[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20060805130202.f63bcc9a.akpm@osdl.org>
Date: Sat, 5 Aug 2006 13:02:02 -0700
From: Andrew Morton <akpm@...l.org>
To: Dave Jones <davej@...hat.com>
Cc: torvalds@...l.org, michal.k.k.piotrowski@...il.com,
linux-kernel@...r.kernel.org
Subject: Re: 2.6.18-rc3-g3b445eea BUG: warning at
/usr/src/linux-git/kernel/cpu.c:51/unlock_cpu_hotplug()
On Sat, 5 Aug 2006 15:47:30 -0400
Dave Jones <davej@...hat.com> wrote:
> On Sat, Aug 05, 2006 at 12:46:00AM -0700, Andrew Morton wrote:
> > @@ -320,10 +320,10 @@ void fastcall flush_workqueue(struct wor
> > } else {
> > int cpu;
> >
> > - lock_cpu_hotplug();
> > + mutex_lock(&workqueue_mutex);
> > for_each_online_cpu(cpu)
> > flush_cpu_workqueue(per_cpu_ptr(wq->cpu_wq, cpu));
> > - unlock_cpu_hotplug();
> > + mutex_unlock(&workqueue_mutex);
> > }
> > }
>
> Is this enough though? I mean, what stops the hotplug cpu code
> from modifying cpu_online_map underneath us here, making for_each_online_cpu
> do the wrong thing ?
>
The patch takes that mutex in workqueue_cpu_callback() in such a way as to
prevent that. What it _effectively_ does is to change cpu_up() thusly:
--- a/kernel/cpu.c~x
+++ a/kernel/cpu.c
@@ -197,6 +197,7 @@ int __devinit cpu_up(unsigned int cpu)
}
ret = blocking_notifier_call_chain(&cpu_chain, CPU_UP_PREPARE, hcpu);
+ mutex_lock(&workqueue_mutex);
if (ret == NOTIFY_BAD) {
printk("%s: attempt to bring up CPU %u failed\n",
__FUNCTION__, cpu);
@@ -213,12 +214,15 @@ int __devinit cpu_up(unsigned int cpu)
BUG_ON(!cpu_online(cpu));
/* Now call notifier in preparation. */
+ mutex_unlock(&workqueue_mutex);
blocking_notifier_call_chain(&cpu_chain, CPU_ONLINE, hcpu);
out_notify:
- if (ret != 0)
+ if (ret != 0) {
blocking_notifier_call_chain(&cpu_chain,
CPU_UP_CANCELED, hcpu);
+ mutex_unlock(&workqueue_mutex);
+ }
out:
mutex_unlock(&cpu_add_remove_lock);
return ret;
_
and similarly in cpu_down().
So the workqueue code itself is protecting its per-cpu data from the hot
plug/unplug code across its critical regions.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists