Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1406182pxa; Thu, 13 Aug 2020 07:59:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxA5qWC0KV2fyYlCQ9mHZ2AwYnEeZWp5mKj9OdGG9RtYOHl4HGonrAf8gl83nlmLH6IKguh X-Received: by 2002:a50:ed84:: with SMTP id h4mr5139449edr.278.1597330756313; Thu, 13 Aug 2020 07:59:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597330756; cv=none; d=google.com; s=arc-20160816; b=ygRdcz5OPRQ94XAHDJc/+OIpCf6y/BIV/vdmZXAQVhdJvTXj/4B7y7yg5fUY+B8sjn U/exJEodNP2QGg7AH81vFP0fdrvBGWMG5M3nYRccDmk6RJ1L925QV8pOZvinnO86pYgT irO5w6FYWuy+fkc2TJ0nyc5UE7sjeLMUgPvbcOBlCcEY3z0q8Z4xSL6keNUB7zUlZDTm j5vXKtgC49yLmiXXzohegvaZdO4Yy8AXFyCGYW3EAuiqlxIEE/uPERHHi2iL+gVe3YWK BZEOYLwN1SqxRCTBy6WEe2qF3A0hRlZvFJxM5VIUMPrcsBzCJxwYYvJAViZI3Bb/EFFq C9HQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=gYL+Dvh4IFjxJo1BckVhuvKOoiID+k2Zj/PKkVRCMG8=; b=sgFYb7QhY7IsKetXAKSCSjroH0b0hhs2LV4YMkL8oJnv8Ydjno8uu07gQz0+4IjJ+x MdAlk3rhgZ6yLrsPIblgYJNLQ5nlEYAUhyQCIxJzL4we/gZl7ObR1HcOxySAhpgYxhm5 4CAW7CM3ozAYlzvdKZ3Gg+A0zaZ1DY8YTyw2yFiINur2VEvSL/hndQ1G2CG/ZTGq12I8 Bxpgf3RUR/Ht7DHCMmkSZjKEbVl7sKhmfi65w2nDf+t5QgFThvGQ7gjKujk06aWv8sIc o8k0cwLSWBMsjaffjjOKaP6TuemIJB5X6SgMFi4oWx4z7f0aDorU4YFMOmE0P5pWa95k Oimw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b12si3450284edf.20.2020.08.13.07.58.53; Thu, 13 Aug 2020 07:59:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726694AbgHMO4s (ORCPT + 99 others); Thu, 13 Aug 2020 10:56:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:49752 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726167AbgHMO4r (ORCPT ); Thu, 13 Aug 2020 10:56:47 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 15C2420781; Thu, 13 Aug 2020 14:56:46 +0000 (UTC) Date: Thu, 13 Aug 2020 10:56:44 -0400 From: Steven Rostedt To: Jiafei Pan Cc: "peterz@infradead.org" , "mingo@kernel.org" , "tglx@linutronix.de" , "romain.perier@gmail.com" , "will@kernel.org" , "linux-kernel@vger.kernel.org" , "linux-rt-users@vger.kernel.org" , Leo Li , Vladimir Oltean Subject: Re: [PATCH] softirq: add irq off checking for __raise_softirq_irqoff Message-ID: <20200813105644.1eb6f2cd@oasis.local.home> In-Reply-To: References: <20200806040729.39186-1-Jiafei.Pan@nxp.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 13 Aug 2020 03:03:46 +0000 Jiafei Pan wrote: > Any comments? Thanks. > > @Steven Rostedt, I thinks irq off checking is necessary especially This is probably more for Thomas Gleixner. > for Preempt-RT kernel, because some context may be changed from irq > off to irq on when enable Preempt RT, I once met a issue that hrtimer > soft irq is lost when enabled Preempt RT, finally I found > napi_schedule_irqoff is called in hardware interrupt handler, there > maybe no issue for non RT kernel, but for Preempt RT, interrupt is > threaded, so irq is on in interrupt handler, the result is > __raise_softirq_irqoff is called in irq on context, so that per-CPU > softirq masking is corrupted because of the process of updating of > soft irq masking is interrupted and not a atomic operation , and then > caused hrtimer soft irq is lost. So I think adding irq status > checking in __raise_softirq_irqoff can report such issue directly and > help us to find the root cause of such issue. > > I know that there may be performance impaction to add extra checking > here, if it is the case, how about to include it in some debug > configuration items? Such as CONFIG_DEBUG_PREEMPT or other debug > items? > > Best Regards, > Jiafei. > > -----Original Message----- > From: Jiafei Pan > Sent: Thursday, August 6, 2020 12:07 PM > To: peterz@infradead.org; mingo@kernel.org; tglx@linutronix.de; rostedt@goodmis.org; romain.perier@gmail.com; will@kernel.org > Cc: linux-kernel@vger.kernel.org; linux-rt-users@vger.kernel.org; Jiafei Pan ; Leo Li ; Vladimir Oltean ; Jiafei Pan > Subject: [PATCH] softirq: add irq off checking for __raise_softirq_irqoff > > __raise_softirq_irqoff will update per-CPU mask of pending softirqs, it need to be called in irq disabled context in order to keep it atomic operation, otherwise it will be interrupted by hardware interrupt, and per-CPU softirqs pending mask will be corrupted, the result is there will be unexpected issue, for example hrtimer soft irq will be losed and soft hrtimer will never be expire and handled. Please wrap your change logs. > > Adding irqs disabled checking here to provide warning in irqs enabled context. > > Signed-off-by: Jiafei Pan > --- > kernel/softirq.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/kernel/softirq.c b/kernel/softirq.c index bf88d7f62433..11f61e54a3ae 100644 > --- a/kernel/softirq.c > +++ b/kernel/softirq.c > @@ -481,6 +481,11 @@ void raise_softirq(unsigned int nr) > > void __raise_softirq_irqoff(unsigned int nr) { > + /* This function can only be called in irq disabled context, > + * otherwise or_softirq_pending will be interrupted by hardware > + * interrupt, so that there will be unexpected issue. > + */ > + WARN_ON_ONCE(!irqs_disabled()); Perhaps: lockdep_assert_irqs_disabled() is more appropriate, and doesn't add extra overhead on production systems. -- Steve > trace_softirq_raise(nr); > or_softirq_pending(1UL << nr); > } > -- > 2.17.1