Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753956AbZK1MOS (ORCPT ); Sat, 28 Nov 2009 07:14:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753230AbZK1MOR (ORCPT ); Sat, 28 Nov 2009 07:14:17 -0500 Received: from mx1.redhat.com ([209.132.183.28]:59954 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751977AbZK1MOQ (ORCPT ); Sat, 28 Nov 2009 07:14:16 -0500 Message-ID: <4B1113C0.30505@redhat.com> Date: Sat, 28 Nov 2009 14:12:48 +0200 From: Avi Kivity User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.4pre) Gecko/20090922 Fedora/3.0-3.9.b4.fc12 Thunderbird/3.0b4 MIME-Version: 1.0 To: Thomas Gleixner CC: Peter Zijlstra , Jiri Slaby , linux-kernel@vger.kernel.org, akpm@linux-foundation.org, mm-commits@vger.kernel.org, Marcelo Tosatti , kvm@vger.kernel.org, the arch/x86 maintainers , Ingo Molnar , Tejun Heo Subject: Re: WARNING: kernel/smp.c:292 smp_call_function_single [Was: mmotm 2009-11-24-16-47 uploaded] References: <200911250111.nAP1BFg5030254@imap1.linux-foundation.org> <4B0FEA3E.5050108@gmail.com> <1259335036.6483.440.camel@laptop> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2728 Lines: 70 On 11/27/2009 06:37 PM, Thomas Gleixner wrote: > On Fri, 27 Nov 2009, Peter Zijlstra wrote: > > >> On Fri, 2009-11-27 at 16:03 +0100, Jiri Slaby wrote: >> >>> On 11/25/2009 01:47 AM, akpm@linux-foundation.org wrote: >>> >>>> The mm-of-the-moment snapshot 2009-11-24-16-47 has been uploaded to >>>> >>> Hi, when executing qemu-kvm I often get following warning and a hard lockup. >>> >>> WARNING: at kernel/smp.c:292 smp_call_function_single+0xbd/0x140() >>> Hardware name: To Be Filled By O.E.M. >>> Modules linked in: kvm_intel kvm fuse ath5k ath >>> Pid: 3265, comm: qemu-kvm Not tainted 2.6.32-rc8-mm1_64 #912 >>> Call Trace: >>> [] warn_slowpath_common+0x78/0xb0 >>> [] ? __vcpu_clear+0x0/0xd0 [kvm_intel] >>> [] warn_slowpath_null+0xf/0x20 >>> [] smp_call_function_single+0xbd/0x140 >>> [] vmx_vcpu_load+0x46/0x170 [kvm_intel] >>> [] kvm_arch_vcpu_load+0x24/0x60 [kvm] >>> [] kvm_sched_in+0xd/0x10 [kvm] >>> [] finish_task_switch+0x67/0xc0 >>> [] schedule+0x2f8/0x9c0 >>> >> >>> It is a regression against 2009-11-13-19-59. >>> >>> Any ideas? >>> >> Looks like kvm is trying to send an IPI from the preempt notifiers, >> which are called with IRQs disabled, not a sane thing to do. >> >> If they really want that, they'll have to use a pre-allocated struct >> call_single_data and use __smp_call_function_single. >> > Hmm, commit 498657a moved the fire_sched_in_preempt_notifiers() call > into the irqs disabled section recently. > > sched, kvm: Fix race condition involving sched_in_preempt_notifers > > In finish_task_switch(), fire_sched_in_preempt_notifiers() is > called after finish_lock_switch(). > > However, depending on architecture, preemption can be enabled after > finish_lock_switch() which breaks the semantics of preempt > notifiers. > > So move it before finish_arch_switch(). This also makes the in- > notifiers symmetric to out- notifiers in terms of locking - now > both are called under rq lock. > > It's not a surprise that this breaks the existing code which does the > smp function call. > Yes, kvm expects preempt notifiers to be run with irqs enabled. Copying patch author. -- Do not meddle in the internals of kernels, for they are subtle and quick to panic. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/