All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
@ 2023-01-04 18:17 Wander Lairson Costa
  2023-01-10  1:33 ` Paul E. McKenney
  2023-01-19 18:03 ` Valentin Schneider
  0 siblings, 2 replies; 9+ messages in thread
From: Wander Lairson Costa @ 2023-01-04 18:17 UTC (permalink / raw)
  To: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, Valentin Schneider,
	open list:SCHEDULER
  Cc: Wander Lairson Costa, Paul McKenney, Thomas Gleixner

inactive_task_timer() executes in interrupt (atomic) context. It calls
put_task_struct(), which indirectly acquires sleeping locks under
PREEMPT_RT.

Below is an example of a splat that happened in a test environment:

 CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
 Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
 Call Trace:
 dump_stack_lvl+0x57/0x7d
 mark_lock_irq.cold+0x33/0xba
 ? stack_trace_save+0x4b/0x70
 ? save_trace+0x55/0x150
 mark_lock+0x1e7/0x400
 mark_usage+0x11d/0x140
 __lock_acquire+0x30d/0x930
 lock_acquire.part.0+0x9c/0x210
 ? refill_obj_stock+0x3d/0x3a0
 ? rcu_read_lock_sched_held+0x3f/0x70
 ? trace_lock_acquire+0x38/0x140
 ? lock_acquire+0x30/0x80
 ? refill_obj_stock+0x3d/0x3a0
 rt_spin_lock+0x27/0xe0
 ? refill_obj_stock+0x3d/0x3a0
 refill_obj_stock+0x3d/0x3a0
 ? inactive_task_timer+0x1ad/0x340
 kmem_cache_free+0x357/0x560
 inactive_task_timer+0x1ad/0x340
 ? switched_from_dl+0x2d0/0x2d0
 __run_hrtimer+0x8a/0x1a0
 __hrtimer_run_queues+0x91/0x130
 hrtimer_interrupt+0x10f/0x220
 __sysvec_apic_timer_interrupt+0x7b/0xd0
 sysvec_apic_timer_interrupt+0x4f/0xd0
 ? asm_sysvec_apic_timer_interrupt+0xa/0x20
 asm_sysvec_apic_timer_interrupt+0x12/0x20
 RIP: 0033:0x7fff196bf6f5

Instead of calling put_task_struct() directly, we defer it using
call_rcu(). A more natural approach would use a workqueue, but since
in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
the code would become more complex because we would need to put the
work_struct instance in the task_struct and initialize it when we
allocate a new task_struct.

Signed-off-by: Wander Lairson Costa <wander@redhat.com>
Cc: Paul McKenney <paulmck@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
---
 kernel/sched/build_policy.c |  1 +
 kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
 2 files changed, 24 insertions(+), 1 deletion(-)

diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
index d9dc9ab3773f..f159304ee792 100644
--- a/kernel/sched/build_policy.c
+++ b/kernel/sched/build_policy.c
@@ -28,6 +28,7 @@
 #include <linux/suspend.h>
 #include <linux/tsacct_kern.h>
 #include <linux/vtime.h>
+#include <linux/rcupdate.h>
 
 #include <uapi/linux/sched/types.h>
 
diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
index 9ae8f41e3372..ab9301d4cc24 100644
--- a/kernel/sched/deadline.c
+++ b/kernel/sched/deadline.c
@@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
 	}
 }
 
+static void delayed_put_task_struct(struct rcu_head *rhp)
+{
+	struct task_struct *task = container_of(rhp, struct task_struct, rcu);
+
+	__put_task_struct(task);
+}
+
 static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
 {
 	struct sched_dl_entity *dl_se = container_of(timer,
@@ -1442,7 +1449,22 @@ static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
 	dl_se->dl_non_contending = 0;
 unlock:
 	task_rq_unlock(rq, p, &rf);
-	put_task_struct(p);
+
+	if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
+		/*
+		 * Decrement the refcount explicitly to avoid unnecessarily
+		 * calling call_rcu.
+		 */
+		if (refcount_dec_and_test(&p->usage))
+			/*
+			 * under PREEMPT_RT, we can't call put_task_struct
+			 * in atomic context because it will indirectly
+			 * acquire sleeping locks.
+			 */
+			call_rcu(&p->rcu, delayed_put_task_struct);
+	} else {
+		put_task_struct(p);
+	}
 
 	return HRTIMER_NORESTART;
 }
-- 
2.39.0


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-04 18:17 [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT Wander Lairson Costa
@ 2023-01-10  1:33 ` Paul E. McKenney
  2023-01-10 20:52   ` Wander Lairson Costa
  2023-01-19 18:03 ` Valentin Schneider
  1 sibling, 1 reply; 9+ messages in thread
From: Paul E. McKenney @ 2023-01-10  1:33 UTC (permalink / raw)
  To: Wander Lairson Costa
  Cc: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, Valentin Schneider,
	open list:SCHEDULER, Thomas Gleixner

On Wed, Jan 04, 2023 at 03:17:01PM -0300, Wander Lairson Costa wrote:
> inactive_task_timer() executes in interrupt (atomic) context. It calls
> put_task_struct(), which indirectly acquires sleeping locks under
> PREEMPT_RT.
> 
> Below is an example of a splat that happened in a test environment:
> 
>  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
>  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
>  Call Trace:
>  dump_stack_lvl+0x57/0x7d
>  mark_lock_irq.cold+0x33/0xba
>  ? stack_trace_save+0x4b/0x70
>  ? save_trace+0x55/0x150
>  mark_lock+0x1e7/0x400
>  mark_usage+0x11d/0x140
>  __lock_acquire+0x30d/0x930
>  lock_acquire.part.0+0x9c/0x210
>  ? refill_obj_stock+0x3d/0x3a0
>  ? rcu_read_lock_sched_held+0x3f/0x70
>  ? trace_lock_acquire+0x38/0x140
>  ? lock_acquire+0x30/0x80
>  ? refill_obj_stock+0x3d/0x3a0
>  rt_spin_lock+0x27/0xe0
>  ? refill_obj_stock+0x3d/0x3a0
>  refill_obj_stock+0x3d/0x3a0
>  ? inactive_task_timer+0x1ad/0x340
>  kmem_cache_free+0x357/0x560
>  inactive_task_timer+0x1ad/0x340
>  ? switched_from_dl+0x2d0/0x2d0
>  __run_hrtimer+0x8a/0x1a0
>  __hrtimer_run_queues+0x91/0x130
>  hrtimer_interrupt+0x10f/0x220
>  __sysvec_apic_timer_interrupt+0x7b/0xd0
>  sysvec_apic_timer_interrupt+0x4f/0xd0
>  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
>  asm_sysvec_apic_timer_interrupt+0x12/0x20
>  RIP: 0033:0x7fff196bf6f5
> 
> Instead of calling put_task_struct() directly, we defer it using
> call_rcu(). A more natural approach would use a workqueue, but since
> in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> the code would become more complex because we would need to put the
> work_struct instance in the task_struct and initialize it when we
> allocate a new task_struct.
> 
> Signed-off-by: Wander Lairson Costa <wander@redhat.com>
> Cc: Paul McKenney <paulmck@kernel.org>
> Cc: Thomas Gleixner <tglx@linutronix.de>
> ---
>  kernel/sched/build_policy.c |  1 +
>  kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
>  2 files changed, 24 insertions(+), 1 deletion(-)
> 
> diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
> index d9dc9ab3773f..f159304ee792 100644
> --- a/kernel/sched/build_policy.c
> +++ b/kernel/sched/build_policy.c
> @@ -28,6 +28,7 @@
>  #include <linux/suspend.h>
>  #include <linux/tsacct_kern.h>
>  #include <linux/vtime.h>
> +#include <linux/rcupdate.h>
>  
>  #include <uapi/linux/sched/types.h>
>  
> diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
> index 9ae8f41e3372..ab9301d4cc24 100644
> --- a/kernel/sched/deadline.c
> +++ b/kernel/sched/deadline.c
> @@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
>  	}
>  }
>  
> +static void delayed_put_task_struct(struct rcu_head *rhp)
> +{
> +	struct task_struct *task = container_of(rhp, struct task_struct, rcu);
> +
> +	__put_task_struct(task);

Please note that BH is disabled here.  Don't you therefore
need to schedule a workqueue handler?  Perhaps directly from
inactive_task_timer(), or maybe from this point.  If the latter, one
way to skip the extra step is to use queue_rcu_work().

							Thanx, Paul

> +}
> +
>  static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
>  {
>  	struct sched_dl_entity *dl_se = container_of(timer,
> @@ -1442,7 +1449,22 @@ static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
>  	dl_se->dl_non_contending = 0;
>  unlock:
>  	task_rq_unlock(rq, p, &rf);
> -	put_task_struct(p);
> +
> +	if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
> +		/*
> +		 * Decrement the refcount explicitly to avoid unnecessarily
> +		 * calling call_rcu.
> +		 */
> +		if (refcount_dec_and_test(&p->usage))
> +			/*
> +			 * under PREEMPT_RT, we can't call put_task_struct
> +			 * in atomic context because it will indirectly
> +			 * acquire sleeping locks.
> +			 */
> +			call_rcu(&p->rcu, delayed_put_task_struct);
> +	} else {
> +		put_task_struct(p);
> +	}
>  
>  	return HRTIMER_NORESTART;
>  }
> -- 
> 2.39.0
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-10  1:33 ` Paul E. McKenney
@ 2023-01-10 20:52   ` Wander Lairson Costa
  2023-01-10 22:27     ` Paul E. McKenney
  0 siblings, 1 reply; 9+ messages in thread
From: Wander Lairson Costa @ 2023-01-10 20:52 UTC (permalink / raw)
  To: paulmck
  Cc: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, Valentin Schneider,
	open list:SCHEDULER, Thomas Gleixner

On Mon, Jan 9, 2023 at 10:40 PM Paul E. McKenney <paulmck@kernel.org> wrote:
>
> On Wed, Jan 04, 2023 at 03:17:01PM -0300, Wander Lairson Costa wrote:
> > inactive_task_timer() executes in interrupt (atomic) context. It calls
> > put_task_struct(), which indirectly acquires sleeping locks under
> > PREEMPT_RT.
> >
> > Below is an example of a splat that happened in a test environment:
> >
> >  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
> >  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
> >  Call Trace:
> >  dump_stack_lvl+0x57/0x7d
> >  mark_lock_irq.cold+0x33/0xba
> >  ? stack_trace_save+0x4b/0x70
> >  ? save_trace+0x55/0x150
> >  mark_lock+0x1e7/0x400
> >  mark_usage+0x11d/0x140
> >  __lock_acquire+0x30d/0x930
> >  lock_acquire.part.0+0x9c/0x210
> >  ? refill_obj_stock+0x3d/0x3a0
> >  ? rcu_read_lock_sched_held+0x3f/0x70
> >  ? trace_lock_acquire+0x38/0x140
> >  ? lock_acquire+0x30/0x80
> >  ? refill_obj_stock+0x3d/0x3a0
> >  rt_spin_lock+0x27/0xe0
> >  ? refill_obj_stock+0x3d/0x3a0
> >  refill_obj_stock+0x3d/0x3a0
> >  ? inactive_task_timer+0x1ad/0x340
> >  kmem_cache_free+0x357/0x560
> >  inactive_task_timer+0x1ad/0x340
> >  ? switched_from_dl+0x2d0/0x2d0
> >  __run_hrtimer+0x8a/0x1a0
> >  __hrtimer_run_queues+0x91/0x130
> >  hrtimer_interrupt+0x10f/0x220
> >  __sysvec_apic_timer_interrupt+0x7b/0xd0
> >  sysvec_apic_timer_interrupt+0x4f/0xd0
> >  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
> >  asm_sysvec_apic_timer_interrupt+0x12/0x20
> >  RIP: 0033:0x7fff196bf6f5
> >
> > Instead of calling put_task_struct() directly, we defer it using
> > call_rcu(). A more natural approach would use a workqueue, but since
> > in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> > the code would become more complex because we would need to put the
> > work_struct instance in the task_struct and initialize it when we
> > allocate a new task_struct.
> >
> > Signed-off-by: Wander Lairson Costa <wander@redhat.com>
> > Cc: Paul McKenney <paulmck@kernel.org>
> > Cc: Thomas Gleixner <tglx@linutronix.de>
> > ---
> >  kernel/sched/build_policy.c |  1 +
> >  kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
> >  2 files changed, 24 insertions(+), 1 deletion(-)
> >
> > diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
> > index d9dc9ab3773f..f159304ee792 100644
> > --- a/kernel/sched/build_policy.c
> > +++ b/kernel/sched/build_policy.c
> > @@ -28,6 +28,7 @@
> >  #include <linux/suspend.h>
> >  #include <linux/tsacct_kern.h>
> >  #include <linux/vtime.h>
> > +#include <linux/rcupdate.h>
> >
> >  #include <uapi/linux/sched/types.h>
> >
> > diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
> > index 9ae8f41e3372..ab9301d4cc24 100644
> > --- a/kernel/sched/deadline.c
> > +++ b/kernel/sched/deadline.c
> > @@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
> >       }
> >  }
> >
> > +static void delayed_put_task_struct(struct rcu_head *rhp)
> > +{
> > +     struct task_struct *task = container_of(rhp, struct task_struct, rcu);
> > +
> > +     __put_task_struct(task);
>
> Please note that BH is disabled here.  Don't you therefore
> need to schedule a workqueue handler?  Perhaps directly from
> inactive_task_timer(), or maybe from this point.  If the latter, one
> way to skip the extra step is to use queue_rcu_work().
>

My initial work was using a workqueue [1,2]. However, I realized I
could reach a much simpler code with call_rcu().
I am afraid my ignorance doesn't allow me to get your point. Does
disabling softirq imply atomic context?


[1] https://gitlab.com/walac/kernel-ark/-/commit/ec8addbe38d5c318f1789b4c0fa480a9d2afdb65
[2] https://gitlab.com/walac/kernel-ark/-/commit/0bde233235ffed233a7466a36a4866bc48064f54


>                                                         Thanx, Paul
>
> > +}
> > +
> >  static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
> >  {
> >       struct sched_dl_entity *dl_se = container_of(timer,
> > @@ -1442,7 +1449,22 @@ static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
> >       dl_se->dl_non_contending = 0;
> >  unlock:
> >       task_rq_unlock(rq, p, &rf);
> > -     put_task_struct(p);
> > +
> > +     if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
> > +             /*
> > +              * Decrement the refcount explicitly to avoid unnecessarily
> > +              * calling call_rcu.
> > +              */
> > +             if (refcount_dec_and_test(&p->usage))
> > +                     /*
> > +                      * under PREEMPT_RT, we can't call put_task_struct
> > +                      * in atomic context because it will indirectly
> > +                      * acquire sleeping locks.
> > +                      */
> > +                     call_rcu(&p->rcu, delayed_put_task_struct);
> > +     } else {
> > +             put_task_struct(p);
> > +     }
> >
> >       return HRTIMER_NORESTART;
> >  }
> > --
> > 2.39.0
> >
>


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-10 20:52   ` Wander Lairson Costa
@ 2023-01-10 22:27     ` Paul E. McKenney
  2023-01-18 15:57       ` Valentin Schneider
  0 siblings, 1 reply; 9+ messages in thread
From: Paul E. McKenney @ 2023-01-10 22:27 UTC (permalink / raw)
  To: Wander Lairson Costa
  Cc: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, Valentin Schneider,
	open list:SCHEDULER, Thomas Gleixner

On Tue, Jan 10, 2023 at 05:52:03PM -0300, Wander Lairson Costa wrote:
> On Mon, Jan 9, 2023 at 10:40 PM Paul E. McKenney <paulmck@kernel.org> wrote:
> >
> > On Wed, Jan 04, 2023 at 03:17:01PM -0300, Wander Lairson Costa wrote:
> > > inactive_task_timer() executes in interrupt (atomic) context. It calls
> > > put_task_struct(), which indirectly acquires sleeping locks under
> > > PREEMPT_RT.
> > >
> > > Below is an example of a splat that happened in a test environment:
> > >
> > >  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
> > >  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
> > >  Call Trace:
> > >  dump_stack_lvl+0x57/0x7d
> > >  mark_lock_irq.cold+0x33/0xba
> > >  ? stack_trace_save+0x4b/0x70
> > >  ? save_trace+0x55/0x150
> > >  mark_lock+0x1e7/0x400
> > >  mark_usage+0x11d/0x140
> > >  __lock_acquire+0x30d/0x930
> > >  lock_acquire.part.0+0x9c/0x210
> > >  ? refill_obj_stock+0x3d/0x3a0
> > >  ? rcu_read_lock_sched_held+0x3f/0x70
> > >  ? trace_lock_acquire+0x38/0x140
> > >  ? lock_acquire+0x30/0x80
> > >  ? refill_obj_stock+0x3d/0x3a0
> > >  rt_spin_lock+0x27/0xe0
> > >  ? refill_obj_stock+0x3d/0x3a0
> > >  refill_obj_stock+0x3d/0x3a0
> > >  ? inactive_task_timer+0x1ad/0x340
> > >  kmem_cache_free+0x357/0x560
> > >  inactive_task_timer+0x1ad/0x340
> > >  ? switched_from_dl+0x2d0/0x2d0
> > >  __run_hrtimer+0x8a/0x1a0
> > >  __hrtimer_run_queues+0x91/0x130
> > >  hrtimer_interrupt+0x10f/0x220
> > >  __sysvec_apic_timer_interrupt+0x7b/0xd0
> > >  sysvec_apic_timer_interrupt+0x4f/0xd0
> > >  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
> > >  asm_sysvec_apic_timer_interrupt+0x12/0x20
> > >  RIP: 0033:0x7fff196bf6f5
> > >
> > > Instead of calling put_task_struct() directly, we defer it using
> > > call_rcu(). A more natural approach would use a workqueue, but since
> > > in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> > > the code would become more complex because we would need to put the
> > > work_struct instance in the task_struct and initialize it when we
> > > allocate a new task_struct.
> > >
> > > Signed-off-by: Wander Lairson Costa <wander@redhat.com>
> > > Cc: Paul McKenney <paulmck@kernel.org>
> > > Cc: Thomas Gleixner <tglx@linutronix.de>
> > > ---
> > >  kernel/sched/build_policy.c |  1 +
> > >  kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
> > >  2 files changed, 24 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
> > > index d9dc9ab3773f..f159304ee792 100644
> > > --- a/kernel/sched/build_policy.c
> > > +++ b/kernel/sched/build_policy.c
> > > @@ -28,6 +28,7 @@
> > >  #include <linux/suspend.h>
> > >  #include <linux/tsacct_kern.h>
> > >  #include <linux/vtime.h>
> > > +#include <linux/rcupdate.h>
> > >
> > >  #include <uapi/linux/sched/types.h>
> > >
> > > diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
> > > index 9ae8f41e3372..ab9301d4cc24 100644
> > > --- a/kernel/sched/deadline.c
> > > +++ b/kernel/sched/deadline.c
> > > @@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
> > >       }
> > >  }
> > >
> > > +static void delayed_put_task_struct(struct rcu_head *rhp)
> > > +{
> > > +     struct task_struct *task = container_of(rhp, struct task_struct, rcu);
> > > +
> > > +     __put_task_struct(task);
> >
> > Please note that BH is disabled here.  Don't you therefore
> > need to schedule a workqueue handler?  Perhaps directly from
> > inactive_task_timer(), or maybe from this point.  If the latter, one
> > way to skip the extra step is to use queue_rcu_work().
> >
> 
> My initial work was using a workqueue [1,2]. However, I realized I
> could reach a much simpler code with call_rcu().
> I am afraid my ignorance doesn't allow me to get your point. Does
> disabling softirq imply atomic context?

Given that this problem occurred in PREEMPT_RT, I am assuming that the
appropriate definition of "atomic context" is "cannot call schedule()".
And you are in fact not permitted to call schedule() from a bh-disabled
region.

This also means that you cannot acquire a non-raw spinlock in a
bh-disabled region of code in a PREEMPT_RT kernel, because doing
so can invoke schedule.

Of course, using a workqueue does incur needless overhead in
non-PREEMPT_RT kernels.  So one alternative approach is to use
the workqueue only in PREEMPT_RT kernels and to just invoke
__put_task_struct() directly (without call_rcu() along the way)
otherwise.

Does that help, or am I missing your point?

						Thanx, Paul

> [1] https://gitlab.com/walac/kernel-ark/-/commit/ec8addbe38d5c318f1789b4c0fa480a9d2afdb65
> [2] https://gitlab.com/walac/kernel-ark/-/commit/0bde233235ffed233a7466a36a4866bc48064f54
> 
> 
> >                                                         Thanx, Paul
> >
> > > +}
> > > +
> > >  static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
> > >  {
> > >       struct sched_dl_entity *dl_se = container_of(timer,
> > > @@ -1442,7 +1449,22 @@ static enum hrtimer_restart inactive_task_timer(struct hrtimer *timer)
> > >       dl_se->dl_non_contending = 0;
> > >  unlock:
> > >       task_rq_unlock(rq, p, &rf);
> > > -     put_task_struct(p);
> > > +
> > > +     if (IS_ENABLED(CONFIG_PREEMPT_RT)) {
> > > +             /*
> > > +              * Decrement the refcount explicitly to avoid unnecessarily
> > > +              * calling call_rcu.
> > > +              */
> > > +             if (refcount_dec_and_test(&p->usage))
> > > +                     /*
> > > +                      * under PREEMPT_RT, we can't call put_task_struct
> > > +                      * in atomic context because it will indirectly
> > > +                      * acquire sleeping locks.
> > > +                      */
> > > +                     call_rcu(&p->rcu, delayed_put_task_struct);
> > > +     } else {
> > > +             put_task_struct(p);
> > > +     }
> > >
> > >       return HRTIMER_NORESTART;
> > >  }
> > > --
> > > 2.39.0
> > >
> >
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-10 22:27     ` Paul E. McKenney
@ 2023-01-18 15:57       ` Valentin Schneider
  2023-01-18 18:11         ` Paul E. McKenney
  0 siblings, 1 reply; 9+ messages in thread
From: Valentin Schneider @ 2023-01-18 15:57 UTC (permalink / raw)
  To: paulmck, Wander Lairson Costa
  Cc: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, open list:SCHEDULER, Thomas Gleixner

On 10/01/23 14:27, Paul E. McKenney wrote:
> On Tue, Jan 10, 2023 at 05:52:03PM -0300, Wander Lairson Costa wrote:
>> On Mon, Jan 9, 2023 at 10:40 PM Paul E. McKenney <paulmck@kernel.org> wrote:
>> >
>> > On Wed, Jan 04, 2023 at 03:17:01PM -0300, Wander Lairson Costa wrote:
>> > > inactive_task_timer() executes in interrupt (atomic) context. It calls
>> > > put_task_struct(), which indirectly acquires sleeping locks under
>> > > PREEMPT_RT.
>> > >
>> > > Below is an example of a splat that happened in a test environment:
>> > >
>> > >  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
>> > >  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
>> > >  Call Trace:
>> > >  dump_stack_lvl+0x57/0x7d
>> > >  mark_lock_irq.cold+0x33/0xba
>> > >  ? stack_trace_save+0x4b/0x70
>> > >  ? save_trace+0x55/0x150
>> > >  mark_lock+0x1e7/0x400
>> > >  mark_usage+0x11d/0x140
>> > >  __lock_acquire+0x30d/0x930
>> > >  lock_acquire.part.0+0x9c/0x210
>> > >  ? refill_obj_stock+0x3d/0x3a0
>> > >  ? rcu_read_lock_sched_held+0x3f/0x70
>> > >  ? trace_lock_acquire+0x38/0x140
>> > >  ? lock_acquire+0x30/0x80
>> > >  ? refill_obj_stock+0x3d/0x3a0
>> > >  rt_spin_lock+0x27/0xe0
>> > >  ? refill_obj_stock+0x3d/0x3a0
>> > >  refill_obj_stock+0x3d/0x3a0
>> > >  ? inactive_task_timer+0x1ad/0x340
>> > >  kmem_cache_free+0x357/0x560
>> > >  inactive_task_timer+0x1ad/0x340
>> > >  ? switched_from_dl+0x2d0/0x2d0
>> > >  __run_hrtimer+0x8a/0x1a0
>> > >  __hrtimer_run_queues+0x91/0x130
>> > >  hrtimer_interrupt+0x10f/0x220
>> > >  __sysvec_apic_timer_interrupt+0x7b/0xd0
>> > >  sysvec_apic_timer_interrupt+0x4f/0xd0
>> > >  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
>> > >  asm_sysvec_apic_timer_interrupt+0x12/0x20
>> > >  RIP: 0033:0x7fff196bf6f5
>> > >
>> > > Instead of calling put_task_struct() directly, we defer it using
>> > > call_rcu(). A more natural approach would use a workqueue, but since
>> > > in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
>> > > the code would become more complex because we would need to put the
>> > > work_struct instance in the task_struct and initialize it when we
>> > > allocate a new task_struct.
>> > >
>> > > Signed-off-by: Wander Lairson Costa <wander@redhat.com>
>> > > Cc: Paul McKenney <paulmck@kernel.org>
>> > > Cc: Thomas Gleixner <tglx@linutronix.de>
>> > > ---
>> > >  kernel/sched/build_policy.c |  1 +
>> > >  kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
>> > >  2 files changed, 24 insertions(+), 1 deletion(-)
>> > >
>> > > diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
>> > > index d9dc9ab3773f..f159304ee792 100644
>> > > --- a/kernel/sched/build_policy.c
>> > > +++ b/kernel/sched/build_policy.c
>> > > @@ -28,6 +28,7 @@
>> > >  #include <linux/suspend.h>
>> > >  #include <linux/tsacct_kern.h>
>> > >  #include <linux/vtime.h>
>> > > +#include <linux/rcupdate.h>
>> > >
>> > >  #include <uapi/linux/sched/types.h>
>> > >
>> > > diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
>> > > index 9ae8f41e3372..ab9301d4cc24 100644
>> > > --- a/kernel/sched/deadline.c
>> > > +++ b/kernel/sched/deadline.c
>> > > @@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
>> > >       }
>> > >  }
>> > >
>> > > +static void delayed_put_task_struct(struct rcu_head *rhp)
>> > > +{
>> > > +     struct task_struct *task = container_of(rhp, struct task_struct, rcu);
>> > > +
>> > > +     __put_task_struct(task);
>> >
>> > Please note that BH is disabled here.  Don't you therefore
>> > need to schedule a workqueue handler?  Perhaps directly from
>> > inactive_task_timer(), or maybe from this point.  If the latter, one
>> > way to skip the extra step is to use queue_rcu_work().
>> >
>>
>> My initial work was using a workqueue [1,2]. However, I realized I
>> could reach a much simpler code with call_rcu().
>> I am afraid my ignorance doesn't allow me to get your point. Does
>> disabling softirq imply atomic context?
>
> Given that this problem occurred in PREEMPT_RT, I am assuming that the
> appropriate definition of "atomic context" is "cannot call schedule()".
> And you are in fact not permitted to call schedule() from a bh-disabled
> region.
>
> This also means that you cannot acquire a non-raw spinlock in a
> bh-disabled region of code in a PREEMPT_RT kernel, because doing
> so can invoke schedule.
>

But per the PREEMPT_RT lock "replacement", non-raw spinlocks end up
invoking schedule_rtlock(), which should be safe vs BH disabled
(local_lock() + rcu_read_lock()):

  6991436c2b5d ("sched/core: Provide a scheduling point for RT locks")

Unless I'm missing something else?


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-18 15:57       ` Valentin Schneider
@ 2023-01-18 18:11         ` Paul E. McKenney
  2023-01-18 18:28           ` Valentin Schneider
  0 siblings, 1 reply; 9+ messages in thread
From: Paul E. McKenney @ 2023-01-18 18:11 UTC (permalink / raw)
  To: Valentin Schneider
  Cc: Wander Lairson Costa, Ingo Molnar, Peter Zijlstra, Juri Lelli,
	Vincent Guittot, Dietmar Eggemann, Steven Rostedt, Ben Segall,
	Mel Gorman, Daniel Bristot de Oliveira, open list:SCHEDULER,
	Thomas Gleixner

On Wed, Jan 18, 2023 at 03:57:38PM +0000, Valentin Schneider wrote:
> On 10/01/23 14:27, Paul E. McKenney wrote:
> > On Tue, Jan 10, 2023 at 05:52:03PM -0300, Wander Lairson Costa wrote:
> >> On Mon, Jan 9, 2023 at 10:40 PM Paul E. McKenney <paulmck@kernel.org> wrote:
> >> >
> >> > On Wed, Jan 04, 2023 at 03:17:01PM -0300, Wander Lairson Costa wrote:
> >> > > inactive_task_timer() executes in interrupt (atomic) context. It calls
> >> > > put_task_struct(), which indirectly acquires sleeping locks under
> >> > > PREEMPT_RT.
> >> > >
> >> > > Below is an example of a splat that happened in a test environment:
> >> > >
> >> > >  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
> >> > >  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
> >> > >  Call Trace:
> >> > >  dump_stack_lvl+0x57/0x7d
> >> > >  mark_lock_irq.cold+0x33/0xba
> >> > >  ? stack_trace_save+0x4b/0x70
> >> > >  ? save_trace+0x55/0x150
> >> > >  mark_lock+0x1e7/0x400
> >> > >  mark_usage+0x11d/0x140
> >> > >  __lock_acquire+0x30d/0x930
> >> > >  lock_acquire.part.0+0x9c/0x210
> >> > >  ? refill_obj_stock+0x3d/0x3a0
> >> > >  ? rcu_read_lock_sched_held+0x3f/0x70
> >> > >  ? trace_lock_acquire+0x38/0x140
> >> > >  ? lock_acquire+0x30/0x80
> >> > >  ? refill_obj_stock+0x3d/0x3a0
> >> > >  rt_spin_lock+0x27/0xe0
> >> > >  ? refill_obj_stock+0x3d/0x3a0
> >> > >  refill_obj_stock+0x3d/0x3a0
> >> > >  ? inactive_task_timer+0x1ad/0x340
> >> > >  kmem_cache_free+0x357/0x560
> >> > >  inactive_task_timer+0x1ad/0x340
> >> > >  ? switched_from_dl+0x2d0/0x2d0
> >> > >  __run_hrtimer+0x8a/0x1a0
> >> > >  __hrtimer_run_queues+0x91/0x130
> >> > >  hrtimer_interrupt+0x10f/0x220
> >> > >  __sysvec_apic_timer_interrupt+0x7b/0xd0
> >> > >  sysvec_apic_timer_interrupt+0x4f/0xd0
> >> > >  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
> >> > >  asm_sysvec_apic_timer_interrupt+0x12/0x20
> >> > >  RIP: 0033:0x7fff196bf6f5
> >> > >
> >> > > Instead of calling put_task_struct() directly, we defer it using
> >> > > call_rcu(). A more natural approach would use a workqueue, but since
> >> > > in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> >> > > the code would become more complex because we would need to put the
> >> > > work_struct instance in the task_struct and initialize it when we
> >> > > allocate a new task_struct.
> >> > >
> >> > > Signed-off-by: Wander Lairson Costa <wander@redhat.com>
> >> > > Cc: Paul McKenney <paulmck@kernel.org>
> >> > > Cc: Thomas Gleixner <tglx@linutronix.de>
> >> > > ---
> >> > >  kernel/sched/build_policy.c |  1 +
> >> > >  kernel/sched/deadline.c     | 24 +++++++++++++++++++++++-
> >> > >  2 files changed, 24 insertions(+), 1 deletion(-)
> >> > >
> >> > > diff --git a/kernel/sched/build_policy.c b/kernel/sched/build_policy.c
> >> > > index d9dc9ab3773f..f159304ee792 100644
> >> > > --- a/kernel/sched/build_policy.c
> >> > > +++ b/kernel/sched/build_policy.c
> >> > > @@ -28,6 +28,7 @@
> >> > >  #include <linux/suspend.h>
> >> > >  #include <linux/tsacct_kern.h>
> >> > >  #include <linux/vtime.h>
> >> > > +#include <linux/rcupdate.h>
> >> > >
> >> > >  #include <uapi/linux/sched/types.h>
> >> > >
> >> > > diff --git a/kernel/sched/deadline.c b/kernel/sched/deadline.c
> >> > > index 9ae8f41e3372..ab9301d4cc24 100644
> >> > > --- a/kernel/sched/deadline.c
> >> > > +++ b/kernel/sched/deadline.c
> >> > > @@ -1405,6 +1405,13 @@ static void update_curr_dl(struct rq *rq)
> >> > >       }
> >> > >  }
> >> > >
> >> > > +static void delayed_put_task_struct(struct rcu_head *rhp)
> >> > > +{
> >> > > +     struct task_struct *task = container_of(rhp, struct task_struct, rcu);
> >> > > +
> >> > > +     __put_task_struct(task);
> >> >
> >> > Please note that BH is disabled here.  Don't you therefore
> >> > need to schedule a workqueue handler?  Perhaps directly from
> >> > inactive_task_timer(), or maybe from this point.  If the latter, one
> >> > way to skip the extra step is to use queue_rcu_work().
> >> >
> >>
> >> My initial work was using a workqueue [1,2]. However, I realized I
> >> could reach a much simpler code with call_rcu().
> >> I am afraid my ignorance doesn't allow me to get your point. Does
> >> disabling softirq imply atomic context?
> >
> > Given that this problem occurred in PREEMPT_RT, I am assuming that the
> > appropriate definition of "atomic context" is "cannot call schedule()".
> > And you are in fact not permitted to call schedule() from a bh-disabled
> > region.
> >
> > This also means that you cannot acquire a non-raw spinlock in a
> > bh-disabled region of code in a PREEMPT_RT kernel, because doing
> > so can invoke schedule.
> 
> But per the PREEMPT_RT lock "replacement", non-raw spinlocks end up
> invoking schedule_rtlock(), which should be safe vs BH disabled
> (local_lock() + rcu_read_lock()):
> 
>   6991436c2b5d ("sched/core: Provide a scheduling point for RT locks")
> 
> Unless I'm missing something else?

No, you miss nothing.  Apologies for my confusion!

(I could have sworn that someone else corrected me on this earlier,
but I don't see it right off hand.)

							Thanx, Paul

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-18 18:11         ` Paul E. McKenney
@ 2023-01-18 18:28           ` Valentin Schneider
  0 siblings, 0 replies; 9+ messages in thread
From: Valentin Schneider @ 2023-01-18 18:28 UTC (permalink / raw)
  To: paulmck
  Cc: Wander Lairson Costa, Ingo Molnar, Peter Zijlstra, Juri Lelli,
	Vincent Guittot, Dietmar Eggemann, Steven Rostedt, Ben Segall,
	Mel Gorman, Daniel Bristot de Oliveira, open list:SCHEDULER,
	Thomas Gleixner

On 18/01/23 10:11, Paul E. McKenney wrote:
> On Wed, Jan 18, 2023 at 03:57:38PM +0000, Valentin Schneider wrote:
>> > Given that this problem occurred in PREEMPT_RT, I am assuming that the
>> > appropriate definition of "atomic context" is "cannot call schedule()".
>> > And you are in fact not permitted to call schedule() from a bh-disabled
>> > region.
>> >
>> > This also means that you cannot acquire a non-raw spinlock in a
>> > bh-disabled region of code in a PREEMPT_RT kernel, because doing
>> > so can invoke schedule.
>>
>> But per the PREEMPT_RT lock "replacement", non-raw spinlocks end up
>> invoking schedule_rtlock(), which should be safe vs BH disabled
>> (local_lock() + rcu_read_lock()):
>>
>>   6991436c2b5d ("sched/core: Provide a scheduling point for RT locks")
>>
>> Unless I'm missing something else?
>
> No, you miss nothing.  Apologies for my confusion!
>
> (I could have sworn that someone else corrected me on this earlier,
> but I don't see it right off hand.)
>
>                                                       Thanx, Paul

Heh, I had a smidge of doubt myself, but since we've cleared this up:

Reviewed-by: Valentin Schneider <vschneid@redhat.com>


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-04 18:17 [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT Wander Lairson Costa
  2023-01-10  1:33 ` Paul E. McKenney
@ 2023-01-19 18:03 ` Valentin Schneider
  2023-01-19 19:53   ` Wander Lairson Costa
  1 sibling, 1 reply; 9+ messages in thread
From: Valentin Schneider @ 2023-01-19 18:03 UTC (permalink / raw)
  To: Wander Lairson Costa, Ingo Molnar, Peter Zijlstra, Juri Lelli,
	Vincent Guittot, Dietmar Eggemann, Steven Rostedt, Ben Segall,
	Mel Gorman, Daniel Bristot de Oliveira, open list:SCHEDULER
  Cc: Wander Lairson Costa, Paul McKenney, Thomas Gleixner

On 04/01/23 15:17, Wander Lairson Costa wrote:
> inactive_task_timer() executes in interrupt (atomic) context. It calls
> put_task_struct(), which indirectly acquires sleeping locks under
> PREEMPT_RT.
>
> Below is an example of a splat that happened in a test environment:
>
>  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
>  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
>  Call Trace:
>  dump_stack_lvl+0x57/0x7d
>  mark_lock_irq.cold+0x33/0xba
>  ? stack_trace_save+0x4b/0x70
>  ? save_trace+0x55/0x150
>  mark_lock+0x1e7/0x400
>  mark_usage+0x11d/0x140
>  __lock_acquire+0x30d/0x930
>  lock_acquire.part.0+0x9c/0x210
>  ? refill_obj_stock+0x3d/0x3a0
>  ? rcu_read_lock_sched_held+0x3f/0x70
>  ? trace_lock_acquire+0x38/0x140
>  ? lock_acquire+0x30/0x80
>  ? refill_obj_stock+0x3d/0x3a0
>  rt_spin_lock+0x27/0xe0
>  ? refill_obj_stock+0x3d/0x3a0
>  refill_obj_stock+0x3d/0x3a0
>  ? inactive_task_timer+0x1ad/0x340
>  kmem_cache_free+0x357/0x560
>  inactive_task_timer+0x1ad/0x340
>  ? switched_from_dl+0x2d0/0x2d0
>  __run_hrtimer+0x8a/0x1a0
>  __hrtimer_run_queues+0x91/0x130
>  hrtimer_interrupt+0x10f/0x220
>  __sysvec_apic_timer_interrupt+0x7b/0xd0
>  sysvec_apic_timer_interrupt+0x4f/0xd0
>  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
>  asm_sysvec_apic_timer_interrupt+0x12/0x20
>  RIP: 0033:0x7fff196bf6f5
>
> Instead of calling put_task_struct() directly, we defer it using
> call_rcu(). A more natural approach would use a workqueue, but since
> in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> the code would become more complex because we would need to put the
> work_struct instance in the task_struct and initialize it when we
> allocate a new task_struct.
>

Sorry to come back on this; Juri reminded me offline that put_task_struct()
is invoked in other non-sleepable contexts, not just inactive_task_timer().

e.g.

  rto_push_irq_work_func() // hard irq work so hardirq context
  `\
    push_rt_task()
    `\
       put_task_struct()

Or

  cpu_stopper_thread() // stopper callbacks must not sleep
  `\
    push_cpu_stop()
    `\
      put_task_struct()

... But then again I'm not aware of any splats happening in these paths. Is
there something special about inactive_task_timer(), or could it be the
issue is there for those other paths but we just haven't had them reported
yet?


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT
  2023-01-19 18:03 ` Valentin Schneider
@ 2023-01-19 19:53   ` Wander Lairson Costa
  0 siblings, 0 replies; 9+ messages in thread
From: Wander Lairson Costa @ 2023-01-19 19:53 UTC (permalink / raw)
  To: Valentin Schneider
  Cc: Ingo Molnar, Peter Zijlstra, Juri Lelli, Vincent Guittot,
	Dietmar Eggemann, Steven Rostedt, Ben Segall, Mel Gorman,
	Daniel Bristot de Oliveira, open list:SCHEDULER, Paul McKenney,
	Thomas Gleixner

On Thu, Jan 19, 2023 at 3:03 PM Valentin Schneider <vschneid@redhat.com> wrote:
>
> On 04/01/23 15:17, Wander Lairson Costa wrote:
> > inactive_task_timer() executes in interrupt (atomic) context. It calls
> > put_task_struct(), which indirectly acquires sleeping locks under
> > PREEMPT_RT.
> >
> > Below is an example of a splat that happened in a test environment:
> >
> >  CPU: 1 PID: 2848 Comm: life Kdump: loaded Tainted: G W ---------
> >  Hardware name: HP ProLiant DL388p Gen8, BIOS P70 07/15/2012
> >  Call Trace:
> >  dump_stack_lvl+0x57/0x7d
> >  mark_lock_irq.cold+0x33/0xba
> >  ? stack_trace_save+0x4b/0x70
> >  ? save_trace+0x55/0x150
> >  mark_lock+0x1e7/0x400
> >  mark_usage+0x11d/0x140
> >  __lock_acquire+0x30d/0x930
> >  lock_acquire.part.0+0x9c/0x210
> >  ? refill_obj_stock+0x3d/0x3a0
> >  ? rcu_read_lock_sched_held+0x3f/0x70
> >  ? trace_lock_acquire+0x38/0x140
> >  ? lock_acquire+0x30/0x80
> >  ? refill_obj_stock+0x3d/0x3a0
> >  rt_spin_lock+0x27/0xe0
> >  ? refill_obj_stock+0x3d/0x3a0
> >  refill_obj_stock+0x3d/0x3a0
> >  ? inactive_task_timer+0x1ad/0x340
> >  kmem_cache_free+0x357/0x560
> >  inactive_task_timer+0x1ad/0x340
> >  ? switched_from_dl+0x2d0/0x2d0
> >  __run_hrtimer+0x8a/0x1a0
> >  __hrtimer_run_queues+0x91/0x130
> >  hrtimer_interrupt+0x10f/0x220
> >  __sysvec_apic_timer_interrupt+0x7b/0xd0
> >  sysvec_apic_timer_interrupt+0x4f/0xd0
> >  ? asm_sysvec_apic_timer_interrupt+0xa/0x20
> >  asm_sysvec_apic_timer_interrupt+0x12/0x20
> >  RIP: 0033:0x7fff196bf6f5
> >
> > Instead of calling put_task_struct() directly, we defer it using
> > call_rcu(). A more natural approach would use a workqueue, but since
> > in PREEMPT_RT, we can't allocate dynamic memory from atomic context,
> > the code would become more complex because we would need to put the
> > work_struct instance in the task_struct and initialize it when we
> > allocate a new task_struct.
> >
>
> Sorry to come back on this; Juri reminded me offline that put_task_struct()
> is invoked in other non-sleepable contexts, not just inactive_task_timer().
>

I guess there is no splat because the usage count doesn't reach zero
in those code paths.

> e.g.
>
>   rto_push_irq_work_func() // hard irq work so hardirq context
>   `\
>     push_rt_task()
>     `\
>        put_task_struct()
>

This is paired with a get_task_struct() a few lines above inside in
the same function.

> Or
>
>   cpu_stopper_thread() // stopper callbacks must not sleep
>   `\
>     push_cpu_stop()
>     `\
>       put_task_struct()
>

This is paired with a get_task_struct() from get_push_task()

> ... But then again I'm not aware of any splats happening in these paths. Is
> there something special about inactive_task_timer(), or could it be the
> issue is there for those other paths but we just haven't had them reported
> yet?
>

Given that those calls have corresponding get_task_struct() calls that
are close in time, there is a low probability of the usage count
reaching zero and triggering the splat. In any case, I will work in a
v2 that also addresses those call sites.


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2023-01-19 19:54 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-04 18:17 [PATCH] sched/deadline: fix inactive_task_timer splat with CONFIG_PREEMPT_RT Wander Lairson Costa
2023-01-10  1:33 ` Paul E. McKenney
2023-01-10 20:52   ` Wander Lairson Costa
2023-01-10 22:27     ` Paul E. McKenney
2023-01-18 15:57       ` Valentin Schneider
2023-01-18 18:11         ` Paul E. McKenney
2023-01-18 18:28           ` Valentin Schneider
2023-01-19 18:03 ` Valentin Schneider
2023-01-19 19:53   ` Wander Lairson Costa

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.