Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1385329imm; Fri, 27 Jul 2018 16:48:35 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdzMBQ+MOWYxIu9O183UrZnGwvUqEwSWiHEn0wWa13Ol7x2yMi4P8FNg/bkR2iM04wBBbmZ X-Received: by 2002:a63:4506:: with SMTP id s6-v6mr8044323pga.422.1532735315532; Fri, 27 Jul 2018 16:48:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532735315; cv=none; d=google.com; s=arc-20160816; b=ezwIpxngvu5J07sJNsCj5X2H4YGoz5SU8nZClgayIx9OLpJ5qVfpQmYix+OZgydH5T lQjYn3bn/dPHO8CyNSDyLokmyoDoM2QWA9gu4eVgVbevaHAgjLQ+PhaFsPaGmUTXrpke GY+7ywgooK7M4MadS7AASzKlSigBK2yGnaGHLe+Rmcr+oYiVBLZWeCzUq8Z/uoe+Qpb7 srAofpql30g07eUgS+doM9r5ZvkCCwVuBVR6nHC7KJ26ZVSb/1rBgNEQThJcq1rDMBui dhYU0WERG+5vFN8M2ZylyVFlAx2YVf8ml4X4aX0uvwkzZ3PH1kGuhx4zkMgLSU0Nl+CN qdUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:reply-to:subject:cc:to:from:date :arc-authentication-results; bh=L1jGHaLWscIrsj4+/24zDuCbkDHvfvFJCdSwp8EljfI=; b=KxEtNJIyQL50tkkpoAoI3D0f4D6VGTnHA4szlpO92xaiFMZfwA8aoNnkr7UdlU/+8T iPBN4AWZLxIPnDL5ATBjnH2Tek5RPcPLCNgLkdjVQiXlnl2gMiqGgPbGXrUQDBHVA1qS kf331O1rgDT2Wi/zZQmmZ3G/L6CRzNLoLlZMEIi9/SnJ5eZlgCl2R5syEMMGLk0i5ycn Osk0hzYjdeUq/ojTWWf2cgTtSlyz4w+9PVuUFMHSCd2SiJEuR0+xbZGiEXJOsIoPsWiN FN3N1NlXF+x8jBZejbYCunbQsPDiKiJX/lzk6gbrH+/ODOPkhqjTCz3L1nYzpNgJLHfK 4LrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33-v6si4735074pla.496.2018.07.27.16.48.18; Fri, 27 Jul 2018 16:48:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388893AbeG1BLl (ORCPT + 99 others); Fri, 27 Jul 2018 21:11:41 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:55232 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730850AbeG1BLl (ORCPT ); Fri, 27 Jul 2018 21:11:41 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w6RNiO73070889 for ; Fri, 27 Jul 2018 19:47:28 -0400 Received: from e14.ny.us.ibm.com (e14.ny.us.ibm.com [129.33.205.204]) by mx0a-001b2d01.pphosted.com with ESMTP id 2kg78cmu67-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 27 Jul 2018 19:47:28 -0400 Received: from localhost by e14.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 27 Jul 2018 19:47:26 -0400 Received: from b01cxnp23033.gho.pok.ibm.com (9.57.198.28) by e14.ny.us.ibm.com (146.89.104.201) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 27 Jul 2018 19:47:23 -0400 Received: from b01ledav003.gho.pok.ibm.com (b01ledav003.gho.pok.ibm.com [9.57.199.108]) by b01cxnp23033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w6RNlMHJ15860112 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 27 Jul 2018 23:47:22 GMT Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 37E5DB2067; Fri, 27 Jul 2018 19:47:01 -0400 (EDT) Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 08A1FB2064; Fri, 27 Jul 2018 19:47:01 -0400 (EDT) Received: from paulmck-ThinkPad-W541 (unknown [9.70.82.159]) by b01ledav003.gho.pok.ibm.com (Postfix) with ESMTP; Fri, 27 Jul 2018 19:47:00 -0400 (EDT) Received: by paulmck-ThinkPad-W541 (Postfix, from userid 1000) id 9417D16CA34D; Fri, 27 Jul 2018 16:47:23 -0700 (PDT) Date: Fri, 27 Jul 2018 16:47:23 -0700 From: "Paul E. McKenney" To: David Chen Cc: "linux-kernel@vger.kernel.org" Subject: Re: RCU nocb list not reclaiming causing OOM Reply-To: paulmck@linux.vnet.ibm.com References: <20180720233212.GC12945@linux.vnet.ibm.com> <20180727223125.GJ24813@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 18072723-0052-0000-0000-00000314875B X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009440; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000266; SDB=6.01067081; UDB=6.00548292; IPR=6.00844949; MB=3.00022360; MTD=3.00000008; XFM=3.00000015; UTC=2018-07-27 23:47:25 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18072723-0053-0000-0000-00005D83DE5D Message-Id: <20180727234723.GN24813@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-27_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807270242 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 27, 2018 at 11:16:39PM +0000, David Chen wrote: > Hi Paul, > > Thanks for the advice. > The bug is kind of hard to hit, so I can't say for certain yet. Well, you can always remove the "tail == &rdp->nocb_follower_head" as an extra belt-and-suspenders safety net. I am not putting that in mainline, but in the privacy of your own copy of the kernel, I don't see any really serious problem with it. (As long as you aren't going for absolute maximum performance, but even then there are other more important tuning actions and code changes you could make.) > Though after another look at the code, I found out the `smp_mb__after_atomic();` > seems to be only a compiler barrier on x86. Yes, and that is because the locked xchg instruction used on x86 to implement xchg() already provides full ordering. ;-) > tail = xchg(&rdp->nocb_follower_tail, rdp->nocb_gp_tail); > *tail = rdp->nocb_gp_head; > smp_mb__after_atomic(); /* Store *tail before wakeup. */ > if (rdp != my_rdp && tail == &rdp->nocb_follower_head) { > swake_up(&rdp->nocb_wq); > > But that wouldn't be enough right? Because from 6b5fc3a13318, it stated that > wakeup operation don't guarantee ordering. And when the follower wakes up, it checks > for nocb_follower_head, which is assigned by `*tail = rdp->nocb_gp_head;` which doesn't > have LOCK prefix. So it's possible for follower to wake up and see the list is empty and go > back to sleep. Again, xchg() is defined to provide full ordering against all operations before and after it. Each architecture is required to do whatever is necessary to implement that full ordering, and x86 need only provide its "lock xchg" instruction. The smp_mb__after_atomic() has effect only after atomic read-modify-write operations that do not return a value, for example, atomic_inc(). If you use it after a value-returning atomic read-modify-write operation like xchg(), all you do is needlessly slow things down on platforms that provide non-empty smp_mb__after_atomic() definitions. So again, smp_mb__after_atomic() after xchg() is pointless. Please take a look at Documentation/core-api/atomic_ops.rst in the Linux-kernel source tree for more information. Or get a v4.17 kernel source tree and check this using the memory model (tools/memory-model in that version). Thanx, Paul > Thanks, > David > > From: Paul E. McKenney > Sent: Friday, July 27, 2018 3:31 PM > To: David Chen > Cc: linux-kernel@vger.kernel.org > Subject: Re: RCU nocb list not reclaiming causing OOM > ? > > On Fri, Jul 27, 2018 at 07:07:46PM +0000, David Chen wrote: > > Hi?Paul, > > > > I'd like to opinion again on this subject. > > > > So we are going to backport this patch: > > 6b5fc3a13318 ("rcu: Add memory barriers for NOCB leader wakeup") > > Does this one solve the problem, or are you still seeing hangs? > If you are no longer seeing hangs, my advice is "hands off keyboard", > though some would no doubt point out that I should follow that advice > more myself.? ;-) > > > But the other one: > > 8be6e1b15c54 ("rcu: Use timer as backstop for NOCB deferred wakeups") > > It doesn't apply cleanly, and I'm not too comfortable porting it myself. > > Yeah, that one is a bit on the non-trivial side, no two ways about it. > > > So I'm wondering if I use the following change to always wake up follower thread > > regardless if the list was empty or not, just to be on the safe side. Do you think > > this change is reasonable? Do you see any problem it might cause? > > > > Thanks, > > David > > > > diff -ru linux-4.9.37.orig/kernel/rcu/tree_plugin.h linux-4.9.37/kernel/rcu/tree_plugin.h > > --- linux-4.9.37.orig/kernel/rcu/tree_plugin.h??????? 2017-07-12 06:42:41.000000000 -0700 > > +++ linux-4.9.37/kernel/rcu/tree_plugin.h???? 2018-07-27 11:57:03.582134519 -0700 > > @@ -2077,7 +2077,7 @@ > >??????????????? tail = xchg(&rdp->nocb_follower_tail, rdp->nocb_gp_tail); > >??????????????? *tail = rdp->nocb_gp_head; > >??????????????? smp_mb__after_atomic(); /* Store *tail before wakeup. */ > > -???????????? if (rdp != my_rdp && tail == &rdp->nocb_follower_head) { > > +???????????? if (rdp != my_rdp) { > > This will burn a bit of extra CPU time, but it should be fine other than > that. > > ??????????????????????????????????????????????????????? Thanx, Paul > > >??????????????????????? /* > >???????????????????????? * List was empty, wake up the follower. > >???????????????????????? * Memory barriers supplied by atomic_long_add(). > > > > > > From: David Chen > > Sent: Friday, July 20, 2018 5:12 PM > > To: paulmck@linux.vnet.ibm.com > > Cc: linux-kernel@vger.kernel.org > > Subject: Re: RCU nocb list not reclaiming causing OOM > > ?? > > > > Hi Paul, > > > > Ok, I'll try those patches. > > > > Thanks, > > David > >?? > > From: Paul E. McKenney > > Sent: Friday, July 20, 2018 4:32:12 PM > > To: David Chen > > Cc: linux-kernel@vger.kernel.org > > Subject: Re: RCU nocb list not reclaiming causing OOM > > ? > > > > On Fri, Jul 20, 2018 at 11:05:52PM +0000, David Chen wrote: > > > Hi Paul, > > > > > > We hit an RCU issue on 4.9.37 kernel. One of the nocb_follower list grows too > > > large, and not getting reclaimed, causing the system to OOM. > > > > > > Printing the culprit rcu_sched_data: > > > > > >?? nocb_q_count = { > > >???? counter = 32369635 > > >?? }, > > >?? nocb_follower_head = 0xffff88ae901c0a00, > > >?? nocb_follower_tail = 0xffff88af1538b8d8, > > >?? nocb_kthread = 0xffff88b06d290000, > > > > > > As you can see here, the nocb_follower_head is not empty, so in theory, the > > > nocb_kthread shouldn't go to sleep. However, if dump the stack of the kthread: > > > > > > crash> bt 0xffff88b06d290000 > > > PID: 21???? TASK: ffff88b06d290000? CPU: 3?? COMMAND: "rcuos/1" > > >? #0 [ffffafc9020b7dc0] __schedule at ffffffff8d8789dc > > >? #1 [ffffafc9020b7e38] schedule at ffffffff8d878e76 > > >? #2 [ffffafc9020b7e50] rcu_nocb_kthread at ffffffff8d112337 > > >? #3 [ffffafc9020b7ec8] kthread at ffffffff8d0c6ce7 > > >? #4 [ffffafc9020b7f50] ret_from_fork at ffffffff8d87d755 > > > > > > And if we dis the address at ffffffff8d112337: > > > > > > /usr/src/debug/kernel-4.9.37/linux-4.9.37-29.nutanix.07142017.el7.centos.x86_64/kernel/rcu/tree_plugin.h: 2106 > > > 0xffffffff8d11232d :????? test?? %rax,%rax > > > 0xffffffff8d112330 :????? jne??? 0xffffffff8d112355 > > > 0xffffffff8d112332 :????? callq? 0xffffffff8d878e40 > > > 0xffffffff8d112337 :????? lea??? -0x40(%rbp),%rsi > > > > > > So the kthread is blocked at swait_event_interruptible in the nocb_follower_wait. > > > This contradict with the fact that nocb_follower_head was not empty. So I > > > wonder if this is caused by the lack of memory barrier in the place shown below. > > > If the head is set to NULL after doing xchg, it will overwrite the head set > > > by leader. This caused the kthread to sleep the next iteration, and the leader > > > won't wake him up as the tail doesn't point to head. > > > > > > Please tell me what do you think. > > > > > > Thanks, > > > David > > > > > > diff -ru linux-4.9.37.orig/kernel/rcu/tree_plugin.h linux-4.9.37/kernel/rcu/tree_plugin.h > > > --- linux-4.9.37.orig/kernel/rcu/tree_plugin.h??????? 2017-07-12 06:42:41.000000000 -0700 > > > +++ linux-4.9.37/kernel/rcu/tree_plugin.h???? 2018-07-20 15:25:57.311206343 -0700 > > > @@ -2149,6 +2149,7 @@ > > >??????????????? BUG_ON(!list); > > >??????????????? trace_rcu_nocb_wake(rdp->rsp->name, rdp->cpu, "WokeNonEmpty"); > > >??????????????? WRITE_ONCE(rdp->nocb_follower_head, NULL); > > > +???????????? smp_mb(); > > >??????????????? tail = xchg(&rdp->nocb_follower_tail, &rdp->nocb_follower_head); > > > > The xchg() operation implies full memory barriers both before and after, > > so adding the smp_mb() before would have no effect. > > > > But let me take a look at post-4.9 changes to this code... > > > > I suggest trying out the following commit: > > > > 6b5fc3a13318 ("rcu: Add memory barriers for NOCB leader wakeup") > > > > If that one doesn't help, the following might be worth trying, but probably > > a lot harder to backport: > > > > 8be6e1b15c54 ("rcu: Use timer as backstop for NOCB deferred wakeups") > > > > Please let me know how it goes! > > > > ??????????????????????????????????????????????????????? Thanx, Paul > > > > ------------------------------------------------------------------------ > > > > commit 6b5fc3a1331810db407c9e0e673dc1837afdc9d0 > > Author: Paul E. McKenney > > Date:?? Fri Apr 28 20:11:09 2017 -0700 > > > > ??? rcu: Add memory barriers for NOCB leader wakeup > > ??? > > ??? Wait/wakeup operations do not guarantee ordering on their own.? Instead, > > ??? either locking or memory barriers are required.? This commit therefore > > ??? adds memory barriers to wake_nocb_leader() and nocb_leader_wait(). > > ??? > > ??? Signed-off-by: Paul E. McKenney > > ??? Tested-by: Krister Johansen > > ??? Cc: # 4.6.x > > > > diff --git a/kernel/rcu/tree_plugin.h b/kernel/rcu/tree_plugin.h > > index 0b1042545116..573fbe9640a0 100644 > > --- a/kernel/rcu/tree_plugin.h > > +++ b/kernel/rcu/tree_plugin.h > > @@ -1810,6 +1810,7 @@ static void wake_nocb_leader(struct rcu_data *rdp, bool force) > > ???????? if (READ_ONCE(rdp_leader->nocb_leader_sleep) || force) { > > ???????????????? /* Prior smp_mb__after_atomic() orders against prior enqueue. */ > > ???????????????? WRITE_ONCE(rdp_leader->nocb_leader_sleep, false); > > +?????????????? smp_mb(); /* ->nocb_leader_sleep before swake_up(). */ > > ???????????????? swake_up(&rdp_leader->nocb_wq); > > ???????? } > > ?} > > @@ -2064,6 +2065,7 @@ static void nocb_leader_wait(struct rcu_data *my_rdp) > > ????????? * nocb_gp_head, where they await a grace period. > > ????????? */ > > ???????? gotcbs = false; > > +?????? smp_mb(); /* wakeup before ->nocb_head reads. */ > > ???????? for (rdp = my_rdp; rdp; rdp = rdp->nocb_next_follower) { > > ???????????????? rdp->nocb_gp_head = READ_ONCE(rdp->nocb_head); > > ???????????????? if (!rdp->nocb_gp_head) > > > >????? > >