[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201403172138.GFB43278.OOOFFSQLVHJMtF@I-love.SAKURA.ne.jp>
Date: Mon, 17 Mar 2014 21:38:19 +0900
From: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To: oleg@...hat.com
Cc: rientjes@...gle.com, akpm@...ux-foundation.org,
joseph.salisbury@...onical.com, torvalds@...ux-foundation.org,
tj@...nel.org, tglx@...utronix.de, linux-kernel@...r.kernel.org,
kernel-team@...ts.ubuntu.com
Subject: Re: [v3.13][v3.14][Regression] kthread: make kthread_create()killable
Oleg Nesterov wrote:
> > @@ -292,6 +292,17 @@ struct task_struct *kthread_create_on_node(int (*threadfn)(void *data),
> > * new kernel thread.
> > */
> > if (unlikely(wait_for_completion_killable(&done))) {
> > + int i = 0;
> > +
> > + /*
> > + * I got SIGKILL, but wait for 10 more seconds for completion
> > + * unless chosen by the OOM killer. This delay is there as a
> > + * workaround for boot failure caused by SIGKILL upon device
> > + * driver initialization timeout.
> > + */
> > + while (i++ < 10 && !test_tsk_thread_flag(current, TIF_MEMDIE))
> > + if (wait_for_completion_timeout(&done, HZ))
> > + goto ready;
>
> Personally I really dislike this hack. And btw, why we return -ENOMEM if
> SIGKILL'ed? Why not EINTR ?
I chose -ENOMEM because -ENOMEM looked better for conveying that current thread
was SIGKILLed by the OOM killer in order to solve no memory state. But I forgot
that -ENOMEM will not convey the reason properly if current thread was
SIGKILLed by other than the OOM killer. Maybe
return test_tsk_thread_flag(current, TIF_MEMDIE) ? -ENOMEM : -EINTR;
rather than
return -ENOMEM;
?
> > Commit 786235ee "kthread: make kthread_create() killable" changed to
> > leave kthread_create() as soon as receiving SIGKILL. But this change
> > caused boot failures if systemd-udevd received SIGKILL (probably due
> > to timeout) while loading SCSI controller drivers using
> > finit_module() [1].
>
> Shouldn't we fix the caller instead? It should handle the error from
> kthread_create() correctly.
>
> And could you tell who is the caller which doesn't do this? If it can't
> be fixed, then, say, it can use workqueue to create a kernel thread.
>
There are many callers. One of them is scsi_host_alloc() which is called
upon bootup in order to recognize SCSI storage devices.
To my surprise, systemd-udevd process sends SIGKILL to worker systemd-udevd
processes if they did not complete their jobs within 30 seconds. On some
machines, it takes more than 30 seconds to recognize SCSI storage devices.
On such machines, scsi_host_alloc() is called after the worker process
received SIGKILL. Since commit 786235ee "kthread: make kthread_create()
killable" broke all callers of kthread_create() who had been able to survive
SIGKILL, I think fixing this regression at kthread_create() is the appropriate
response.
Given that said, which one do we prefer?
(a) Wait for completion forever after receiving SIGKILL, unless chosen
by the OOM killer.
(b) Wait for completion for only limited duration after receiving SIGKILL.
This patch is (b) which waits for only 10 seconds after receiving SIGKILL.
(a) will change "kthread: make kthread_create() killable" to
"kthread: allow the OOM-killer to kill kthread_create()".
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists