Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp657124imm; Sat, 1 Sep 2018 15:47:36 -0700 (PDT) X-Google-Smtp-Source: ANB0Vda2Mk6TBcXCNbgrqzUNt35jvpJirksNupDUz4uLslkUCbxkG84oXamWc6DwwNOK30qx6hEb X-Received: by 2002:a17:902:694a:: with SMTP id k10-v6mr21374853plt.166.1535842056322; Sat, 01 Sep 2018 15:47:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535842056; cv=none; d=google.com; s=arc-20160816; b=TtniH1AaAPIdq5KOsVV/3OdMgqryLgEU0edyCNDrcwvdBQyj6u5e/KgJJBDLQTFN7e MAT5kIsDHCEh9RCvy7EUOSXbh5qPnr4Aj15twElwxproIss+lypDJ7p2qj3oRLMgnic6 1/hBI1vws6XzkS2SqL3r0EOrEowGKqC2BnJ1R/t6MjY/22YspsuXtmc3oBSDAyljmJhT tzgsV1OxtrYRPc3Y+iaVWams/lYkX1+mxQ2Bgk/3chIlbMDXQ61cUe5h9ZoyVYhOESHL piLDzzmLlxTrsklFca/3t/HPGnceu1SdMTcdNDwzCrgM0KwITAIem3ls0EXXROEL8XCr 50aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=2SU8/PSz7vBIyhHqC2GpYhMsa2AJF9KOu+0UKN+9Rtk=; b=nTUWdISL6ifQu6GGl2FiLQ/Gqiw9rmDdS6IJlmKX9hGmspOwdfw/QTAG+i5E1AtgMT y/Kfez2Cp/LhMGN/utV5KTOwicwRMrMhlweS3JoSh6R65DDdC6SJhz/G8Xy/c/HsB3eu su+BIzT06ZkReR51r4UNVgboYVf2u5f+O+rca8QHkTkp8sjzRs2XB1aEbMlf1ktyF1yo wkRO59eAAHXddR7OfzBsCELomVI574U2aUL1ZumNBjdgGm7hOnQc6ZNHnNL1Xf/L53bt TgI57VVduBc1ZPm5xpI5ZTmay06C0emc8mxWKTppsTW+VaaP6/AG5gDmPzC2O1y/TLjY iH/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f190-v6si14127070pfc.327.2018.09.01.15.47.21; Sat, 01 Sep 2018 15:47:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727278AbeIBC7D (ORCPT + 99 others); Sat, 1 Sep 2018 22:59:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:44456 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726986AbeIBC7D (ORCPT ); Sat, 1 Sep 2018 22:59:03 -0400 Received: from vmware.local.home (cpe-static-sunnyrestresort-rtr.cmts.tv13.ptd.net [70.15.247.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B585920837; Sat, 1 Sep 2018 22:45:33 +0000 (UTC) Date: Sat, 1 Sep 2018 18:45:31 -0400 From: Steven Rostedt To: "Paul E. McKenney" Cc: Borislav Petkov , x86-ml , Peter Zijlstra , lkml , joel@joelfernandes.org Subject: Re: 4.19-rc1: ./include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! Message-ID: <20180901184531.72ffb792@vmware.local.home> In-Reply-To: <20180901175442.GO4225@linux.vnet.ibm.com> References: <20180901173559.GC26871@zn.tnic> <20180901175442.GO4225@linux.vnet.ibm.com> X-Mailer: Claws Mail 3.15.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 1 Sep 2018 10:54:42 -0700 "Paul E. McKenney" wrote: > On Sat, Sep 01, 2018 at 07:35:59PM +0200, Borislav Petkov wrote: > > This is a huge splat! It haz some perf* and sched* in it, I guess for > > peterz to stare at. And lemme add Paul for good measure too :) > > > > Kernel is -rc1 + 3 microcode loader patches ontop which should not be > > related. > > It really is tracing from the idle loop. But I thought that the event > tracing took care of that. Adding Steve and Joel for their thoughts. > > Thanx, Paul > > > Thx. > > > > --- > > [ 62.409125] ============================= > > [ 62.409129] WARNING: suspicious RCU usage > > [ 62.409133] 4.19.0-rc1+ #1 Not tainted > > [ 62.409136] ----------------------------- > > [ 62.409140] ./include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! > > [ 62.409143] > > other info that might help us debug this: > > > > [ 62.409147] > > RCU used illegally from idle CPU! > > rcu_scheduler_active = 2, debug_locks = 1 > > [ 62.409151] RCU used illegally from extended quiescent state! > > [ 62.409155] 1 lock held by swapper/0/0: > > [ 62.409158] #0: 000000004557ee0e (rcu_read_lock){....}, at: perf_event_output_forward+0x0/0x130 > > [ 62.409175] > > stack backtrace: > > [ 62.409180] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.19.0-rc1+ #1 > > [ 62.409183] Hardware name: LENOVO 2320CTO/2320CTO, BIOS G2ET86WW (2.06 ) 11/13/2012 > > [ 62.409187] Call Trace: > > [ 62.409196] dump_stack+0x85/0xcb > > [ 62.409203] perf_event_output_forward+0xf6/0x130 I think this is because we switched the trace point code to be protected by srcu instead of rcu_lock_sched() and a song and dance to "make RCU watch again" if it is not, but perf is using normal rcu_read_lock() internally even though it is hooked into the tracepoint code. Should perf switch to SRCU, or perhaps it can do the song and dance to make RCU watch again? -- Steve > > [ 62.409215] __perf_event_overflow+0x52/0xe0 > > [ 62.409223] perf_swevent_overflow+0x91/0xb0 > > [ 62.409229] perf_tp_event+0x11a/0x350 > > [ 62.409235] ? find_held_lock+0x2d/0x90 > > [ 62.409251] ? __lock_acquire+0x2ce/0x1350 > > [ 62.409263] ? __lock_acquire+0x2ce/0x1350 > > [ 62.409270] ? retint_kernel+0x2d/0x2d > > [ 62.409278] ? find_held_lock+0x2d/0x90 > > [ 62.409285] ? tick_nohz_get_sleep_length+0x83/0xb0 > > [ 62.409299] ? perf_trace_cpu+0xbb/0xd0 > > [ 62.409306] ? perf_trace_buf_alloc+0x5a/0xa0 > > [ 62.409311] perf_trace_cpu+0xbb/0xd0 > > [ 62.409323] cpuidle_enter_state+0x185/0x340 > > [ 62.409332] do_idle+0x1eb/0x260 > > [ 62.409340] cpu_startup_entry+0x5f/0x70 > > [ 62.409347] start_kernel+0x49b/0x4a6 > > > > [ 62.409357] secondary_startup_64+0xa4/0xb0