Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp1361145rdh; Fri, 27 Oct 2023 11:48:07 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFSoZ4a/38kZJm3xOSCENaiiZjPqa1fXtRllDJ5giceGfSjdPzKiMKJwh3rC192lkDdZcsX X-Received: by 2002:a05:6830:4486:b0:6c4:b326:8fdb with SMTP id r6-20020a056830448600b006c4b3268fdbmr4529889otv.8.1698432487614; Fri, 27 Oct 2023 11:48:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698432487; cv=none; d=google.com; s=arc-20160816; b=txJQN5be52oP2sUdsXAY3Ia8ZcYLDxPREFf2D3nr6aCCu09rpsab3Rz+3aA6eEu7Et jBRK3aFCXCFoEJrNbvvWN7tIY08S1EIzpSahXVTCbjAxICckHQtwr/4YEhg3Nt/5+Fk+ 5Ha6IqDvodVuiLOvllG3VKkOmiPsfzcnX6Ll9t5D7DLGmfB1Gml4CGIprV6poS3EN/PD UhqtztsYuuhOoR1CoosJQtl7biDKBjnQVvpy0jB+nE7Nlgf7IUxsz94jtQYYxAsHeWSv D2k8MzpPmLRtxizNezsMeiDy6sWqZP0u98Bi/MXNAoconsPM21NskGvl8nb/tlKgvwt7 /ZIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=f6EBd7CQLyZiNig/spAOzxNR1L2frOSZ4YESWGhvmLI=; fh=k6uq+6EUO2cmRWLRDNsZf/a3GKnBKJeBr3h39gwzr0s=; b=OdRGWapqBXAidpUPfddUfMlNZTlu4TDFnEuTxa+pJu5r6kbDw8jBpYgjo4KFDDaEl4 +ZZkH3ad5/Cv5kSKbs4pSlNfjc99UJ/Z05+97T4+tNHJ0J4hWevvkumoN2qZY6yn7s1e KLdP0ilFAi4PmNiiWvZlnDZcBnnksDW8Sod8fF+t0kUR55pmpTkt349ROuAbbc1LPoTB NyO1YZXVurJF/7R8FNhPC+Q8l8bMyD0IaabJJ2mz/3v0NNFIUpmcPW75k9hXJyvekMS8 UzYkg2TC4xAWSRHaNxlngOXoGdX2jI2LHzIro/jLc032eskRANeGiauJiwEyBPE1ON2j NJWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=jCFQYvkc; dkim=neutral (no key) header.i=@linutronix.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id t206-20020a815fd7000000b0059b3bed7b52si3579055ywb.449.2023.10.27.11.48.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Oct 2023 11:48:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=jCFQYvkc; dkim=neutral (no key) header.i=@linutronix.de; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 688AB81D2701; Fri, 27 Oct 2023 11:48:01 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346411AbjJ0Sq4 (ORCPT + 99 others); Fri, 27 Oct 2023 14:46:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346405AbjJ0Sqh (ORCPT ); Fri, 27 Oct 2023 14:46:37 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 409AF1AC; Fri, 27 Oct 2023 11:46:34 -0700 (PDT) Date: Fri, 27 Oct 2023 18:46:31 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1698432391; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=f6EBd7CQLyZiNig/spAOzxNR1L2frOSZ4YESWGhvmLI=; b=jCFQYvkce+A6qqFPkuK+ohh8vzqjbpErin0g6q/Pj1+B6epLkqbDewNI2IvrZ3NeLLlUtm nPmPhtw9Ik6ZkuKcAlKIXU4UHs/bPHLC0Q2X9e0UEBSwza7Gls1M42d8wxuErn3N3VRCpl dz8+oczq8j4EXHT0gW91ZprqAgkhbWFvvmXFM/dx2+Lft414plNXMlRPF5ZN+vkp/9IlO5 ozlsHmcDPDDuNwDjshkRuyPxSfev1k895I0z2dT6bYPiqAnXN2b86Jyo/vOPecjmON2cWx CORhlgQQpocALCG5drpoOzOziSa4deKhOld4X4TPNitfUgpuzRp36N/Y8C0qNg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1698432392; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=f6EBd7CQLyZiNig/spAOzxNR1L2frOSZ4YESWGhvmLI=; b=KOYeO9YZgSMaiafzoXp+3jHsJHVJU9NxqThmxSTpRRHGANRsaGmpVLVjL/t0UpE4/xw5MX SOtDp637ghfH4WDw== From: "tip-bot2 for Thomas Gleixner" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/urgent] x86/tsc: Defer marking TSC unstable to a worker Cc: Tetsuo Handa , Thomas Gleixner , stable@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <87zg064ceg.ffs@tglx> References: <87zg064ceg.ffs@tglx> MIME-Version: 1.0 Message-ID: <169843239104.3135.3490038788401849491.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Fri, 27 Oct 2023 11:48:01 -0700 (PDT) The following commit has been merged into the x86/urgent branch of tip: Commit-ID: bd94d86f490b70c58b3fc5739328a53ad4b18d86 Gitweb: https://git.kernel.org/tip/bd94d86f490b70c58b3fc5739328a53ad4b18d86 Author: Thomas Gleixner AuthorDate: Wed, 25 Oct 2023 23:31:35 +02:00 Committer: Thomas Gleixner CommitterDate: Fri, 27 Oct 2023 20:36:57 +02:00 x86/tsc: Defer marking TSC unstable to a worker Tetsuo reported the following lockdep splat when the TSC synchronization fails during CPU hotplug: tsc: Marking TSC unstable due to check_tsc_sync_source failed WARNING: inconsistent lock state inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage. ffffffff8cfa1c78 (watchdog_lock){?.-.}-{2:2}, at: clocksource_watchdog+0x23/0x5a0 {IN-HARDIRQ-W} state was registered at: _raw_spin_lock_irqsave+0x3f/0x60 clocksource_mark_unstable+0x1b/0x90 mark_tsc_unstable+0x41/0x50 check_tsc_sync_source+0x14f/0x180 sysvec_call_function_single+0x69/0x90 Possible unsafe locking scenario: lock(watchdog_lock); lock(watchdog_lock); stack backtrace: _raw_spin_lock+0x30/0x40 clocksource_watchdog+0x23/0x5a0 run_timer_softirq+0x2a/0x50 sysvec_apic_timer_interrupt+0x6e/0x90 The reason is the recent conversion of the TSC synchronization function during CPU hotplug on the control CPU to a SMP function call. In case that the synchronization with the upcoming CPU fails, the TSC has to be marked unstable via clocksource_mark_unstable(). clocksource_mark_unstable() acquires 'watchdog_lock', but that lock is taken with interrupts enabled in the watchdog timer callback to minimize interrupt disabled time. That's obviously a possible deadlock scenario, Before that change the synchronization function was invoked in thread context so this could not happen. As it is not crucical whether the unstable marking happens slightly delayed, defer the call to a worker thread which avoids the lock context problem. Fixes: 9d349d47f0e3 ("x86/smpboot: Make TSC synchronization function call based") Reported-by: Tetsuo Handa Signed-off-by: Thomas Gleixner Tested-by: Tetsuo Handa Cc: stable@vger.kernel.org Link: https://lore.kernel.org/r/87zg064ceg.ffs@tglx --- arch/x86/kernel/tsc_sync.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/tsc_sync.c b/arch/x86/kernel/tsc_sync.c index bbc440c..1123ef3 100644 --- a/arch/x86/kernel/tsc_sync.c +++ b/arch/x86/kernel/tsc_sync.c @@ -15,6 +15,7 @@ * ( The serial nature of the boot logic and the CPU hotplug lock * protects against more than 2 CPUs entering this code. ) */ +#include #include #include #include @@ -342,6 +343,13 @@ static inline unsigned int loop_timeout(int cpu) return (cpumask_weight(topology_core_cpumask(cpu)) > 1) ? 2 : 20; } +static void tsc_sync_mark_tsc_unstable(struct work_struct *work) +{ + mark_tsc_unstable("check_tsc_sync_source failed"); +} + +static DECLARE_WORK(tsc_sync_work, tsc_sync_mark_tsc_unstable); + /* * The freshly booted CPU initiates this via an async SMP function call. */ @@ -395,7 +403,7 @@ retry: "turning off TSC clock.\n", max_warp); if (random_warps) pr_warn("TSC warped randomly between CPUs\n"); - mark_tsc_unstable("check_tsc_sync_source failed"); + schedule_work(&tsc_sync_work); } /*