From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754175AbdKAIO7 (ORCPT ); Wed, 1 Nov 2017 04:14:59 -0400 Received: from bombadil.infradead.org ([65.50.211.133]:56722 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751721AbdKAIO4 (ORCPT ); Wed, 1 Nov 2017 04:14:56 -0400 Date: Wed, 1 Nov 2017 09:14:50 +0100 From: Peter Zijlstra To: Thomas Gleixner Cc: Guenter Roeck , linux-kernel@vger.kernel.org, Don Zickus , Ingo Molnar Subject: Re: Crashes in perf_event_ctx_lock_nested Message-ID: <20171101081450.waqzz2ftebaw3tal@hirez.programming.kicks-ass.net> References: <20171030224512.GA13592@roeck-us.net> <20171031134850.ynix2zqypmca2mtt@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 31, 2017 at 10:32:00PM +0100, Thomas Gleixner wrote: > That means we can have the following situation: > > lock(watchdog_mutex); > lockup_detector_reconfigure(); > cpus_read_lock(); > stop(); > park() > update(); > start(); > unpark() > cpus_read_unlock(); thread runs() > cleanup(); > unlock(watchdog_mutex); > Isn't there also a where hardlockup_detector_perf_init() creates an event to 'probe' stuff, and then hardlockup_detector_perf_enable() _again_ creates the event?