[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070419143133.a6c82ef8.akpm@linux-foundation.org>
Date: Thu, 19 Apr 2007 14:31:33 -0700
From: Andrew Morton <akpm@...ux-foundation.org>
To: ego@...ibm.com
Cc: Oleg Nesterov <oleg@...sign.ru>, "Rafael J. Wysocki" <rjw@...k.pl>,
linux-kernel@...r.kernel.org, mingo@...e.hu, vatsa@...ibm.com,
paulmck@...ibm.com, pavel@....cz
Subject: Re: [RFC PATCH(experimental) 2/2] Fix freezer-kthread_stop race
On Thu, 19 Apr 2007 17:34:19 +0530
Gautham R Shenoy <ego@...ibm.com> wrote:
> Threads which wait for completion on a frozen thread might result in
> causing the freezer to fail, if the waiting thread is freezeable.
>
> There are some well known cases where it's preferable to temporarily thaw
> the frozen process, finish the wait for completion and allow both the
> processes to call try_to_freeze.
>
> kthread_stop is one such case.
hm.
> flush_workqueue might be another.
flush_workqueue() just needs to die. I think there are (almost) no
legitimate users of it once cancel_work_sync() is merged.
> This patch attempts to address such a situation with a fix for kthread_stop.
Via wholly undescribed means :(
> Strictly experimental. Compile tested on i386.
Rather than doing <whatever you did>, perhaps we could make the freezing
process a dual-pass thing. On pass 1, mark all the threads as "we'll be
freezing you soon" and on the second pass, do the actual freezing. Then,
in problematic places such as kthread_stop() we can look to see if we'll
soon be asked to freeze and if so, run try_to_freeze().
Of course, running try_to_freeze() in kthread_stop() would be very wrong,
so we'd actually need to do it in callers, preferably via a new
kthread_stop_freezeable() wrapper.
And the two-pass-freeze thing is of course racy. It's also unnecessary:
setting a flag on every task in the machine is equivalent to setting a
global variable. So perhaps just use a global variable?
int kthread_stop_freezeable(struct task_struct *k)
{
if (freeze_state == ABOUT_TO_START) {
wait_for(freeze_state == STARTED);
try_to_freeze();
}
kthread_stop(k);
}
which is theoretically racy if another freeze_processes() starts
immediately. Anyway - please have a think about it ;)
> +static struct freezer_status_struct freezer_status = {
> + .lock = SPIN_LOCK_UNLOCKED,
> + .count = 0,
> + };
SPIN_LOCK_UNLOCKED is deprecated (it subverts lockdep)
> static inline int freezeable(struct task_struct * p)
> {
> if ((p == current) ||
> @@ -45,7 +55,8 @@ void refrigerator(void)
> * *after* the freezer did the freezeable() check
> * on us.
> */
> - if (current->flags & PF_NOFREEZE) {
> + if ((current->flags & PF_NOFREEZE) ||
> + test_tsk_thread_flag(current, TIF_FREEZER_HELD)) {
> clear_tsk_thread_flag(current, TIF_FREEZE);
> task_unlock(current);
> return;
> @@ -63,12 +74,16 @@ void refrigerator(void)
> recalc_sigpending(); /* We sent fake signal, clean it up */
> spin_unlock_irq(¤t->sighand->siglock);
>
> + task_lock(current);
> for (;;) {
> set_current_state(TASK_UNINTERRUPTIBLE);
> if (!frozen(current))
> break;
> + task_unlock(current);
> schedule();
> + task_lock(current);
> }
> + task_unlock(current);
> pr_debug("%s left refrigerator\n", current->comm);
> current->state = save;
I guess we should use set_current_state() here.
> +
> + if (thaw_user_space) {
> + spin_lock(&freezer_status.lock);
> + if (freezer_status.count < 0)
> + freezer_status.count++;
> + spin_unlock(&freezer_status.lock);
> + }
> }
whitespace went wrong
> +#define TIF_FREEZER_HELD 21 /* is temporarily holding up the
> + * process freezer
> + */
>
> #define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE)
> #define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT)
> @@ -102,6 +105,7 @@ struct thread_info {
> #define _TIF_MCA_INIT (1 << TIF_MCA_INIT)
> #define _TIF_DB_DISABLED (1 << TIF_DB_DISABLED)
> #define _TIF_FREEZE (1 << TIF_FREEZE)
> +#define _TIF_FREEZER_HELD (1 << TIF_FREEZER_HELD)
>
> /* "work to do on user-return" bits */
> #define TIF_ALLWORK_MASK (_TIF_NOTIFY_RESUME|_TIF_SIGPENDING|_TIF_NEED_RESCHED|_TIF_SYSCALL_TRACE|_TIF_SYSCALL_AUDIT)
> Index: linux-2.6.21-rc6/include/asm-mips/thread_info.h
> ===================================================================
> --- linux-2.6.21-rc6.orig/include/asm-mips/thread_info.h
> +++ linux-2.6.21-rc6/include/asm-mips/thread_info.h
> @@ -120,6 +120,7 @@ register struct thread_info *__current_t
> #define TIF_MEMDIE 18
> #define TIF_FREEZE 19
> #define TIF_ALLOW_FP_IN_KERNEL 20
> +#define TIF_FREEZER_HELD 21
> #define TIF_SYSCALL_TRACE 31 /* syscall trace active */
>
> #define _TIF_SYSCALL_TRACE (1<<TIF_SYSCALL_TRACE)
> @@ -132,6 +133,7 @@ register struct thread_info *__current_t
> #define _TIF_USEDFPU (1<<TIF_USEDFPU)
> #define _TIF_POLLING_NRFLAG (1<<TIF_POLLING_NRFLAG)
> #define _TIF_FREEZE (1<<TIF_FREEZE)
> +#define _TIF_FREEZER_HELD (1<<TIF_FREEZER_HELD)
hm, all this duplication is unpleasing. We could do something similar to
include/linux/buffer_head.h:BH_PrivateStart here: get all architectures to
define a TIF_COMMON_STUFF_STARTS_HERE then include asm-generic/whatever.h
which defines all the flags which every architecture must define, as
TIF_COMMON_STUFF_STARTS_HERE+0, TIF_COMMON_STUFF_STARTS_HERE+1, etc.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists