Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp231208pxb; Tue, 15 Feb 2022 12:02:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJxYuZXJPLj4UxVUMmXN66TnlDKN3sl8KCaypWOgZyE82jrXjAYEYWO7f2OdwHwDX6juEIDL X-Received: by 2002:a05:6a00:134b:: with SMTP id k11mr533151pfu.33.1644955338786; Tue, 15 Feb 2022 12:02:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644955338; cv=none; d=google.com; s=arc-20160816; b=mCuAcSgyVspAZx7kC+3jtaX3NaZ9FldfgeD+M25ceLaoxygehKQfg7A8aGcrX9T83R 0ERYZa1eKAtfCuHlvDac+KNVwZ+4efcCQpMxj/CgejfgXYW6SUikcA7Tb6EVvIGboTwV LoV9vz/ZIO1A30NkQH4lAeCa9IqtzjZDtxk1hmzU5vC7x+/UHjBmjtVC4PQF3velR4X6 5FIbkk/meGuNIc3W6v7jynMzZIc8U55dUHTN7cKosvfwVS/Dw9YIsOuuant8DLMYoToG cO/FMpgSctlM+oJtMM2KB9YoMBc35EArJIMS1DoKTuJB5FizI0FSRyskW/iuNh45y9B0 CpBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=WZN1dAhEe79YgFZ+7UuVO8XKxS0q0BYmFGxZknW1qdc=; b=E0fdxYk6l2Y+VeltTOuTjWW4VWhmx/1Cgw3K6VZPBYXGOgutOGLJ5G+dBaTEGYtBri 7slTSlzUgDU7cFzWjvsaYsk2fAWvHWIjS3DWExeZPDfRdqTp0TzP9JRfCD0ux2wl9+Iw lf7N3iPZO6A90t7XwZU76d5CVB6FAYCaJVMcyQ9Sxc2Ha26IV+Y3JXxCZP+3FnJYCZiM 8cjpRYOrUIYJuvbcGrNQ3t8Kv2xiUC4oun8KuE5Mp5yaBkFEZDQTjMqr2D+ZpajoIFq7 JuLMsYyv3AGMDlOqu8BX1Kl7VmL9vWujgWaQqN+BnYsYfZcBpqWvChepq2f1cpw+nUfe JPCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y14si7625338plh.200.2022.02.15.12.02.02; Tue, 15 Feb 2022 12:02:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235570AbiBOMt3 (ORCPT + 99 others); Tue, 15 Feb 2022 07:49:29 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:51612 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229665AbiBOMt2 (ORCPT ); Tue, 15 Feb 2022 07:49:28 -0500 Received: from www262.sakura.ne.jp (www262.sakura.ne.jp [202.181.97.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B228D28E27; Tue, 15 Feb 2022 04:49:18 -0800 (PST) Received: from fsav117.sakura.ne.jp (fsav117.sakura.ne.jp [27.133.134.244]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 21FCn2cr076466; Tue, 15 Feb 2022 21:49:02 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav117.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav117.sakura.ne.jp); Tue, 15 Feb 2022 21:49:02 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav117.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 21FCn233076461 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Tue, 15 Feb 2022 21:49:02 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Message-ID: Date: Tue, 15 Feb 2022 21:48:58 +0900 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.0 Subject: Re: [syzbot] possible deadlock in worker_thread Content-Language: en-US To: Haakon Bugge Cc: Tejun Heo , Bart Van Assche , syzbot , Jason Gunthorpe , LKML , OFED mailing list , "syzkaller-bugs@googlegroups.com" , Lai Jiangshan References: <0000000000005975a605d7aef05e@google.com> <8ea57ddf-a09c-43f2-4285-4dfb908ad967@acm.org> <71d6f14e-46af-cc5a-bc70-af1cdc6de8d5@acm.org> <309c86b7-2a4c-1332-585f-7bcd59cfd762@I-love.SAKURA.ne.jp> <2959649d-cfbc-bdf2-02ac-053b8e7af030@I-love.SAKURA.ne.jp> <8ebd003c-f748-69b4-3a4f-fb80a3f39d36@I-love.SAKURA.ne.jp> <76616D2F-14F2-4D83-9DB4-576FB2ACB72C@oracle.com> From: Tetsuo Handa In-Reply-To: <76616D2F-14F2-4D83-9DB4-576FB2ACB72C@oracle.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/02/15 19:43, Haakon Bugge wrote: >> @@ -6070,6 +6087,13 @@ void __init workqueue_init_early(void) >> !system_unbound_wq || !system_freezable_wq || >> !system_power_efficient_wq || >> !system_freezable_power_efficient_wq); >> + system_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_highpri_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_long_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_unbound_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_freezable_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_power_efficient_wq->flags |= __WQ_SYSTEM_WIDE; >> + system_freezable_power_efficient_wq->flags |= __WQ_SYSTEM_WIDE; > > Better to OR this in, in the alloc_workqueue() call? Perceive the notion of an opaque object? > I do not want to do like - system_wq = alloc_workqueue("events", 0, 0); + system_wq = alloc_workqueue("events", __WQ_SYSTEM_WIDE, 0); because the intent of this change is to ask developers to create their own WQs. If I pass __WQ_SYSTEM_WIDE to alloc_workqueue(), developers might by error create like srp_tl_err_wq = alloc_workqueue("srp_tl_err_wq", __WQ_SYSTEM_WIDE, 0); because of system_wq = alloc_workqueue("events", __WQ_SYSTEM_WIDE, 0); line. The __WQ_SYSTEM_WIDE is absolutely meant to be applied to only 'system_wq', 'system_highpri_wq', 'system_long_wq', 'system_unbound_wq', 'system_freezable_wq', 'system_power_efficient_wq' and 'system_freezable_power_efficient_wq' WQs, in order to avoid calling flush_workqueue() on these system-wide WQs. I wish I could define __WQ_SYSTEM_WIDE inside kernel/workqueue_internal.h, but it seems that kernel/workqueue_internal.h does not define internal flags.