From: Vlastimil Babka <email@example.com> To: Sebastian Andrzej Siewior <firstname.lastname@example.org>, email@example.com, firstname.lastname@example.org Cc: email@example.com, "Steven J . Hill" <firstname.lastname@example.org>, Tejun Heo <email@example.com>, Andrew Morton <firstname.lastname@example.org>, Christoph Lameter <email@example.com> Subject: Re: [PATCH REPOST] Revert mm/vmstat.c: fix vmstat_update() preemption BUG Date: Mon, 7 May 2018 09:31:05 +0200 [thread overview] Message-ID: <firstname.lastname@example.org> (raw) In-Reply-To: <email@example.com> On 05/04/2018 12:44 PM, Sebastian Andrzej Siewior wrote: > This patch reverts commit c7f26ccfb2c3 ("mm/vmstat.c: fix > vmstat_update() preemption BUG"). > Steven saw a "using smp_processor_id() in preemptible" message and > added a preempt_disable() section around it to keep it quiet. This is > not the right thing to do it does not fix the real problem. > > vmstat_update() is invoked by a kworker on a specific CPU. This worker > it bound to this CPU. The name of the worker was "kworker/1:1" so it > should have been a worker which was bound to CPU1. A worker which can > run on any CPU would have a `u' before the first digit. > > smp_processor_id() can be used in a preempt-enabled region as long as > the task is bound to a single CPU which is the case here. If it could > run on an arbitrary CPU then this is the problem we have an should seek > to resolve. > Not only this smp_processor_id() must not be migrated to another CPU but > also refresh_cpu_vm_stats() which might access wrong per-CPU variables. > Not to mention that other code relies on the fact that such a worker > runs on one specific CPU only. > > Therefore I revert that commit and we should look instead what broke the > affinity mask of the kworker. Yes. I think there's an important detail that should be perhaps included explicitly here. The check check_preemption_disabled() does include this test: /* * Kernel threads bound to a single CPU can safely use * smp_processor_id(): */ if (cpumask_equal(¤t->cpus_allowed, cpumask_of(this_cpu))) goto out; So indeed, if kworkers work as expected, there's no false positive bug. The report in commit c7f26ccfb2c3 included: BUG: using smp_processor_id() in preemptible  code: kworker/1:1/269 caller is vmstat_update+0x50/0xa0 CPU: 0 PID: 269 Comm: kworker/1:1 Not tainted I.e. kworker/1 running on CPU 0. Because the BUG was reported, we know that the test above did not prevent it. That means either the kworker's cpumask was not restricted to CPU 1 (it included also cpu 0), or it was restricted, but the restriction was ignored, and it still executed on cpu 0. Note the report also said "Attempting to hotplug CPUs with CONFIG_VM_EVENT_COUNTERS enabled can...". IIRC Tejun mentioned that during hotplug (or hotremove, actually?) the guarantees are off, but vmstat should not schedule work items on such cpus due to its hooks/checks. In any case I agree that the revert should be done immediately even before fixing the underlying bug. The preempt_disable/enable doesn't prevent the bug, it only prevents the debugging code from actually reporting it! Note that it's debugging code (CONFIG_DEBUG_PREEMPT) that production kernels most likely don't have enabled, so we are not even helping them not crash (while allowing possible data corruption). Acked-by: Vlastimil Babka <firstname.lastname@example.org> > Cc: Steven J. Hill <email@example.com> > Cc: Tejun Heo <firstname.lastname@example.org> > Cc: Andrew Morton <email@example.com> > Signed-off-by: Sebastian Andrzej Siewior <firstname.lastname@example.org> > --- > mm/vmstat.c | 2 -- > 1 file changed, 2 deletions(-) > > diff --git a/mm/vmstat.c b/mm/vmstat.c > index 33581be705f0..40b2db6db6b1 100644 > --- a/mm/vmstat.c > +++ b/mm/vmstat.c > @@ -1839,11 +1839,9 @@ static void vmstat_update(struct work_struct *w) > * to occur in the future. Keep on running the > * update worker thread. > */ > - preempt_disable(); > queue_delayed_work_on(smp_processor_id(), mm_percpu_wq, > this_cpu_ptr(&vmstat_work), > round_jiffies_relative(sysctl_stat_interval)); > - preempt_enable(); > } > } > >
next prev parent reply other threads:[~2018-05-07 7:31 UTC|newest] Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top 2018-05-04 10:44 Sebastian Andrzej Siewior 2018-05-07 7:31 ` Vlastimil Babka [this message] 2018-05-08 23:02 ` Andrew Morton 2018-05-09 22:35 ` Sebastian Andrzej Siewior 2018-05-10 6:32 ` Vlastimil Babka 2018-06-13 21:46 ` Thomas Gleixner 2018-06-14 21:27 ` Andrew Morton 2018-06-27 19:40 ` Steven Rostedt
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --subject='Re: [PATCH REPOST] Revert mm/vmstat.c: fix vmstat_update() preemption BUG' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.