diff options
| author | zhidao su <suzhidao@xiaomi.com> | 2026-03-09 10:46:12 +0800 |
|---|---|---|
| committer | Tejun Heo <tj@kernel.org> | 2026-03-09 06:08:26 -1000 |
| commit | 2fcfe5951eb2e8440fc5e1dd6ea977336ff83a1d (patch) | |
| tree | 014b793cbe1f708060704a84863435b12e8a5877 /kernel/livepatch/shadow.c | |
| parent | 57ccf5ccdc56954f2a91a7f66684fd31c566bde5 (diff) | |
sched_ext: Use WRITE_ONCE() for the write side of scx_enable helper pointer
scx_enable() uses double-checked locking to lazily initialize a static
kthread_worker pointer. The fast path reads helper locklessly:
if (!READ_ONCE(helper)) { // lockless read -- no helper_mutex
The write side initializes helper under helper_mutex, but previously
used a plain assignment:
helper = kthread_run_worker(0, "scx_enable_helper");
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
plain write -- KCSAN data race with READ_ONCE() above
Since READ_ONCE() on the fast path and the plain write on the
initialization path access the same variable without a common lock,
they constitute a data race. KCSAN requires that all sides of a
lock-free access use READ_ONCE()/WRITE_ONCE() consistently.
Use a temporary variable to stage the result of kthread_run_worker(),
and only WRITE_ONCE() into helper after confirming the pointer is
valid. This avoids a window where a concurrent caller on the fast path
could observe an ERR pointer via READ_ONCE(helper) before the error
check completes.
Fixes: b06ccbabe250 ("sched_ext: Fix starvation of scx_enable() under fair-class saturation")
Signed-off-by: zhidao su <suzhidao@xiaomi.com>
Acked-by: Andrea Righi <arighi@nvidia.com>
Signed-off-by: Tejun Heo <tj@kernel.org>
Diffstat (limited to 'kernel/livepatch/shadow.c')
0 files changed, 0 insertions, 0 deletions
