Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3197062imm; Fri, 19 Oct 2018 06:48:10 -0700 (PDT) X-Google-Smtp-Source: ACcGV61qOglPhv4ierTAZE8SywuOZp0+q1+S0P9xEYhROsJAHfNQdogafFlrYZgGYjFWzrhaKFml X-Received: by 2002:a17:902:ceb:: with SMTP id 98-v6mr34894528plt.331.1539956890905; Fri, 19 Oct 2018 06:48:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539956890; cv=none; d=google.com; s=arc-20160816; b=H2m3bK8141/YTNpxGvym6SaIdDAe7wfylsUiMpuAbVSKUECL0pEHl3uzO+ZCRXENBL qNdreUOXTnzhMnqSRG/NbbbNVRRA7ogB5GhDWPejl9UquWjAJrf8GOCLycuo7jTCVNKq QCeMS7QHXeqtV4TDajS20Khked4UB0Rm6MyqYR96U7+yrqHllhV73dvHHNB20b31uVOv dtJgytlWcy2X99RY6fXSIsJGic27IHDEQbj5ZcycHgDsZzCWfDKV75TIDlv+BS3Jtn1O nXCXcYNJngbpAecG3PkirLHZfcV//kRi7j9oSJtornuOTFDGeuch+pINcRugbuwZDuza HFzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date; bh=OMOzsmASs/4IRv7nhqtTLbuzIOzadaOw1OgctxCbSV8=; b=VA6kAngs+Xsi4d47BGAjsiU1lTWu7GD0IZ2jWgSo7EN06wPw1bZVvIO7jSfg1nb0yn FDGOw/1u7DlARVda/XcG1H9AOkqvf1W4HBP9xl7vMeUQqkbMtLs/iVb3Lb3Q0xpTYYrB 6HCHJe4ZXMVMEMFG4dDQqIDo6y8wE9vCt6xuh1u6tnUPCrjEgeaua3xLqC4aB2+/3Aw9 pVO6MIaOGPnxdRqTA2Dgr1qJyvyQ7vRJh8atmEFfhpzNuZJ3S5nLY0XM2iwAJIFQ8mYX glSa66Cdjjeo549AzvS87hARxcoFLyZ+CCX96xQJavRBYfmnCqkOPgDAUCR6ceUkPKvu YVOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r12-v6si24636488pga.346.2018.10.19.06.47.55; Fri, 19 Oct 2018 06:48:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727712AbeJSVxU (ORCPT + 99 others); Fri, 19 Oct 2018 17:53:20 -0400 Received: from scorn.kernelslacker.org ([45.56.101.199]:54586 "EHLO scorn.kernelslacker.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727004AbeJSVxT (ORCPT ); Fri, 19 Oct 2018 17:53:19 -0400 Received: from [2601:196:4600:5b90:ae9e:17ff:feb7:72ca] (helo=wopr.kernelslacker.org) by scorn.kernelslacker.org with esmtp (Exim 4.89) (envelope-from ) id 1gDV7I-0000wi-RP; Fri, 19 Oct 2018 09:47:04 -0400 Received: by wopr.kernelslacker.org (Postfix, from userid 1026) id 78E8356028D; Fri, 19 Oct 2018 09:47:04 -0400 (EDT) Date: Fri, 19 Oct 2018 09:47:04 -0400 From: Dave Jones To: Meelis Roos Cc: Cong Wang , LKML , Linux Kernel Network Developers , davem@davemloft.net Subject: Re: netconsole warning in 4.19.0-rc7 Message-ID: <20181019134704.ky2vqeij6m77qrpg@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Meelis Roos , Cong Wang , LKML , Linux Kernel Network Developers , davem@davemloft.net References: <20181017034047.nrhstc3b4wzevnri@codemonkey.org.uk> <20181017035038.czaqown24rnjn2pw@codemonkey.org.uk> <20181018145922.ytqxvdihp3iqounl@codemonkey.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) X-Spam-Note: SpamAssassin invocation failed Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 19, 2018 at 12:51:38PM +0300, Meelis Roos wrote: > > > > I took another look at that error path. Turns out this is all we need I > > > > think.. > > > > > > With this patch applied on top of 4.19-rc8, I stll get the warning: > > > > > > [ 13.722919] WARNING: CPU: 0 PID: 0 at kernel/softirq.c:168 __local_bh_enable_ip+0x2e/0x44 > > > > It's going to be a couple days before I get chance to get back to this. > > Did the previous patch in this thread (without the _bh) fare any better? > > Tried it with rcu_read_unlock() instead, still the same. Ok, this is going to take more time than I have. DaveM, do you want to revert 6fe9487892b32cb1c8b8b0d552ed7222a527fe30, or do you want a patch doing the same ? That'll bring back the rcu warning, but fewer people were complaining about that than this new issue.. Dave