1. 13 Oct, 2009 3 commits
  2. 12 Oct, 2009 1 commit
    • Darren Hart's avatar
      futex: Fix wakeup race by setting TASK_INTERRUPTIBLE before queue_me() · a03d1035
      Darren Hart authored
      PI futexes do not use the same plist_node_empty() test for wakeup.
      It was possible for the waiter (in futex_wait_requeue_pi()) to set
      TASK_INTERRUPTIBLE after the waker assigned the rtmutex to the
      waiter. The waiter would then note the plist was not empty and call
      schedule(). The task would not be found by any subsequeuent futex
      wakeups, resulting in a userspace hang.
      
      By moving the setting of TASK_INTERRUPTIBLE to before the call to
      queue_me(), the race with the waker is eliminated. Since we no
      longer call get_user() from within queue_me(), there is no need to
      delay the setting of TASK_INTERRUPTIBLE until after the call to
      queue_me().
      
      The FUTEX_LOCK_PI operation is not affected as futex_lock_pi()
      relies entirely on the rtmutex code to handle schedule() and
      wakeup.  The requeue PI code is affected because the waiter starts
      as a non-PI waiter and is woken on a PI futex.
      
      Remove the crusty old comment about holding spinlocks() across
      get_user() as we no longer do that. Correct the locking statement
      with a description of why the test is performed.
      Signed-off-by: default avatarDarren Hart <dvhltc@us.ibm.com>
      Acked-by: default avatarPeter Zijlstra <peterz@infradead.org>
      Cc: Steven Rostedt <rostedt@goodmis.org>
      Cc: Eric Dumazet <eric.dumazet@gmail.com>
      Cc: Dinakar Guniguntala <dino@in.ibm.com>
      Cc: John Stultz <johnstul@us.ibm.com>
      LKML-Reference: <20090922053038.8717.97838.stgit@Aeon>
      Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
      a03d1035
  3. 09 Oct, 2009 1 commit
  4. 08 Oct, 2009 3 commits
    • Thomas Gleixner's avatar
      futex: Move exit_pi_state() call to release_mm() · f39bec65
      Thomas Gleixner authored
      exit_pi_state() is called from do_exit() but not from do_execve().
      Move it to release_mm() so it gets called from do_execve() as well.
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      LKML-Reference: <new-submission>
      Cc: stable@kernel.org
      Cc: Anirban Sinha <ani@anirban.org>
      Cc: Peter Zijlstra <peterz@infradead.org>
      f39bec65
    • Peter Zijlstra's avatar
      futex: Nullify robust lists after cleanup · a7b1a075
      Peter Zijlstra authored
      The robust list pointers of user space held futexes are kept intact
      over an exec() call. When the exec'ed task exits exit_robust_list() is
      called with the stale pointer. The risk of corruption is minimal, but
      still it is incorrect to keep the pointers valid. Actually glibc
      should uninstall the robust list before calling exec() but we have to
      deal with it anyway.
      
      Nullify the pointers after [compat_]exit_robust_list() has been
      called.
      Reported-by: default avatarAnirban Sinha <ani@anirban.org>
      Signed-off-by: default avatarPeter Zijlstra <peterz@infradead.org>
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      LKML-Reference: <new-submission>
      Cc: stable@kernel.org
      a7b1a075
    • Eero Nurkkala's avatar
      NOHZ: update idle state also when NOHZ is inactive · cfa0c194
      Eero Nurkkala authored
      Commit f2e21c96 had unfortunate side
      effects with cpufreq governors on some systems.
      
      If the system did not switch into NOHZ mode ts->inidle is not set when
      tick_nohz_stop_sched_tick() is called from the idle routine. Therefor
      all subsequent calls from irq_exit() to tick_nohz_stop_sched_tick()
      fail to call tick_nohz_start_idle(). This results in bogus idle
      accounting information which is passed to cpufreq governors.
      
      Set the inidle flag unconditionally of the NOHZ active state to keep
      the idle time accounting correct in any case.
      
      [ tglx: Added comment and tweaked the changelog ]
      Reported-by: default avatarSteven Noonan <steven@uplinklabs.net>
      Signed-off-by: default avatarEero Nurkkala <ext-eero.nurkkala@nokia.com>
      Cc: Rik van Riel <riel@redhat.com>
      Cc: Venkatesh Pallipadi <venkatesh.pallipadi@intel.com>
      Cc: Greg KH <greg@kroah.com>
      Cc: Steven Noonan <steven@uplinklabs.net>
      Cc: stable@kernel.org
      LKML-Reference: <1254907901.30157.93.camel@eenurkka-desktop>
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      cfa0c194
  5. 07 Oct, 2009 1 commit
    • Darren Hart's avatar
      futex: fix requeue_pi key imbalance · 6b2396bb
      Darren Hart authored
      If futex_wait_requeue_pi() wakes prior to requeue, we drop the
      reference to the source futex_key twice, once in
      handle_early_requeue_pi_wakeup() and once on our way out.
      
      Remove the drop from the handle_early_requeue_pi_wakeup() and keep
      the get/drops together in futex_wait_requeue_pi().
      Reported-by: default avatarHelge Bahmann <hcb@chaoticmind.net>
      Signed-off-by: default avatarDarren Hart <dvhltc@us.ibm.com>
      Cc: Helge Bahmann <hcb@chaoticmind.net>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: Eric Dumazet <eric.dumazet@gmail.com>
      Cc: Dinakar Guniguntala <dino@in.ibm.com>
      Cc: John Stultz <johnstul@us.ibm.com>
      Cc: stable-2.6.31 <stable@kernel.org>
      LKML-Reference: <4ACCE21E.5030805@us.ibm.com>
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      6b2396bb
  6. 06 Oct, 2009 1 commit
  7. 04 Oct, 2009 1 commit
  8. 18 Sep, 2009 1 commit
  9. 17 Sep, 2009 1 commit
  10. 15 Sep, 2009 7 commits
    • Carsten Emde's avatar
      tracing: Add histograms of potential and effective wakeup latencies · cc2fa446
      Carsten Emde authored
      Resuscitated and enhanced the kernel latency histograms provided
      originally by Yi Yang and adapted and converted by Steven Rostedt.
      
      Latency histograms in the current version
      - can be enabled online and independently
      - have virtually no performance penalty when configured but not enabled
      - have very little performance penalty when enabled
      - use already available wakeup and switch tracepoints
      - give corresponding results with the related tracer
      - allow to record wakeup latency histograms of a single process
      - record the process where the highest wakeup latency occurred 
      - are documented in Documentation/trace/histograms.txt
      Signed-off-by: default avatarCarsten Emde <C.Emde@osadl.org>
      Cc: Steven Rostedt <rostedt@goodmis.org>
      LKML-Reference: <4AAEDDD5.4040505@osadl.org>
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      cc2fa446
    • Wu Zhangjin's avatar
      mm: Fix the non-RT version of swap_get_cpu_var · edc1a1c3
      Wu Zhangjin authored
      The commit(f8382688) have converted swap to percpu locked, the
      non-RT version of swap_get_cpu_var should be the same as the old
      implementation, but in reality, it not works as the old one:
      
      ...
      +#define swap_get_cpu_var(var, cpu)                     \
      +       ({                                              \
      +               (void)cpu;                              \
      +               &get_cpu_var(var);                      \
      +        })
      ...
       void __lru_cache_add(struct page *page, enum lru_list lru)
       {
      -       struct pagevec *pvec = &get_cpu_var(lru_add_pvecs)[lru];
      +       struct pagevec *pvec;
      +       int cpu;
      
      +       pvec = swap_get_cpu_var(lru_add_pvecs, cpu)[lru];
              page_cache_get(page);
              if (!pagevec_add(pvec, page))
                      ____pagevec_lru_add(pvec, lru);
      -       put_cpu_var(lru_add_pvecs);
      +       swap_put_cpu_var(lru_add_pvecs, cpu);
       }
      
      Here is the point, the old version:
      
            pvec = &get_cpu_var(lru_add_pvecs)[lru];
           	   = & (get_cpu_var(lru_add_pvecs)[lru]);
      
      new version from commit f8382688:
      
            pvec = ({ (void)cpu; &get_cpu_var(lru_add_pvecs); })[lru];
                 = (&get_cpu_var(lru_add_pvecs)) [lru];
      
      so, we can see, these two are really different. and it made the non-RT boot
      fail:
      
      ...
      
      ide-gd driver 1.18
      hda: max request size: 512KiB
      hda: 312581808 sectors (160041 MB) w/8192KiB Cache, CHS=19457/255/63
      hda: cache flushes supported
       hda:Unhandled kernel unaligned access[#1]:
      Cpu 0
      $ 0   : 0000000000000000 000000001400c4e1 98000000013699d0 0000000000000000
      $ 4   : 0000000000000000 98000000be04f980 0000000000000010 000000007fd78b57
      $ 8   : 0000000000000001 0000000000200200 0000000000100100 98000000be00f210
      $12   : 000000001400c4e1 000000001000001e ffffffffffffffff 98000000bd0180a8
      $16   : 0000000000000000 98000000be04f998 fffffffb81a72600 ffffffff802d3270
      $20   : 0000000000000000 0000000000000000 ffffffffffffffef ffffffff80667a90
      $24   : 0000000000000228 ffffffff803ded88
      $28   : 98000000be04c000 98000000be04f950 00000000003fffff ffffffff80200404
      Hi    : 0000000000000000
      Lo    : 0000000000000320
      epc   : ffffffff80217194 do_ade+0x298/0x3bc
          Not tainted
      ra    : ffffffff80200404 ret_from_exception+0x0/0x10
      Status: 1400c4e3    KX SX UX KERNEL EXL IE
      Cause : 00000014
      BadVA : fffffffb81a72607
      PrId  : 00006303 (ICT Loongson-2)
      Modules linked in:
      Process swapper (pid: 1, threadinfo=98000000be04c000, task=98000000be04b7d8, tls=0000000000000000)
      Stack : ffffffff80666f60 ffffffff8025165c 98000000013699d0 0000000000000001
              98000000bd00ae30 ffffffff80200404 0000000000000000 000000001400c4e1
              000000007fd78b57 98000000013699d0 ffffffff80638070 0000000000000002
              fffffffb81a72600 000000007fd78b57 0000000000000001 0000000000200200
              0000000000100100 98000000be00f210 98000000be00f220 000000000000001d
              ffffffffffffffff 98000000bd0180a8 98000000013699d0 0000000000000001
              98000000bd00ae30 ffffffff802d3270 0000000000000000 0000000000000000
              ffffffffffffffef ffffffff80667a90 0000000000000228 ffffffff803ded88
              98000000bd00ae30 98000000bd00ae30 98000000be04c000 98000000be04fab0
              00000000003fffff ffffffff80275350 000000001400c4e3 0000000000000000
              ...
      Call Trace:
      [<ffffffff80217194>] do_ade+0x298/0x3bc
      [<ffffffff80200404>] ret_from_exception+0x0/0x10
      [<ffffffff8027fafc>] __lru_cache_add+0x94/0xd8
      [<ffffffff80275350>] add_to_page_cache_lru+0x84/0xa8
      [<ffffffff80275520>] read_cache_page_async+0xa8/0x1dc
      [<ffffffff80275664>] read_cache_page+0x10/0x74
      [<ffffffff802fed34>] read_dev_sector+0x34/0xe0
      [<ffffffff802ff96c>] adfspart_check_ICS+0x44/0x1b0
      [<ffffffff802ff6e4>] rescan_partitions+0x178/0x3a8
      [<ffffffff802d3840>] __blkdev_get+0x238/0x318
      [<ffffffff802feeb0>] register_disk+0xd0/0x15c
      [<ffffffff8037c1e8>] add_disk+0xcc/0x128
      [<ffffffff803fcbc4>] ide_gd_probe+0x170/0x1d0
      [<ffffffff803e6e08>] driver_probe_device+0xbc/0x180
      [<ffffffff803e6f38>] __driver_attach+0x6c/0xa4
      [<ffffffff803e6508>] bus_for_each_dev+0x58/0xa4
      [<ffffffff803e5bbc>] bus_add_driver+0xc8/0x284
      [<ffffffff803e72d8>] driver_register+0xc4/0x17c
      [<ffffffff8020fa5c>] do_one_initcall+0x64/0x18c
      [<ffffffff806701d8>] kernel_init+0xe0/0x14c
      [<ffffffff80212e5c>] kernel_thread_helper+0x10/0x18
      
      Code: 001188f8  00b1882d  de220000 <b2420007> b6420000  24120000  1640000c  00a0202d  8ca20120
      Disabling lock debugging due to kernel taint
      note: swapper[1] exited with preempt_count 1
      Kernel panic - not syncing: Attempted to kill init!
      
      This patch will keep the swap_get_cpu_var as the one before commit f8382688,
      and put "(void)cpu;" to swap_put_cpu_var() to avoid warning about unused
      variable.
      Signed-off-by: default avatarWu Zhangjin <wuzhangjin@gmail.com>
      LKML-Reference: <1252034522-32653-1-git-send-email-wuzhangjin@gmail.com>
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      edc1a1c3
    • Thomas Gleixner's avatar
      x86: Suppress empty cpumask ipi warning · 9425c8dc
      Thomas Gleixner authored
      We know already which code pathes trigger this so we can safely
      disable it again and just keep the early return when mask == 0.
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      9425c8dc
    • Thomas Gleixner's avatar
      kvm: Move get_cpu inside of spinlocked region in make_all_cpus_request() · b079dc12
      Thomas Gleixner authored
      kvm->requests_lock is a sleeping lock in RT, but it's locked inside
      the preempt disabled region of get_cpu(). Move the get_cpu() region
      inside the spinlocked region to avoid the might sleep warning.
      
      BUG: sleeping function called from invalid context at kernel/rtmutex.c:684
      in_atomic(): 1, irqs_disabled(): 0, pid: 10670, name: qemu-kvm
      Pid: 10670, comm: qemu-kvm Not tainted 2.6.31-rc9-rt9.1-32bit #47
      Call Trace:
      [<c022a88a>] __might_sleep+0xcb/0xd0
      [<c0498bd9>] rt_spin_lock+0x29/0x5e
      [<f9161b54>] make_all_cpus_request+0x36/0xb2 [kvm]
      [<f9161bf6>] kvm_flush_remote_tlbs+0x12/0x1f [kvm]
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      Reported-by: default avatarCarsten Emde <carsten.emde@osadl.org>
      b079dc12
    • Thomas Gleixner's avatar
      rt: Fix rwlocks/rwsem rt_[down_]read_trylock() · 00261a94
      Thomas Gleixner authored
      rt_read_trylock() and rt_down_read_trylock() take the lock / semaphore
      unconditionally when it is write locked. Check read_depth if current
      owns the lock. If it's 0 we know it is write locked and return 0.
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      00261a94
    • Xiao Guangrong's avatar
      perf_counter: Fix buffer overflow in perf_copy_attr() · 0188eb59
      Xiao Guangrong authored
      If we pass a big size data over perf_counter_open() syscall,
      the kernel will copy this data to a small buffer, it will
      cause kernel crash.
      
      This bug makes the kernel unsafe and non-root local user can
      trigger it.
      Signed-off-by: default avatarXiao Guangrong <xiaoguangrong@cn.fujitsu.com>
      Acked-by: default avatarPeter Zijlstra <peterz@infradead.org>
      Acked-by: default avatarPaul Mackerras <paulus@samba.org>
      Cc: <stable@kernel.org>
      LKML-Reference: <4AAF37D4.5010706@cn.fujitsu.com>
      Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
      0188eb59
    • Thomas Gleixner's avatar
      time: Prevent 32 bit overflow with set_normalized_timespec() · f7ada8bf
      Thomas Gleixner authored
      set_normalized_timespec() nsec argument is of type long. The recent
      timekeeping changes of ktime_get_ts() feed
      
      	ts->tv_nsec + tomono.tv_nsec + nsecs
      
      to set_normalized_timespec(). On 32 bit machines that sum can be
      larger than (1 << 31) and therefor result in a negative value which
      screws up the result completely.
      
      Make the nsec argument of set_normalized_timespec() s64 to fix the
      problem at hand. This also prevents similar problems for future users
      of set_normalized_timespec().
      Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      Tested-by: default avatarCarsten Emde <carsten.emde@osadl.org>
      LKML-Reference: <new-submission>
      Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
      Cc: John Stultz <johnstul@us.ibm.com>
      f7ada8bf
  11. 14 Sep, 2009 13 commits
  12. 13 Sep, 2009 7 commits