All of lore.kernel.org
 help / color / mirror / Atom feed
* Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release")
@ 2022-12-29  2:39 Joel Fernandes
  2022-12-29 16:10 ` Joel Fernandes
  0 siblings, 1 reply; 4+ messages in thread
From: Joel Fernandes @ 2022-12-29  2:39 UTC (permalink / raw)
  To: stable; +Cc: paulmck, rcu

Hello,
Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats
on lock acquisition/release"). The patch made it in v5.11

Without it, I get the follow splat on TREE05 rcutorture testing:

[    1.253678] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.162-rc1+ #6
[    1.253678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[    1.253678] Call Trace:
[    1.253678]
[    1.253678] =============================
[    1.253678] WARNING: suspicious RCU usage
[    1.253678] 5.10.162-rc1+ #6 Not tainted
[    1.253678] -----------------------------
[    1.253678] kernel/kprobes.c:300 RCU-list traversed in non-reader section!!

I tested with the patch and the warning is gone.

thanks,

 - Joel


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release")
  2022-12-29  2:39 Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release") Joel Fernandes
@ 2022-12-29 16:10 ` Joel Fernandes
  2022-12-30  1:02   ` Joel Fernandes
  0 siblings, 1 reply; 4+ messages in thread
From: Joel Fernandes @ 2022-12-29 16:10 UTC (permalink / raw)
  To: stable; +Cc: paulmck, rcu



> On Dec 28, 2022, at 9:39 PM, Joel Fernandes <joel@joelfernandes.org> wrote:
> 
> Hello,
> Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats
> on lock acquisition/release"). The patch made it in v5.11
> 
> Without it, I get the follow splat on TREE05 rcutorture testing:
> 
> [    1.253678] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.162-rc1+ #6
> [    1.253678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
> [    1.253678] Call Trace:
> [    1.253678]
> [    1.253678] =============================
> [    1.253678] WARNING: suspicious RCU usage
> [    1.253678] 5.10.162-rc1+ #6 Not tainted
> [    1.253678] -----------------------------
> [    1.253678] kernel/kprobes.c:300 RCU-list traversed in non-reader section!!
> 
> I tested with the patch and the warning is gone.

Please hold off on this particular one. After a 12 hour test, I am seeing some new warnings. Will update the thread after some more debug.

Sorry for the noise,

 - Joel


> 
> thanks,
> 
> - Joel
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release")
  2022-12-29 16:10 ` Joel Fernandes
@ 2022-12-30  1:02   ` Joel Fernandes
  2022-12-30  4:43     ` Joel Fernandes
  0 siblings, 1 reply; 4+ messages in thread
From: Joel Fernandes @ 2022-12-30  1:02 UTC (permalink / raw)
  To: stable; +Cc: paulmck, rcu

On Thu, Dec 29, 2022 at 4:10 PM Joel Fernandes <joel@joelfernandes.org> wrote:
>
>
>
> > On Dec 28, 2022, at 9:39 PM, Joel Fernandes <joel@joelfernandes.org> wrote:
> >
> > Hello,
> > Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats
> > on lock acquisition/release"). The patch made it in v5.11
> >
> > Without it, I get the follow splat on TREE05 rcutorture testing:
> >
> > [    1.253678] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.162-rc1+ #6
> > [    1.253678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
> > [    1.253678] Call Trace:
> > [    1.253678]
> > [    1.253678] =============================
> > [    1.253678] WARNING: suspicious RCU usage
> > [    1.253678] 5.10.162-rc1+ #6 Not tainted
> > [    1.253678] -----------------------------
> > [    1.253678] kernel/kprobes.c:300 RCU-list traversed in non-reader section!!
> >
> > I tested with the patch and the warning is gone.
>
> Please hold off on this particular one. After a 12 hour test, I am seeing some new warnings. Will update the thread after some more debug.
>

Weirdly enough, the warning seems to be a false-positive from the
rcutorture scripts:

WARNING: Assertion failure in
/root/.jenkins/workspace/rcutorture_stable_linux-5.10.y@2/tools/testing/selftests/rcutorture/res/2022.12.29-02.23.56/TREE05/console.log
TREE05
WARNING: Summary:

But opening the console.log shows a normal flow followed by SUCCESS
message from the rcutorture kernel module.
Also "Summary:" is supposed to provide more information.

Here are some logs:
1. http://box.joelfernandes.org:9080/job/rcutorture_stable/job/linux-5.10.y/10/console
   (Scroll to the end)
2. http://box.joelfernandes.org:9080/job/rcutorture_stable/job/linux-5.10.y/10/artifact/tools/testing/selftests/rcutorture/res/2022.12.29-02.23.56/RUDE01/console.log

So this is probably something wrong with my setup, say something
interfered with the test. Or, there is something weird with the
scripts.

Anyway, re-running it with this patch overnight again!

 - Joel

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release")
  2022-12-30  1:02   ` Joel Fernandes
@ 2022-12-30  4:43     ` Joel Fernandes
  0 siblings, 0 replies; 4+ messages in thread
From: Joel Fernandes @ 2022-12-30  4:43 UTC (permalink / raw)
  To: stable; +Cc: paulmck, rcu

On Fri, Dec 30, 2022 at 1:02 AM Joel Fernandes <joel@joelfernandes.org> wrote:
>
> On Thu, Dec 29, 2022 at 4:10 PM Joel Fernandes <joel@joelfernandes.org> wrote:
> >
> >
> >
> > > On Dec 28, 2022, at 9:39 PM, Joel Fernandes <joel@joelfernandes.org> wrote:
> > >
> > > Hello,
> > > Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats
> > > on lock acquisition/release"). The patch made it in v5.11
> > >
> > > Without it, I get the follow splat on TREE05 rcutorture testing:
> > >
> > > [    1.253678] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.162-rc1+ #6
> > > [    1.253678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
> > > [    1.253678] Call Trace:
> > > [    1.253678]
> > > [    1.253678] =============================
> > > [    1.253678] WARNING: suspicious RCU usage
> > > [    1.253678] 5.10.162-rc1+ #6 Not tainted
> > > [    1.253678] -----------------------------
> > > [    1.253678] kernel/kprobes.c:300 RCU-list traversed in non-reader section!!
> > >
> > > I tested with the patch and the warning is gone.
> >
> > Please hold off on this particular one. After a 12 hour test, I am seeing some new warnings. Will update the thread after some more debug.
> >
>
> Weirdly enough, the warning seems to be a false-positive from the
> rcutorture scripts:
>
> WARNING: Assertion failure in
> /root/.jenkins/workspace/rcutorture_stable_linux-5.10.y@2/tools/testing/selftests/rcutorture/res/2022.12.29-02.23.56/TREE05/console.log
> TREE05
> WARNING: Summary:
>
> But opening the console.log shows a normal flow followed by SUCCESS
> message from the rcutorture kernel module.
> Also "Summary:" is supposed to provide more information.
>
> Here are some logs:
> 1. http://box.joelfernandes.org:9080/job/rcutorture_stable/job/linux-5.10.y/10/console
>    (Scroll to the end)
> 2. http://box.joelfernandes.org:9080/job/rcutorture_stable/job/linux-5.10.y/10/artifact/tools/testing/selftests/rcutorture/res/2022.12.29-02.23.56/RUDE01/console.log
>
> So this is probably something wrong with my setup, say something
> interfered with the test. Or, there is something weird with the
> scripts.
>
> Anyway, re-running it with this patch overnight again!

I think I found it, v5.10 is also missing this patch which made it in
v5.11: 8d68e68a781d ("torture: Exclude "NOHZ tick-stop error" from
fatal errors")

That is needed along with the $SUBJECT patch.

I will re-run my 5.10 tests again with both these to see if everything
is now green.


 - Joel

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2022-12-30  4:44 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-12-29  2:39 Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release") Joel Fernandes
2022-12-29 16:10 ` Joel Fernandes
2022-12-30  1:02   ` Joel Fernandes
2022-12-30  4:43     ` Joel Fernandes

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.