From patchwork Thu Dec 26 23:30:50 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Frederic Weisbecker X-Patchwork-Id: 13921489 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 54CD51BB6BC; Thu, 26 Dec 2024 23:31:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1735255867; cv=none; b=pdh2IGgbCCH9xeFLtKyIUepjzh1T/qNubSg+fyQAeFHDluNvuwSn0qh0Up9UWX/bEcf/4iLL+cDujSQDEsgwXIpB4WDd9l+OAuq+JusJ+pnMDTB4+3JmZlqhAyuv8RUYXor+FALo5zARpKghkM/iV3OHO1U9Vr/lOHuUXM6LccA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1735255867; c=relaxed/simple; bh=E0j7vG0i2tPWbNCptFetutJoJ6UbcO2Ig3OWiAdQXUQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=gij0fSxAwnDMGCffnksGSgUKBeuYCujbfradXKfCtbdsz2p+0CIdzL9uTkTg12QiFEhO8OjPjLBYDQppQvuf84DSYcZcNqRAt/XtPND4HtqfDzqKyAoK7ANCQ6pLH630FMXRf8bYTFFkhsL+zKdAklPbEZPxTpmp8ahYQimEqc4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=TeTHU9CR; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="TeTHU9CR" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2CC28C4CEDC; Thu, 26 Dec 2024 23:31:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1735255866; bh=E0j7vG0i2tPWbNCptFetutJoJ6UbcO2Ig3OWiAdQXUQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TeTHU9CRnnMJp3eY0uz6BTizMZwzKXbIJZ/gK5C8eCu1LG3h/Zdg+SFPqCT6YIW9k l7NgfRdGzSmaTAY4UcuUpL+FoLA+gi4qZ6+GNpN6RIja4MA8rsE5wjWMsXDBS9n/bR XEKt2Ra0jdTzNGUOzUGBiHCcPpSfiE+y/G0EcuqfgtMHa99JZaISmua0e48jmbqC/J qSN7uW9Vl7zTiYtLKmSNeQsoMvfNwO+z6eRsqYSDMdXIwhz7J9v+gqg8hulra1KPhg 6Ei/lq7ZL4AzTzESljp+3yMDKEtJ5zuGDxguwNfAN7+01j5g6OcJuR2iJODU1ma1aa 8opl9CAGJ+TuQ== From: Frederic Weisbecker To: Thomas Gleixner Cc: LKML , Frederic Weisbecker , vlad.wing@gmail.com, rcu@vger.kernel.org, boqun.feng@gmail.com, joel@joelfernandes.org, neeraj.upadhyay@amd.com, urezki@gmail.com, qiang.zhang1211@gmail.com, Cheng-Jui.Wang@mediatek.com, leitao@debian.org, kernel-team@meta.com, Usama Arif , paulmck@kernel.org, Anna-Maria Behnsen Subject: [PATCH 1/3 v2] hrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING Date: Fri, 27 Dec 2024 00:30:50 +0100 Message-ID: <20241226233052.145450-2-frederic@kernel.org> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20241226233052.145450-1-frederic@kernel.org> References: <20241226233052.145450-1-frederic@kernel.org> Precedence: bulk X-Mailing-List: rcu@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 hrtimers are migrated away from the dying CPU to any online target at the CPUHP_AP_HRTIMERS_DYING stage in order not to delay bandwidth timers handling tasks involved in the CPU hotplug forward progress. However wake ups can still be performed by the outgoing CPU after CPUHP_AP_HRTIMERS_DYING. Those can result again in bandwidth timers being armed. Depending on several considerations (crystal ball power management based election, earliest timer already enqueued, timer migration enabled or not), the target may eventually be the current CPU even if offline. If that happens, the timer is eventually ignored. The most notable example is RCU which had to deal with each an every of those wake-ups by deferring them to an online CPU, along with related workarounds: _ e787644caf76 (rcu: Defer RCU kthreads wakeup when CPU is dying) _ 9139f93209d1 (rcu/nocb: Fix RT throttling hrtimer armed from offline CPU) _ f7345ccc62a4 (rcu/nocb: Fix rcuog wake-up from offline softirq) The problem isn't confined to RCU though as the stop machine kthread (which runs CPUHP_AP_HRTIMERS_DYING) reports its completion at the end and performs a wake up that eventually arms the deadline server timer: WARNING: CPU: 94 PID: 588 at kernel/time/hrtimer.c:1086 hrtimer_start_range_ns+0x289/0x2d0 Modules linked in: CPU: 94 UID: 0 PID: 588 Comm: migration/94 Not tainted Stopper: multi_cpu_stop+0x0/0x120 <- stop_machine_cpuslocked+0x66/0xc0 RIP: 0010:hrtimer_start_range_ns+0x289/0x2d0 Code: 41 5c 41 5d 41 5e 41 5f 5d e9 63 94 ea 00 0f 0b 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d e9 39 fc 15 01 0f 0b e9 c1 fd ff ff <0f> 0b 48 8b +45 00 e9 59 ff ff ff f3 0f 1e fa 65 8b 05 1d ec e8 7e RSP: 0018:ffffc900019cbcc8 EFLAGS: 00010046 RAX: ffff88bf449a4c40 RBX: 0000000000000082 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffff88bf43224c80 RDI: ffff88bf449a4c40 RBP: ffff88bf449a4c80 R08: ffff888280970090 R09: 0000000000000000 R10: ffff88bf432252e0 R11: ffffffff811abf70 R12: ffff88bf449a4c40 R13: ffff88bf43234b28 R14: ffff88bf43224c80 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88bf44980000(0000) knlGS:0000000000000000 CR2: 0000000000000000 CR3: 000000404b230001 CR4: 0000000000770ef0 PKRU: 55555554 Call Trace: ? __warn+0xcf/0x1b0 ? hrtimer_start_range_ns+0x289/0x2d0 ? report_bug+0x120/0x1a0 ? handle_bug+0x60/0x90 ? exc_invalid_op+0x1a/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? register_refined_jiffies+0xb0/0xb0 ? hrtimer_start_range_ns+0x289/0x2d0 ? hrtimer_start_range_ns+0x186/0x2d0 start_dl_timer+0xfc/0x150 enqueue_dl_entity+0x367/0x640 dl_server_start+0x53/0xa0 enqueue_task_fair+0x363/0x460 enqueue_task+0x3c/0x200 ttwu_do_activate+0x94/0x240 try_to_wake_up+0x315/0x600 complete+0x4b/0x80 Instead of providing yet another bandaid to work around the situation, fix it from hrtimers infrastructure instead: always migrate away a timer to an online target whenever it is enqueued from an offline CPU. This will also allow to revert all the above RCU disgraceful hacks. Reported-by: Reported-by: Vlad Poenaru Reported-by: Usama Arif Fixes: 5c0930ccaad5 ("hrtimers: Push pending hrtimers away from outgoing CPU earlier") Closes: 20241213203739.1519801-1-usamaarif642@gmail.com Signed-off-by: Frederic Weisbecker Signed-off-by: Paul E. McKenney --- include/linux/hrtimer_defs.h | 1 + kernel/time/hrtimer.c | 55 +++++++++++++++++++++++++++++++++--- 2 files changed, 52 insertions(+), 4 deletions(-) diff --git a/include/linux/hrtimer_defs.h b/include/linux/hrtimer_defs.h index c3b4b7ed7c16..84a5045f80f3 100644 --- a/include/linux/hrtimer_defs.h +++ b/include/linux/hrtimer_defs.h @@ -125,6 +125,7 @@ struct hrtimer_cpu_base { ktime_t softirq_expires_next; struct hrtimer *softirq_next_timer; struct hrtimer_clock_base clock_base[HRTIMER_MAX_CLOCK_BASES]; + call_single_data_t csd; } ____cacheline_aligned; diff --git a/kernel/time/hrtimer.c b/kernel/time/hrtimer.c index 80fe3749d2db..e389a8ce28c8 100644 --- a/kernel/time/hrtimer.c +++ b/kernel/time/hrtimer.c @@ -58,6 +58,8 @@ #define HRTIMER_ACTIVE_SOFT (HRTIMER_ACTIVE_HARD << MASK_SHIFT) #define HRTIMER_ACTIVE_ALL (HRTIMER_ACTIVE_SOFT | HRTIMER_ACTIVE_HARD) +static void retrigger_next_event(void *arg); + /* * The timer bases: * @@ -111,7 +113,8 @@ DEFINE_PER_CPU(struct hrtimer_cpu_base, hrtimer_bases) = .clockid = CLOCK_TAI, .get_time = &ktime_get_clocktai, }, - } + }, + .csd = CSD_INIT(retrigger_next_event, NULL) }; static const int hrtimer_clock_to_base_table[MAX_CLOCKS] = { @@ -716,8 +719,6 @@ static inline int hrtimer_is_hres_enabled(void) return hrtimer_hres_enabled; } -static void retrigger_next_event(void *arg); - /* * Switch to high resolution mode */ @@ -1202,10 +1203,50 @@ hrtimer_update_softirq_timer(struct hrtimer_cpu_base *cpu_base, bool reprogram) hrtimer_reprogram(cpu_base->softirq_next_timer, reprogram); } +/* + * If the current CPU is offline and timers have been already + * migrated away, make sure not to enqueue locally and perform + * a remote retrigger as a last resort. + */ +static void enqueue_hrtimer_offline(struct hrtimer *timer, + struct hrtimer_clock_base *base, + const enum hrtimer_mode mode) +{ +#ifdef CONFIG_HOTPLUG_CPU + struct hrtimer_cpu_base *new_cpu_base, *old_cpu_base, *this_cpu_base; + struct hrtimer_clock_base *new_base; + int cpu; + + old_cpu_base = base->cpu_base; + this_cpu_base = this_cpu_ptr(&hrtimer_bases); + + if (old_cpu_base == this_cpu_base || !old_cpu_base->online) { + WARN_ON_ONCE(hrtimer_callback_running(timer)); + cpu = cpumask_any_and(cpu_online_mask, + housekeeping_cpumask(HK_TYPE_TIMER)); + new_cpu_base = &per_cpu(hrtimer_bases, cpu); + new_base = &new_cpu_base->clock_base[base->index]; + WRITE_ONCE(timer->base, &migration_base); + raw_spin_unlock(&old_cpu_base->lock); + raw_spin_lock(&new_cpu_base->lock); + WRITE_ONCE(timer->base, new_base); + } else { + new_base = base; + new_cpu_base = new_base->cpu_base; + cpu = new_cpu_base->cpu; + } + + if (enqueue_hrtimer(timer, new_base, mode)) + smp_call_function_single_async(cpu, &new_cpu_base->csd); +#endif +} + + static int __hrtimer_start_range_ns(struct hrtimer *timer, ktime_t tim, u64 delta_ns, const enum hrtimer_mode mode, struct hrtimer_clock_base *base) { + struct hrtimer_cpu_base *this_cpu_base = this_cpu_ptr(&hrtimer_bases); struct hrtimer_clock_base *new_base; bool force_local, first; @@ -1217,7 +1258,7 @@ static int __hrtimer_start_range_ns(struct hrtimer *timer, ktime_t tim, * and enforce reprogramming after it is queued no matter whether * it is the new first expiring timer again or not. */ - force_local = base->cpu_base == this_cpu_ptr(&hrtimer_bases); + force_local = base->cpu_base == this_cpu_base; force_local &= base->cpu_base->next_timer == timer; /* @@ -1240,6 +1281,12 @@ static int __hrtimer_start_range_ns(struct hrtimer *timer, ktime_t tim, hrtimer_set_expires_range_ns(timer, tim, delta_ns); + if (unlikely(!this_cpu_base->online)) { + enqueue_hrtimer_offline(timer, base, mode); + return 0; + } + + /* Switch the timer base, if necessary: */ if (!force_local) { new_base = switch_hrtimer_base(timer, base,