linux-next.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state
       [not found]     ` <d3fb0593-e483-3b69-bf2c-99ad6cd03567@linux.alibaba.com>
@ 2020-04-18  7:04       ` Dmitry Vyukov
  2020-04-18  7:43         ` Stephen Rothwell
  0 siblings, 1 reply; 5+ messages in thread
From: Dmitry Vyukov @ 2020-04-18  7:04 UTC (permalink / raw)
  To: Alex Shi, Linux-Next Mailing List, Stephen Rothwell
  Cc: Kirill A. Shutemov, syzbot, Andrew Morton, Cgroups,
	Johannes Weiner, LKML, Linux-MM, Michal Hocko, syzkaller-bugs,
	Vladimir Davydov

On Mon, Mar 9, 2020 at 2:27 PM Alex Shi <alex.shi@linux.alibaba.com> wrote:
> 在 2020/3/9 下午5:56, Alex Shi 写道:
> >
> >
> > 在 2020/3/9 下午5:24, Kirill A. Shutemov 写道:
> >>> check_preemption_disabled: 3 callbacks suppressed
> >>> BUG: using __this_cpu_read() in preemptible [00000000] code: syz-fuzzer/9432
> >>> caller is __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> >>> CPU: 1 PID: 9432 Comm: syz-fuzzer Not tainted 5.6.0-rc4-next-20200306-syzkaller #0
> >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> >>> Call Trace:
> >>>  __dump_stack lib/dump_stack.c:77 [inline]
> >>>  dump_stack+0x188/0x20d lib/dump_stack.c:118
> >>>  check_preemption_disabled lib/smp_processor_id.c:47 [inline]
> >>>  __this_cpu_preempt_check.cold+0x84/0x90 lib/smp_processor_id.c:64
> >>>  __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> >>>  __split_huge_page mm/huge_memory.c:2575 [inline]
> >>>  split_huge_page_to_list+0x124b/0x3380 mm/huge_memory.c:2862
> >>>  split_huge_page include/linux/huge_mm.h:167 [inline]
> >> It looks like a regression due to c8cba0cc2a80 ("mm/thp: narrow lru
> >> locking").
> >
> > yes, I guess so.
>
> Yes, it is a stupid mistake to pull out lock for __mod_memcg_state which
> should be in a lock.
>
> revert this patch should be all fine, since ClearPageCompound and page_ref_inc
> later may related with lru_list valid issue in release_pges.
>
>
> Sorry for the disaster!
>
> Alex

+linux-next, Stephen for currently open linux-next build/boot failure

Hi Alex,

What's the status of this? Was the guilty patch reverted? If so,
please mark it as invalid for syzbot, otherwise it still shows up as
open bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state
  2020-04-18  7:04       ` linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state Dmitry Vyukov
@ 2020-04-18  7:43         ` Stephen Rothwell
  2020-04-18  7:50           ` Stephen Rothwell
  0 siblings, 1 reply; 5+ messages in thread
From: Stephen Rothwell @ 2020-04-18  7:43 UTC (permalink / raw)
  To: Dmitry Vyukov
  Cc: Alex Shi, Linux-Next Mailing List, Kirill A. Shutemov, syzbot,
	Andrew Morton, Cgroups, Johannes Weiner, LKML, Linux-MM,
	Michal Hocko, syzkaller-bugs, Vladimir Davydov

[-- Attachment #1: Type: text/plain, Size: 2113 bytes --]

Hi Dmitry,

On Sat, 18 Apr 2020 09:04:38 +0200 Dmitry Vyukov <dvyukov@google.com> wrote:
>
> On Mon, Mar 9, 2020 at 2:27 PM Alex Shi <alex.shi@linux.alibaba.com> wrote:
> > 在 2020/3/9 下午5:56, Alex Shi 写道:  
> > >
> > >
> > > 在 2020/3/9 下午5:24, Kirill A. Shutemov 写道:  
> > >>> check_preemption_disabled: 3 callbacks suppressed
> > >>> BUG: using __this_cpu_read() in preemptible [00000000] code: syz-fuzzer/9432
> > >>> caller is __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > >>> CPU: 1 PID: 9432 Comm: syz-fuzzer Not tainted 5.6.0-rc4-next-20200306-syzkaller #0
> > >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> > >>> Call Trace:
> > >>>  __dump_stack lib/dump_stack.c:77 [inline]
> > >>>  dump_stack+0x188/0x20d lib/dump_stack.c:118
> > >>>  check_preemption_disabled lib/smp_processor_id.c:47 [inline]
> > >>>  __this_cpu_preempt_check.cold+0x84/0x90 lib/smp_processor_id.c:64
> > >>>  __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > >>>  __split_huge_page mm/huge_memory.c:2575 [inline]
> > >>>  split_huge_page_to_list+0x124b/0x3380 mm/huge_memory.c:2862
> > >>>  split_huge_page include/linux/huge_mm.h:167 [inline]  
> > >> It looks like a regression due to c8cba0cc2a80 ("mm/thp: narrow lru
> > >> locking").  
> > >
> > > yes, I guess so.  
> >
> > Yes, it is a stupid mistake to pull out lock for __mod_memcg_state which
> > should be in a lock.
> >
> > revert this patch should be all fine, since ClearPageCompound and page_ref_inc
> > later may related with lru_list valid issue in release_pges.
> >
> >
> > Sorry for the disaster!
> >
> > Alex  
> 
> +linux-next, Stephen for currently open linux-next build/boot failure
> 
> Hi Alex,
> 
> What's the status of this? Was the guilty patch reverted? If so,
> please mark it as invalid for syzbot, otherwise it still shows up as
> open bug.

The patch was removed from Andrew's tree in March and never made it to
Linus' tree.  I can't find how to tell syzbot that the patch went away ...

-- 
Cheers,
Stephen Rothwell

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state
  2020-04-18  7:43         ` Stephen Rothwell
@ 2020-04-18  7:50           ` Stephen Rothwell
  2020-04-18  8:02             ` Dmitry Vyukov
  0 siblings, 1 reply; 5+ messages in thread
From: Stephen Rothwell @ 2020-04-18  7:50 UTC (permalink / raw)
  To: Dmitry Vyukov
  Cc: Alex Shi, Linux-Next Mailing List, Kirill A. Shutemov, syzbot,
	Andrew Morton, Cgroups, Johannes Weiner, LKML, Linux-MM,
	Michal Hocko, syzkaller-bugs, Vladimir Davydov

[-- Attachment #1: Type: text/plain, Size: 2357 bytes --]

Hi Stephen,

On Sat, 18 Apr 2020 17:43:53 +1000 Stephen Rothwell <sfr@canb.auug.org.au> wrote:
>
> Hi Dmitry,
> 
> On Sat, 18 Apr 2020 09:04:38 +0200 Dmitry Vyukov <dvyukov@google.com> wrote:
> >
> > On Mon, Mar 9, 2020 at 2:27 PM Alex Shi <alex.shi@linux.alibaba.com> wrote:  
> > > 在 2020/3/9 下午5:56, Alex Shi 写道:    
> > > >
> > > >
> > > > 在 2020/3/9 下午5:24, Kirill A. Shutemov 写道:    
> > > >>> check_preemption_disabled: 3 callbacks suppressed
> > > >>> BUG: using __this_cpu_read() in preemptible [00000000] code: syz-fuzzer/9432
> > > >>> caller is __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > > >>> CPU: 1 PID: 9432 Comm: syz-fuzzer Not tainted 5.6.0-rc4-next-20200306-syzkaller #0
> > > >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> > > >>> Call Trace:
> > > >>>  __dump_stack lib/dump_stack.c:77 [inline]
> > > >>>  dump_stack+0x188/0x20d lib/dump_stack.c:118
> > > >>>  check_preemption_disabled lib/smp_processor_id.c:47 [inline]
> > > >>>  __this_cpu_preempt_check.cold+0x84/0x90 lib/smp_processor_id.c:64
> > > >>>  __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > > >>>  __split_huge_page mm/huge_memory.c:2575 [inline]
> > > >>>  split_huge_page_to_list+0x124b/0x3380 mm/huge_memory.c:2862
> > > >>>  split_huge_page include/linux/huge_mm.h:167 [inline]    
> > > >> It looks like a regression due to c8cba0cc2a80 ("mm/thp: narrow lru
> > > >> locking").    
> > > >
> > > > yes, I guess so.    
> > >
> > > Yes, it is a stupid mistake to pull out lock for __mod_memcg_state which
> > > should be in a lock.
> > >
> > > revert this patch should be all fine, since ClearPageCompound and page_ref_inc
> > > later may related with lru_list valid issue in release_pges.
> > >
> > >
> > > Sorry for the disaster!
> > >
> > > Alex    
> > 
> > +linux-next, Stephen for currently open linux-next build/boot failure
> > 
> > Hi Alex,
> > 
> > What's the status of this? Was the guilty patch reverted? If so,
> > please mark it as invalid for syzbot, otherwise it still shows up as
> > open bug.  
> 
> The patch was removed from Andrew's tree in March and never made it to
> Linus' tree.  I can't find how to tell syzbot that the patch went away ...

Lets try:

#syz invalid

-- 
Cheers,
Stephen Rothwell

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state
  2020-04-18  7:50           ` Stephen Rothwell
@ 2020-04-18  8:02             ` Dmitry Vyukov
  2020-04-18  8:13               ` Stephen Rothwell
  0 siblings, 1 reply; 5+ messages in thread
From: Dmitry Vyukov @ 2020-04-18  8:02 UTC (permalink / raw)
  To: Stephen Rothwell
  Cc: Alex Shi, Linux-Next Mailing List, Kirill A. Shutemov, syzbot,
	Andrew Morton, Cgroups, Johannes Weiner, LKML, Linux-MM,
	Michal Hocko, syzkaller-bugs, Vladimir Davydov

On Sat, Apr 18, 2020 at 9:51 AM Stephen Rothwell <sfr@canb.auug.org.au> wrote:
>
> Hi Stephen,
>
> On Sat, 18 Apr 2020 17:43:53 +1000 Stephen Rothwell <sfr@canb.auug.org.au> wrote:
> >
> > Hi Dmitry,
> >
> > On Sat, 18 Apr 2020 09:04:38 +0200 Dmitry Vyukov <dvyukov@google.com> wrote:
> > >
> > > On Mon, Mar 9, 2020 at 2:27 PM Alex Shi <alex.shi@linux.alibaba.com> wrote:
> > > > 在 2020/3/9 下午5:56, Alex Shi 写道:
> > > > >
> > > > >
> > > > > 在 2020/3/9 下午5:24, Kirill A. Shutemov 写道:
> > > > >>> check_preemption_disabled: 3 callbacks suppressed
> > > > >>> BUG: using __this_cpu_read() in preemptible [00000000] code: syz-fuzzer/9432
> > > > >>> caller is __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > > > >>> CPU: 1 PID: 9432 Comm: syz-fuzzer Not tainted 5.6.0-rc4-next-20200306-syzkaller #0
> > > > >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> > > > >>> Call Trace:
> > > > >>>  __dump_stack lib/dump_stack.c:77 [inline]
> > > > >>>  dump_stack+0x188/0x20d lib/dump_stack.c:118
> > > > >>>  check_preemption_disabled lib/smp_processor_id.c:47 [inline]
> > > > >>>  __this_cpu_preempt_check.cold+0x84/0x90 lib/smp_processor_id.c:64
> > > > >>>  __mod_memcg_state+0x27/0x1a0 mm/memcontrol.c:689
> > > > >>>  __split_huge_page mm/huge_memory.c:2575 [inline]
> > > > >>>  split_huge_page_to_list+0x124b/0x3380 mm/huge_memory.c:2862
> > > > >>>  split_huge_page include/linux/huge_mm.h:167 [inline]
> > > > >> It looks like a regression due to c8cba0cc2a80 ("mm/thp: narrow lru
> > > > >> locking").
> > > > >
> > > > > yes, I guess so.
> > > >
> > > > Yes, it is a stupid mistake to pull out lock for __mod_memcg_state which
> > > > should be in a lock.
> > > >
> > > > revert this patch should be all fine, since ClearPageCompound and page_ref_inc
> > > > later may related with lru_list valid issue in release_pges.
> > > >
> > > >
> > > > Sorry for the disaster!
> > > >
> > > > Alex
> > >
> > > +linux-next, Stephen for currently open linux-next build/boot failure
> > >
> > > Hi Alex,
> > >
> > > What's the status of this? Was the guilty patch reverted? If so,
> > > please mark it as invalid for syzbot, otherwise it still shows up as
> > > open bug.
> >
> > The patch was removed from Andrew's tree in March and never made it to
> > Linus' tree.  I can't find how to tell syzbot that the patch went away ...
>
> Lets try:
>
> #syz invalid

This is correct, thanks!

You may now see "Status: closed as invalid on 2020/04/18 07:51" at:
https://syzkaller.appspot.com/bug?extid=826543256ed3b8c37f62

It does not show up as "open" and if this will happen again syzbot
will report it (rather than assume it's still the old bug happening).

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state
  2020-04-18  8:02             ` Dmitry Vyukov
@ 2020-04-18  8:13               ` Stephen Rothwell
  0 siblings, 0 replies; 5+ messages in thread
From: Stephen Rothwell @ 2020-04-18  8:13 UTC (permalink / raw)
  To: Dmitry Vyukov
  Cc: Alex Shi, Linux-Next Mailing List, Kirill A. Shutemov, syzbot,
	Andrew Morton, Cgroups, Johannes Weiner, LKML, Linux-MM,
	Michal Hocko, syzkaller-bugs, Vladimir Davydov

[-- Attachment #1: Type: text/plain, Size: 490 bytes --]

Hi Dmitry,

On Sat, 18 Apr 2020 10:02:36 +0200 Dmitry Vyukov <dvyukov@google.com> wrote:
> >
> > #syz invalid  
> 
> This is correct, thanks!
> 
> You may now see "Status: closed as invalid on 2020/04/18 07:51" at:
> https://syzkaller.appspot.com/bug?extid=826543256ed3b8c37f62
> 
> It does not show up as "open" and if this will happen again syzbot
> will report it (rather than assume it's still the old bug happening).

OK, good, thanks.

-- 
Cheers,
Stephen Rothwell

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2020-04-18  8:14 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <00000000000022640205a04a20d8@google.com>
     [not found] ` <20200309092423.2ww3aw6yfyce7yty@box>
     [not found]   ` <5b1196be-09ce-51f7-f5e7-63f2e597f91e@linux.alibaba.com>
     [not found]     ` <d3fb0593-e483-3b69-bf2c-99ad6cd03567@linux.alibaba.com>
2020-04-18  7:04       ` linux-next test error: BUG: using __this_cpu_read() in preemptible code in __mod_memcg_state Dmitry Vyukov
2020-04-18  7:43         ` Stephen Rothwell
2020-04-18  7:50           ` Stephen Rothwell
2020-04-18  8:02             ` Dmitry Vyukov
2020-04-18  8:13               ` Stephen Rothwell

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).