: Pavankumar Kondeti Signed-off-by: Prasad Sodagudi Signed-off-by: Pavankumar Kondeti Signed-off-by: Isaac J. Manjarres --- kernel/stop_machine.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/kernel/stop_machine.c b/kernel/stop_machine.c index f89014a..1ff523d 100644 --- a/kernel/stop_machine.c +++ b/kernel/stop_machine.c @@ -270,7 +270,11 @@ static int cpu_stop_queue_two_works(int cpu1, struct cpu_stop_work *work1, goto retry; } - wake_up_q(&wakeq); + if (!err) { + preempt_disable(); + wake_up_q(&wakeq); + preempt_enable(); + } return err; } -- The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project