From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 424E1C4363A for ; Wed, 28 Oct 2020 21:40:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id DF53C246AB for ; Wed, 28 Oct 2020 21:40:38 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="tT6dU2cR"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="K2hKwVW6" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727142AbgJ1Vjp (ORCPT ); Wed, 28 Oct 2020 17:39:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46828 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727130AbgJ1Vj2 (ORCPT ); Wed, 28 Oct 2020 17:39:28 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2BE1CC0613D1; Wed, 28 Oct 2020 14:39:28 -0700 (PDT) Date: Wed, 28 Oct 2020 20:10:54 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1603912255; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=VPk+kaJfeoG+B3H81aUbzAQmseyhIwjeeSTJ0VNDmrY=; b=tT6dU2cR+BQA37VONU2ZxSPm9Es3hDgpsNvd9EENqu92zUWYpe7v61xPocE3YXJzK6tdxE 11Av3DiCI8cpn5On2YPzN1JavoENI/n27ooN2rnoQHBcZ+HOl2fsaQ88oxAT4QV35AAZoI asf3L8iE+l9Twg1+ACj4UboIJjaXA6a+/PpzGmt7tb+fYHQi3KaVLF539HmNoh1reQbJvS wTzVspLvfHqU7XfqhB+Sl1wCYWDrQV6raOAD7AtAGETyWyZfZ+ibV+sVHLS5VkrOeu4VWX nPIEOZpy7pwYNHLcyjOMSc21PsY+AeXvdK5W5cFP/cBs8TovECCvcRX4Eu7UXA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1603912255; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=VPk+kaJfeoG+B3H81aUbzAQmseyhIwjeeSTJ0VNDmrY=; b=K2hKwVW6mugMK0qdTROr+2GD9MqgtX32saTcek77ieSJrEVsMPA02HyznNSXh6CNuFs/1J vNacJYiPf5YG21CA== From: Sebastian Andrzej Siewior To: LKML Cc: Thomas Gleixner , linux-rt-users , Steven Rostedt Subject: [PATCH RT] mm/memcontrol: Disable preemption in __mod_memcg_lruvec_state() Message-ID: <20201028191054.u5ucftllw7slxu4b@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-rt-users@vger.kernel.org The callers expect disabled preemption/interrupts while invoking __mod_memcg_lruvec_state(). This works mainline because a lock of some kind is acquired. Use preempt_disable_rt() where per-CPU variables are accessed and a stable pointer is expected. This is also done in __mod_zone_page_state() for the same reason. Cc: stable-rt@vger.kernel.org Signed-off-by: Sebastian Andrzej Siewior --- mm/memcontrol.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/mm/memcontrol.c b/mm/memcontrol.c index f35ffe52cc4f8..09fa87f7a8119 100644 --- a/mm/memcontrol.c +++ b/mm/memcontrol.c @@ -829,6 +829,7 @@ void __mod_memcg_lruvec_state(struct lruvec *lruvec, enum node_stat_item idx, pn = container_of(lruvec, struct mem_cgroup_per_node, lruvec); memcg = pn->memcg; + preempt_disable_rt(); /* Update memcg */ __mod_memcg_state(memcg, idx, val); @@ -848,6 +849,7 @@ void __mod_memcg_lruvec_state(struct lruvec *lruvec, enum node_stat_item idx, x = 0; } __this_cpu_write(pn->lruvec_stat_cpu->count[idx], x); + preempt_enable_rt(); } /** -- 2.28.0