On Fri, 2 Sep 2016, Felipe Balbi wrote:

> >> I just noticed that the kerneldoc for wake_up_process() says that the 
> >> caller should assume a write memory barrier if and only if any tasks 
> >> are woken up.  So if the task is already running, there is no barrier.
> >>
> >> This means that in f_mass_storage's wakeup_thread(), there may be a 
> >> race involving wake_up_process() reading the thread's state and the 
> >> write to common->thread_wakeup_needed.
> >>
> >>    wakeup_thread():
> >>            common->thread_wakeup_needed = 1;
> >>            wake_up_process(common->thread_task);
> >>                    /* reads the thread's state */
> >>
> >>    sleep_thread():
> >>            set_current_state(TASK_INTERRUPTIBLE);
> >>            if (common->thread_wakeup_needed)
> >>                    break;
> >>
> >> Now, set_current_state() implicitly has a memory barrier at the end.  
> >> But since wake_up_process() doesn't always add a barrier the start, 
> >> we may need to do this explicitly.
> >>
> >> Without that barrier, the CPU might execute the read in
> >> wake_up_process() before setting thread_wakeup_needed to 1.  Then
> >> sleep_thread() would slip through the crack, and the thread wouldn't
> >> run.
> >>
> >> You can try adding smp_mb() in wakeup_thread(), just before the call to 
> >> wake_up_process().
> >
> > heh, it would've taken me weeks to figure this out :-) thanks
> >
> > BTW, what are those barriers protecting in g_mass_storage? Its own
> > internal flags or the task state?

I'm not sure which barriers you're referring to; there's a number of
them.  But I think they are all intended to protect the driver's
internal variables, not the task state.

> > If it's protecting own flags, then isn't the following enough?
> >
> > diff --git a/drivers/usb/gadget/function/f_mass_storage.c 
> > b/drivers/usb/gadget/function/f_mass_storage.c
> > index 8f3659b65f53..e3b03decdb6b 100644
> > --- a/drivers/usb/gadget/function/f_mass_storage.c
> > +++ b/drivers/usb/gadget/function/f_mass_storage.c
> > @@ -395,7 +395,7 @@ static int fsg_set_halt(struct fsg_dev *fsg, struct 
> > usb_ep *ep)
> >  /* Caller must hold fsg->lock */
> >  static void wakeup_thread(struct fsg_common *common)
> >  {
> > -       smp_wmb();      /* ensure the write of bh->state is complete */
> > +       smp_mb();       /* ensure the write of bh->state is complete */
> >         /* Tell the main thread that something has happened */
> >         common->thread_wakeup_needed = 1;
> >         if (common->thread_task)
> >
> > I'm probably missing some detail here :-s
> 
> oh no, you're trying to make sure the write to
> common->thread_wakeup_needed is seen by sleep_thread(), right?

Exactly.

> In that case, couldn't we conditionally add smp_mb() based on the result
> of wake_up_process()? IOW:
> 
>       if (!wake_up_process(common->thread_task))
>               smp_mb();
> 
> would this still work?

No, that would be too late.  The barrier needs to go between the write 
to common->thead_wakeup_needed and the call to wake_up_process().  

Otherwise what I wrote above could happen: The CPU could read the task
state (in wake_up_process()) before it writes out the new value for
thread_wakeup_needed, and sleep_thread() could run on another CPU
during that tiny window.  wake_up_process() would see that the thread's
state was still TASK_RUNNING, so it wouldn't do anything, and
sleep_thread() would see that thread_wakeup_needed was still 0, so it
would put the thread to sleep.

Now, I can't tell if this is really what caused your problem.  Still,
it seems like a necessary thing to do.  Maybe I'll check this with Paul
McKenney.

(IMO, the default version of wake_up_process() should have this memory
barrier built-in.  Otherwise races like this are too hard to track
down.  There could be a different version without the barrier, say
__wake_up_process(), for places where it's known to be unnecessary.  
That's how set_current_state() and __set_current_state() are
implemented.)

Alan Stern

--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to