lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <alpine.DEB.2.20.1712272156050.2431@nanos> Date: Wed, 27 Dec 2017 21:58:08 +0100 (CET) From: Thomas Gleixner <tglx@...utronix.de> To: Frederic Weisbecker <frederic@...nel.org> cc: LKML <linux-kernel@...r.kernel.org>, Anna-Maria Gleixner <anna-maria@...utronix.de>, Sebastian Siewior <bigeasy@...utronix.de>, Paul McKenney <paulmck@...ux.vnet.ibm.com>, Peter Zijlstra <peterz@...radead.org>, Frederic Weisbecker <fweisbec@...il.com>, Ingo Molnar <mingo@...nel.org>, stable@...r.kernel.org Subject: Re: [patch 2/4] nohz: Prevent erroneous tick stop invocations On Wed, 27 Dec 2017, Thomas Gleixner wrote: > Bah, no. We need to move that into the nohz logic somehow to prevent that > repetitive expiry yesterday reprogramming. Lemme think about it some more. The patch below should be the proper cure. Thanks, tglx 8<------------------- Subject: nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() From: Thomas Gleixner <tglx@...utronix.de> Date: Fri, 22 Dec 2017 15:51:13 +0100 From: Thomas Gleixner <tglx@...utronix.de> The conditions in irq_exit() to invoke tick_nohz_irq_exit() which subsequently invokes tick_nohz_stop_sched_tick() are: if ((idle_cpu(cpu) && !need_resched()) || tick_nohz_full_cpu(cpu)) If need_resched() is not set, but a timer softirq is pending then this is an indication that the softirq code punted and delegated the execution to softirqd. need_resched() is not true because the current interrupted task takes precedence over softirqd. Invoking tick_nohz_irq_exit() in this case can cause an endless loop of timer interrupts because the timer wheel contains an expired timer, but softirqs are not yet executed. So it returns an immediate expiry request, which causes the timer to fire immediately again. Lather, rinse and repeat.... Prevent that by adding a check for a pending timer soft interrupt to the conditions in tick_nohz_stop_sched_tick() which avoid calling get_next_timer_interrupt(). That keeps the tick sched timer on the tick and prevents a repetitive programming of an already expired timer. Signed-off-by: Thomas Gleixner <tglx@...utronix.de> Cc: Peter Zijlstra <peterz@...radead.org> Cc: Frederic Weisbecker <fweisbec@...il.com> Cc: Sebastian Siewior <bigeasy@...utronix.de> Cc: stable@...r.kernel.org Cc: Paul McKenney <paulmck@...ux.vnet.ibm.com> Cc: Anna-Maria Gleixner <anna-maria@...utronix.de> --- kernel/time/tick-sched.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) --- a/kernel/time/tick-sched.c +++ b/kernel/time/tick-sched.c @@ -650,6 +650,11 @@ static void tick_nohz_restart(struct tic ts->next_tick = 0; } +static inline bool local_timer_softirq_pending(void) +{ + return local_softirq_pending & TIMER_SOFTIRQ; +} + static ktime_t tick_nohz_stop_sched_tick(struct tick_sched *ts, ktime_t now, int cpu) { @@ -666,8 +671,8 @@ static ktime_t tick_nohz_stop_sched_tick } while (read_seqretry(&jiffies_lock, seq)); ts->last_jiffies = basejiff; - if (rcu_needs_cpu(basemono, &next_rcu) || - arch_needs_cpu() || irq_work_needs_cpu()) { + if (rcu_needs_cpu(basemono, &next_rcu) || arch_needs_cpu() || + irq_work_needs_cpu() || local_timer_softirq_pending()) { next_tick = basemono + TICK_NSEC; } else { /*
Powered by blists - more mailing lists