Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3526314pxf; Mon, 15 Mar 2021 11:31:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7mlrn51cyZcFB3aTt1iucsmRvdXu33WNtzyUoS8jsVxj0E/+18ERSrWxW3JDEBUlMXR0p X-Received: by 2002:aa7:d54c:: with SMTP id u12mr32659820edr.234.1615833068818; Mon, 15 Mar 2021 11:31:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615833068; cv=none; d=google.com; s=arc-20160816; b=xgVMevA1CfbqABijHHMektLALpOI4FSxU6TATtKCgfeCvYIKiUWIw2hqBDLzD3p3RB VPxpmSiFtCq/VkBgsOuTfWfUvXg0zyUt2CQaMfe+Xgz0cbwBp3jqU3U/X/yj3wKA/Bjf xmWKZRgalA0GnBXDrp0Gvlyy10WTvmJZ11yUAONCq/2uXAbAyZ01lqkUVcGrcaohE57H wv/OgxtpoeBCrfZs4k4qv4nNMh3rs14zlQ/jyMJyfdmB6OjvFLRjvHsJ00g537EHnE5q eU80CTqmSjjg1dC9WxJOQkIHrEtloHJ9otg62gB/jrXYTOXJrCqvGNAssFZxnwtokIN0 nAkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=REsCMLlgMXo8RkNbCo3CjI3VXh6Ih8n/lbW+xK59b1U=; b=Xb7i0m2+f3alfK/mz8svZUYH1aQ55jA9XbkLAa8jh+aRY4PkGtS6GAweVlj6IHCYVu +hfnho5TpAWr3TDiJpdhlUZpnp2kCwaN7nSjmiNNccTdW7BFOYOozAko+r7AVADdOlHV TBJCjQMyBARTReWkaJjSDHzZJ4aZ+f8uHwnsxT1rfQAiDqSW1eL0Un8VFJrsP3zIIeWb +2hEI0uMtZCw3brrCz3Uf2EK7QzT+Bgp0X3XArJYVeJ2BGGVj0Nz88N1NHLiqLwRONQU tpFCbMgwpdxLWhmfvpooBuS5dxbB3FIcYaUWOoWsPxtnxLXqOHEe06lXWTIDdSaRdrMk wZtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0rVM9leC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u25si10948208edo.148.2021.03.15.11.30.45; Mon, 15 Mar 2021 11:31:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0rVM9leC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240567AbhCOOiH (ORCPT + 99 others); Mon, 15 Mar 2021 10:38:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:36622 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233298AbhCOOBW (ORCPT ); Mon, 15 Mar 2021 10:01:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 053EE64E89; Mon, 15 Mar 2021 14:00:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615816840; bh=HxQmE0RP0LzC8UMxFs5pgAUqlRaAFNSF8+QAirZSGeo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0rVM9leCwbZdtNlChMTwNe+OBXWWWMTLTbNiPNRnyyyEO0XS+s8aLhULhBqVdIPEm 8Pd923PijMDh/wtS9alVOJEOceP9ckZNHIHCN80NVE6C0o+XaoqY4iruRyNQexkPdM 8DElCtdyhk5Pm1ecapNw3ITUY7RQAcnhK9X1z56c= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Julien Grall , Juergen Gross , Julien Grall , Boris Ostrovsky Subject: [PATCH 4.14 95/95] xen/events: avoid handling the same event on two cpus at the same time Date: Mon, 15 Mar 2021 14:58:05 +0100 Message-Id: <20210315135743.403598567@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210315135740.245494252@linuxfoundation.org> References: <20210315135740.245494252@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Juergen Gross commit b6622798bc50b625a1e62f82c7190df40c1f5b21 upstream. When changing the cpu affinity of an event it can happen today that (with some unlucky timing) the same event will be handled on the old and the new cpu at the same time. Avoid that by adding an "event active" flag to the per-event data and call the handler only if this flag isn't set. Cc: stable@vger.kernel.org Reported-by: Julien Grall Signed-off-by: Juergen Gross Reviewed-by: Julien Grall Link: https://lore.kernel.org/r/20210306161833.4552-4-jgross@suse.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- drivers/xen/events/events_base.c | 25 +++++++++++++++++-------- drivers/xen/events/events_internal.h | 1 + 2 files changed, 18 insertions(+), 8 deletions(-) --- a/drivers/xen/events/events_base.c +++ b/drivers/xen/events/events_base.c @@ -693,6 +693,12 @@ static void xen_evtchn_close(unsigned in BUG(); } +static void event_handler_exit(struct irq_info *info) +{ + smp_store_release(&info->is_active, 0); + clear_evtchn(info->evtchn); +} + static void pirq_query_unmask(int irq) { struct physdev_irq_status_query irq_status; @@ -723,13 +729,13 @@ static void eoi_pirq(struct irq_data *da likely(!irqd_irq_disabled(data))) { do_mask(info, EVT_MASK_REASON_TEMPORARY); - clear_evtchn(evtchn); + event_handler_exit(info); irq_move_masked_irq(data); do_unmask(info, EVT_MASK_REASON_TEMPORARY); } else - clear_evtchn(evtchn); + event_handler_exit(info); if (pirq_needs_eoi(data->irq)) { rc = HYPERVISOR_physdev_op(PHYSDEVOP_eoi, &eoi); @@ -1565,6 +1571,8 @@ void handle_irq_for_port(evtchn_port_t p } info = info_for_irq(irq); + if (xchg_acquire(&info->is_active, 1)) + return; if (ctrl->defer_eoi) { info->eoi_cpu = smp_processor_id(); @@ -1752,13 +1760,13 @@ static void ack_dynirq(struct irq_data * likely(!irqd_irq_disabled(data))) { do_mask(info, EVT_MASK_REASON_TEMPORARY); - clear_evtchn(evtchn); + event_handler_exit(info); irq_move_masked_irq(data); do_unmask(info, EVT_MASK_REASON_TEMPORARY); } else - clear_evtchn(evtchn); + event_handler_exit(info); } static void mask_ack_dynirq(struct irq_data *data) @@ -1774,7 +1782,7 @@ static void lateeoi_ack_dynirq(struct ir if (VALID_EVTCHN(evtchn)) { do_mask(info, EVT_MASK_REASON_EOI_PENDING); - clear_evtchn(evtchn); + event_handler_exit(info); } } @@ -1785,7 +1793,7 @@ static void lateeoi_mask_ack_dynirq(stru if (VALID_EVTCHN(evtchn)) { do_mask(info, EVT_MASK_REASON_EXPLICIT); - clear_evtchn(evtchn); + event_handler_exit(info); } } @@ -1894,10 +1902,11 @@ static void restore_cpu_ipis(unsigned in /* Clear an irq's pending state, in preparation for polling on it */ void xen_clear_irq_pending(int irq) { - int evtchn = evtchn_from_irq(irq); + struct irq_info *info = info_for_irq(irq); + evtchn_port_t evtchn = info ? info->evtchn : 0; if (VALID_EVTCHN(evtchn)) - clear_evtchn(evtchn); + event_handler_exit(info); } EXPORT_SYMBOL(xen_clear_irq_pending); void xen_set_irq_pending(int irq) --- a/drivers/xen/events/events_internal.h +++ b/drivers/xen/events/events_internal.h @@ -40,6 +40,7 @@ struct irq_info { #define EVT_MASK_REASON_EXPLICIT 0x01 #define EVT_MASK_REASON_TEMPORARY 0x02 #define EVT_MASK_REASON_EOI_PENDING 0x04 + u8 is_active; /* Is event just being handled? */ unsigned irq; unsigned int evtchn; /* event channel */ unsigned short cpu; /* cpu bound */