Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp709128ybv; Thu, 13 Feb 2020 08:07:56 -0800 (PST) X-Google-Smtp-Source: APXvYqwE8ByZzHs+AOju0ezh2MUKBasLDahAjIztZio1uBWSbHpaBTyocI34ku6LYKuwT1bEHlvA X-Received: by 2002:a05:6808:b23:: with SMTP id t3mr3485394oij.88.1581610076352; Thu, 13 Feb 2020 08:07:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581610076; cv=none; d=google.com; s=arc-20160816; b=aO1uVjKEpMOuNn+64+NYOijRo949X9acGB7NcD6Ys9t5WWrDjEmNp8ZAlk7XYmtYuy 1dmS5rTD4qQ+cWq+ZsrshbPVUXeVgguFU+E+k/yS80GD6crQrkwGAxJE2zBdeAX5048J SoeQiRWLASlmYO13Ft2YmvIsTUcSicS9WbMge3pm24ytEI46hzZRzm26JY3HbdC60DeJ HG20IyMbuss+ytTAfCYP7JLqpNY9FSSgcPzUVHVD9FbgzSx89bwKu781J44o6q3ffBLC WHS7LQhRCPAVfFD4GbBK/P0/AaYk8PySAGFLK+V+lb6nLv8pETIEdpcQaxcO7j7F7gDK gTvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NMXR4HsT5cb4yDGxXTDTUXl56qiDXDufUUWjA7NkRTQ=; b=kaAQ5HC3frOgh6wlhZn8BkPdcnR/q9ehn1XYYLYoNbV/NQTVfWJzVx5mOoD+QKjMnB yp2IrrbY/RCaRGwulKA8PmdUDbXQWHeUeT/Llv81xDkXDBCrTHhVngi+pXxgswnmevFi Fu3ojH7auw2k+jaXtqNOiXp6+kHEb7p6sSwXCkiknYs+JMgf8yrhcEWw086i+kwIok5q rM2XyguRRqvshDvEMto/Zw3c2sBP9V0Te3bb6+Z+AjZhfnC7Kwr3P+Yqqwi9RT8vhH3n gPl1dhFPoEUcVXVOocD2PytPXlNBuJ6KTxkfkJLv4+kZBEHXDBowrkDpuSXCkTWjJvSf Vr6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2iRNThiq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d19si1252707ote.3.2020.02.13.08.07.38; Thu, 13 Feb 2020 08:07:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2iRNThiq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730408AbgBMQGs (ORCPT + 99 others); Thu, 13 Feb 2020 11:06:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:34762 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728415AbgBMPXd (ORCPT ); Thu, 13 Feb 2020 10:23:33 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 918CA24699; Thu, 13 Feb 2020 15:23:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607412; bh=i51N5vsJGfbRUtDCnYlXm5BfBaOKh4rrwDhVWr/Xjdg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2iRNThiqifqKJsmiuONBBig9/TZ2q6d+yWUPk/vM8iXrAqBg9FquY9aR0QAoWo4rl h/vmJ7xrS9iwTJRUbmtr7U/yFHft2OGsJtpJBdF1x3leiIxaH5d41OWedOTrksg3Mo o3Kez9YXknfr92fFg5IqJtbwNtIUYwqHId25VUG0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Herbert Xu , Daniel Jordan , Sasha Levin Subject: [PATCH 4.9 035/116] padata: Remove broken queue flushing Date: Thu, 13 Feb 2020 07:19:39 -0800 Message-Id: <20200213151856.812892483@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Herbert Xu [ Upstream commit 07928d9bfc81640bab36f5190e8725894d93b659 ] The function padata_flush_queues is fundamentally broken because it cannot force padata users to complete the request that is underway. IOW padata has to passively wait for the completion of any outstanding work. As it stands flushing is used in two places. Its use in padata_stop is simply unnecessary because nothing depends on the queues to be flushed afterwards. The other use in padata_replace is more substantial as we depend on it to free the old pd structure. This patch instead uses the pd->refcnt to dynamically free the pd structure once all requests are complete. Fixes: 2b73b07ab8a4 ("padata: Flush the padata queues actively") Cc: Signed-off-by: Herbert Xu Reviewed-by: Daniel Jordan Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- kernel/padata.c | 46 ++++++++++++---------------------------------- 1 file changed, 12 insertions(+), 34 deletions(-) diff --git a/kernel/padata.c b/kernel/padata.c index 63449fc584daf..9ba611b42abac 100644 --- a/kernel/padata.c +++ b/kernel/padata.c @@ -34,6 +34,8 @@ #define MAX_OBJ_NUM 1000 +static void padata_free_pd(struct parallel_data *pd); + static int padata_index_to_cpu(struct parallel_data *pd, int cpu_index) { int cpu, target_cpu; @@ -301,6 +303,7 @@ static void padata_serial_worker(struct work_struct *serial_work) struct padata_serial_queue *squeue; struct parallel_data *pd; LIST_HEAD(local_list); + int cnt; local_bh_disable(); squeue = container_of(serial_work, struct padata_serial_queue, work); @@ -310,6 +313,8 @@ static void padata_serial_worker(struct work_struct *serial_work) list_replace_init(&squeue->serial.list, &local_list); spin_unlock(&squeue->serial.lock); + cnt = 0; + while (!list_empty(&local_list)) { struct padata_priv *padata; @@ -319,9 +324,12 @@ static void padata_serial_worker(struct work_struct *serial_work) list_del_init(&padata->list); padata->serial(padata); - atomic_dec(&pd->refcnt); + cnt++; } local_bh_enable(); + + if (atomic_sub_and_test(cnt, &pd->refcnt)) + padata_free_pd(pd); } /** @@ -444,8 +452,7 @@ static struct parallel_data *padata_alloc_pd(struct padata_instance *pinst, setup_timer(&pd->timer, padata_reorder_timer, (unsigned long)pd); atomic_set(&pd->seq_nr, -1); atomic_set(&pd->reorder_objects, 0); - atomic_set(&pd->refcnt, 0); - pd->pinst = pinst; + atomic_set(&pd->refcnt, 1); spin_lock_init(&pd->lock); return pd; @@ -469,31 +476,6 @@ static void padata_free_pd(struct parallel_data *pd) kfree(pd); } -/* Flush all objects out of the padata queues. */ -static void padata_flush_queues(struct parallel_data *pd) -{ - int cpu; - struct padata_parallel_queue *pqueue; - struct padata_serial_queue *squeue; - - for_each_cpu(cpu, pd->cpumask.pcpu) { - pqueue = per_cpu_ptr(pd->pqueue, cpu); - flush_work(&pqueue->work); - } - - del_timer_sync(&pd->timer); - - if (atomic_read(&pd->reorder_objects)) - padata_reorder(pd); - - for_each_cpu(cpu, pd->cpumask.cbcpu) { - squeue = per_cpu_ptr(pd->squeue, cpu); - flush_work(&squeue->work); - } - - BUG_ON(atomic_read(&pd->refcnt) != 0); -} - static void __padata_start(struct padata_instance *pinst) { pinst->flags |= PADATA_INIT; @@ -507,10 +489,6 @@ static void __padata_stop(struct padata_instance *pinst) pinst->flags &= ~PADATA_INIT; synchronize_rcu(); - - get_online_cpus(); - padata_flush_queues(pinst->pd); - put_online_cpus(); } /* Replace the internal control structure with a new one. */ @@ -531,8 +509,8 @@ static void padata_replace(struct padata_instance *pinst, if (!cpumask_equal(pd_old->cpumask.cbcpu, pd_new->cpumask.cbcpu)) notification_mask |= PADATA_CPU_SERIAL; - padata_flush_queues(pd_old); - padata_free_pd(pd_old); + if (atomic_dec_and_test(&pd_old->refcnt)) + padata_free_pd(pd_old); if (notification_mask) blocking_notifier_call_chain(&pinst->cpumask_change_notifier, -- 2.20.1