Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752529AbdI2Qy0 (ORCPT ); Fri, 29 Sep 2017 12:54:26 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:37712 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752448AbdI2QyU (ORCPT ); Fri, 29 Sep 2017 12:54:20 -0400 Date: Fri, 29 Sep 2017 09:36:56 -0700 From: "Paul E. McKenney" To: Paolo Bonzini Cc: Boqun Feng , "Levin, Alexander (Sasha Levin)" , Sasha Levin , "linux-kernel@vger.kernel.org List" , Ingo Molnar , "jiangshanlai@gmail.com" , "dipankar@in.ibm.com" , Andrew Morton , Mathieu Desnoyers , Josh Triplett , Thomas Gleixner , Peter Zijlstra , "dhowells@redhat.com" , Eric Dumazet , =?iso-8859-1?Q?Fr=E9d=E9ric?= Weisbecker , Oleg Nesterov , "bobby.prani@gmail.com" , Radim =?utf-8?B?S3LEjW3DocWZ?= , kvm@vger.kernel.org Subject: Re: [PATCH v3 tip/core/rcu 40/40] rcu: Make non-preemptive schedule be Tasks RCU quiescent state Reply-To: paulmck@linux.vnet.ibm.com References: <20170419165805.GB10874@linux.vnet.ibm.com> <1492621117-13939-40-git-send-email-paulmck@linux.vnet.ibm.com> <20170928123055.GI3521@linux.vnet.ibm.com> <20170928153813.7cernglt2d7umhpe@sasha-lappy> <20170928160514.GM3521@linux.vnet.ibm.com> <20170929093010.w56nawdoz23mkzio@tardis> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 17092916-0052-0000-0000-00000269D66A X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00007812; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000233; SDB=6.00924144; UDB=6.00464658; IPR=6.00704282; BA=6.00005613; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00017327; XFM=3.00000015; UTC=2017-09-29 16:54:15 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17092916-0053-0000-0000-0000522A075E Message-Id: <20170929163656.GZ3521@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-09-29_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000 definitions=main-1709290243 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2642 Lines: 63 On Fri, Sep 29, 2017 at 12:01:24PM +0200, Paolo Bonzini wrote: > On 29/09/2017 11:30, Boqun Feng wrote: > > On Thu, Sep 28, 2017 at 04:05:14PM +0000, Paul E. McKenney wrote: > > [...] > >>> __schedule+0x201/0x2240 kernel/sched/core.c:3292 > >>> schedule+0x113/0x460 kernel/sched/core.c:3421 > >>> kvm_async_pf_task_wait+0x43f/0x940 arch/x86/kernel/kvm.c:158 > >> > >> It is kvm_async_pf_task_wait() that calls schedule(), but it carefully > >> sets state to make that legal. Except... > >> > >>> do_async_page_fault+0x72/0x90 arch/x86/kernel/kvm.c:271 > >>> async_page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1069 > >>> RIP: 0010:format_decode+0x240/0x830 lib/vsprintf.c:1996 > >>> RSP: 0018:ffff88003b2df520 EFLAGS: 00010283 > >>> RAX: 000000000000003f RBX: ffffffffb5d1e141 RCX: ffff88003b2df670 > >>> RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffb5d1e140 > >>> RBP: ffff88003b2df560 R08: dffffc0000000000 R09: 0000000000000000 > >>> R10: ffff88003b2df718 R11: 0000000000000000 R12: ffff88003b2df5d8 > >>> R13: 0000000000000064 R14: ffffffffb5d1e140 R15: 0000000000000000 > >>> vsnprintf+0x173/0x1700 lib/vsprintf.c:2136 > >> > >> We took a page fault in vsnprintf() while doing link_path_walk(), > >> which looks to be within an RCU read-side critical section. > >> > >> Maybe the page fault confused lockdep? > >> > >> Sigh. It is going to be a real pain if all printk()s need to be > >> outside of RCU read-side critical sections due to the possibility of > >> page faults... > >> > > > > Does this mean whenever we get a page fault in a RCU read-side critical > > section, we may hit this? > > > > Could we simply avoid to schedule() in kvm_async_pf_task_wait() if the > > fault process is in a RCU read-side critical section as follow? > > > > diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c > > index aa60a08b65b1..291ea13b23d2 100644 > > --- a/arch/x86/kernel/kvm.c > > +++ b/arch/x86/kernel/kvm.c > > @@ -140,7 +140,7 @@ void kvm_async_pf_task_wait(u32 token) > > > > n.token = token; > > n.cpu = smp_processor_id(); > > - n.halted = is_idle_task(current) || preempt_count() > 1; > > + n.halted = is_idle_task(current) || preempt_count() > 1 || rcu_preempt_depth(); > > init_swait_queue_head(&n.wq); > > hlist_add_head(&n.link, &b->list); > > raw_spin_unlock(&b->lock); This works for PREEMPT=y kernels, but can silently break RCU read-side critical sections on PREEMPT=n kernels. > > (Add KVM folks and list Cced) > > Yes, that would work. Mind to send it as a proper patch? Just out of curiosity, why is printk() being passed something that can page fault? Thanx, Paul