summaryrefslogtreecommitdiffstats
path: root/debian/patches-rt/0352-workqueue-Fix-deadlock-due-to-recursive-locking-of-p.patch
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--debian/patches-rt/0352-workqueue-Fix-deadlock-due-to-recursive-locking-of-p.patch68
1 files changed, 68 insertions, 0 deletions
diff --git a/debian/patches-rt/0352-workqueue-Fix-deadlock-due-to-recursive-locking-of-p.patch b/debian/patches-rt/0352-workqueue-Fix-deadlock-due-to-recursive-locking-of-p.patch
new file mode 100644
index 000000000..e5cbdc585
--- /dev/null
+++ b/debian/patches-rt/0352-workqueue-Fix-deadlock-due-to-recursive-locking-of-p.patch
@@ -0,0 +1,68 @@
+From: "Brennan Lamoreaux (VMware)" <brennanlamoreaux@gmail.com>
+Date: Tue, 28 Feb 2023 14:49:38 -0800
+Subject: [PATCH 352/353] workqueue: Fix deadlock due to recursive locking of
+ pool->lock
+Origin: https://git.kernel.org/cgit/linux/kernel/git/rt/linux-stable-rt.git/commit?id=813609bc5c58e47a292c3e8cbe961c494e4670a1
+
+Upstream commit d8bb65ab70f7 ("workqueue: Use rcuwait for wq_manager_wait")
+replaced the waitqueue with rcuwait in the workqueue code. This change
+involved removing the acquisition of pool->lock in put_unbound_pool(),
+as it also adds the function wq_manager_inactive() which acquires this same
+lock and is called one line later as a parameter to rcu_wait_event().
+
+However, the backport of this commit in the PREEMPT_RT patchset
+4.19.255-rt114 (patch 347) missed the removal of the acquisition of
+pool->lock in put_unbound_pool(). This leads to a deadlock due to
+recursive locking of pool->lock, as shown below in lockdep:
+
+[ 252.083713] WARNING: possible recursive locking detected
+[ 252.083718] 4.19.269-3.ph3-rt #1-photon Not tainted
+[ 252.083721] --------------------------------------------
+[ 252.083733] kworker/2:0/33 is trying to acquire lock:
+[ 252.083747] 000000000b7b1ceb (&pool->lock/1){....}, at:
+put_unbound_pool+0x10d/0x260
+
+[ 252.083857]
+ but task is already holding lock:
+[ 252.083860] 000000000b7b1ceb (&pool->lock/1){....}, at:
+put_unbound_pool+0xbd/0x260
+
+[ 252.083876]
+ other info that might help us debug this:
+[ 252.083897] Possible unsafe locking scenario:
+
+[ 252.083900] CPU0
+[ 252.083903] ----
+[ 252.083904] lock(&pool->lock/1);
+[ 252.083911] lock(&pool->lock/1);
+[ 252.083919]
+ *** DEADLOCK ***
+
+[ 252.083921] May be due to missing lock nesting notation
+
+Fix this deadlock by removing the pool->lock acquisition in
+put_unbound_pool().
+
+Signed-off-by: Brennan Lamoreaux (VMware) <brennanlamoreaux@gmail.com>
+Cc: Daniel Wagner <wagi@monom.org>
+Cc: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
+Cc: Tejun Heo <tj@kernel.org>
+Reviewed-by: Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu>
+Link: https://lore.kernel.org/r/20230228224938.88035-1-brennanlamoreaux@gmail.com
+Signed-off-by: Daniel Wagner <wagi@monom.org>
+---
+ kernel/workqueue.c | 1 -
+ 1 file changed, 1 deletion(-)
+
+diff --git a/kernel/workqueue.c b/kernel/workqueue.c
+index a9f3cc02bdc1..55ebdd56a5de 100644
+--- a/kernel/workqueue.c
++++ b/kernel/workqueue.c
+@@ -3394,7 +3394,6 @@ static void put_unbound_pool(struct worker_pool *pool)
+ * Because of how wq_manager_inactive() works, we will hold the
+ * spinlock after a successful wait.
+ */
+- raw_spin_lock_irq(&pool->lock);
+ rcuwait_wait_event(&manager_wait, wq_manager_inactive(pool),
+ TASK_UNINTERRUPTIBLE);
+ pool->flags |= POOL_MANAGER_ACTIVE;