]> git.baikalelectronics.ru Git - kernel.git/commit
nohz: Make tick_nohz_irq_exit() irq safe
authorFrederic Weisbecker <fweisbec@gmail.com>
Wed, 20 Feb 2013 15:15:36 +0000 (16:15 +0100)
committerThomas Gleixner <tglx@linutronix.de>
Thu, 21 Feb 2013 19:52:24 +0000 (20:52 +0100)
commit50a34e67f4f10f234fa94cea78bb8b38100f322c
tree6c08a944d66fa68928a05b0792ad013c5e2a3da6
parentf9acfab854f3827dfd837979716625855177be55
nohz: Make tick_nohz_irq_exit() irq safe

As it stands, irq_exit() may or may not be called with
irqs disabled, depending on __ARCH_IRQ_EXIT_IRQS_DISABLED
that the arch can define.

It makes tick_nohz_irq_exit() unsafe. For example two
interrupts can race in tick_nohz_stop_sched_tick(): the inner
most one computes the expiring time on top of the timer list,
then it's interrupted right before reprogramming the
clock. The new interrupt enqueues a new timer list timer,
it reprogram the clock to take it into account and it exits.
The CPUs resumes the inner most interrupt and performs the clock
reprogramming without considering the new timer list timer.

This regression has been introduced by:
     0f32af59172b738dca5e0a630e4b6216d0d25af9
     ("nohz: Separate out irq exit and idle loop dyntick logic")

Let's fix it right now with the appropriate protections.

A saner long term solution will be to remove
__ARCH_IRQ_EXIT_IRQS_DISABLED and mandate that irq_exit() is called
with interrupts disabled.

Signed-off-by: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Linus Torvalds <torvalds@linuxfoundation.org>
Cc: <stable@vger.kernel.org> #v3.2+
Link: http://lkml.kernel.org/r/1361373336-11337-1-git-send-email-fweisbec@gmail.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
kernel/time/tick-sched.c