Peter Zijlstra 85d68222dd rcu: Break rcu_node_0 --> &rq->__lock order
Commit 851a723e45d1 ("sched: Always clear user_cpus_ptr in
do_set_cpus_allowed()") added a kfree() call to free any user
provided affinity mask, if present. It was changed later to use
kfree_rcu() in commit 9a5418bc48ba ("sched/core: Use kfree_rcu()
in do_set_cpus_allowed()") to avoid a circular locking dependency
problem.

It turns out that even kfree_rcu() isn't safe for avoiding
circular locking problem. As reported by kernel test robot,
the following circular locking dependency now exists:

  &rdp->nocb_lock --> rcu_node_0 --> &rq->__lock

Solve this by breaking the rcu_node_0 --> &rq->__lock chain by moving
the resched_cpu() out from under rcu_node lock.

[peterz: heavily borrowed from Waiman's Changelog]
[paulmck: applied Z qiang feedback]

Fixes: 851a723e45d1 ("sched: Always clear user_cpus_ptr in do_set_cpus_allowed()")
Reported-by: kernel test robot <oliver.sang@intel.com>
Acked-by: Waiman Long <longman@redhat.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/oe-lkp/202310302207.a25f1a30-oliver.sang@intel.com
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-11-01 21:39:58 +01:00
..
2023-10-30 09:47:13 -10:00
2023-09-05 11:01:47 -07:00
2023-09-04 13:20:19 -07:00
2023-10-30 17:27:56 -10:00
2023-10-30 18:01:41 -10:00
2023-10-30 13:12:15 -10:00
2023-10-30 09:14:19 -10:00
2022-09-26 10:13:13 -07:00
2023-10-30 18:01:41 -10:00
2023-08-18 10:18:49 -07:00
2023-10-19 11:02:48 +02:00
2023-03-24 11:01:29 +01:00
2023-10-19 11:02:48 +02:00
2023-08-30 09:16:56 -07:00
2023-08-23 09:38:17 +09:00
2023-06-28 15:51:08 -07:00
2023-09-19 13:21:33 -07:00
2023-10-30 17:56:53 -10:00
2023-09-21 19:22:10 +02:00
2023-08-15 15:26:17 -07:00