Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4458353imu; Tue, 29 Jan 2019 01:46:54 -0800 (PST) X-Google-Smtp-Source: ALg8bN5nUZDt/vq3dIxsPTERpWu7cx7kjdQWQMA02Xst9vEU07VU+QWH9PXxSGeVAVKCfSAgxlEy X-Received: by 2002:a17:902:2468:: with SMTP id m37mr25275976plg.314.1548755214254; Tue, 29 Jan 2019 01:46:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548755214; cv=none; d=google.com; s=arc-20160816; b=zslHx4j62rF6zH6EMwCgsCZHe450Bf1El4rZnsYmFXKlkSoyMiowir8KmBP+30Q8j6 huJJioNR9jHIyoISl7d6C22vFhnAKG/q1uUObVbmCj9uYDU6K17O3VGUUbaWwqaGnjps m90A7qZUY1XNJlD++/rCnWABzK3PoFH8gpAmmyjGk2x9NYy7YITK/KczgmUZx9XFe6lR j3OMmJ4SjHRAHR5Si9QHBqDyrttG6InYvrUJxYVSwktCZ+TUtPeHGoQHFS89KlORWsKA aSEPe1/kDHhfcLmGObPM6X+0BVfcGDVBW53ujDCvo1RJx/6ece7MTmBYeinJP8Iw94zq qjOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=OFQhbZNOkx55Afkfpy2xc9UOC+NjMXKWDQjilr7YlI0=; b=JhkAJ49UaN+c59BKSPyCQf6sCqz4VD/u6zHTCh3W+ZlLJd06CrXmQdbgRZOHc5R1uB nQ8GHWdM3HMceBiXFVyCAUH6VPmJJmhQp+vW6IBZY0LpDKcGz9uufEnOzo1xOiAPfWGR G66lMPY3ePbJK91L2zAWX4iS7nJahaRohle1B8od1HYbmX8OQZP+LfdbYxsJBgZLY9Lf 4fxsGRwcl626+P59lfPULjTHEzoQBT59o6dOKNCYxrDujQOwXgDev9Q6WH9TCkhto0t6 4zY5lngNOKAXEVGv90u3LyeRiObUyYU1+hMUPOXuIahhahZhTCwWIl3p/1mA5ct7zMkS dHIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t63si34140946pgd.78.2019.01.29.01.46.38; Tue, 29 Jan 2019 01:46:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728160AbfA2Jpw (ORCPT + 99 others); Tue, 29 Jan 2019 04:45:52 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:43871 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727901AbfA2Jpu (ORCPT ); Tue, 29 Jan 2019 04:45:50 -0500 Received: from p5492e0d8.dip0.t-ipconnect.de ([84.146.224.216] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1goPxg-0006Oz-VO; Tue, 29 Jan 2019 10:45:45 +0100 Date: Tue, 29 Jan 2019 10:45:44 +0100 (CET) From: Thomas Gleixner To: Heiko Carstens cc: Peter Zijlstra , Ingo Molnar , Martin Schwidefsky , LKML , linux-s390@vger.kernel.org, Stefan Liebler , Sebastian Sewior Subject: Re: WARN_ON_ONCE(!new_owner) within wake_futex_pi() triggered In-Reply-To: <20190129090108.GA26906@osiris> Message-ID: References: <20181127081115.GB3625@osiris> <20181129112321.GB3449@osiris> <20190128134410.GA28485@hirez.programming.kicks-ass.net> <20190128135804.GB28878@hirez.programming.kicks-ass.net> <20190129090108.GA26906@osiris> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 29 Jan 2019, Heiko Carstens wrote: > On Mon, Jan 28, 2019 at 04:53:19PM +0100, Thomas Gleixner wrote: > > Patch below cures that. > > With your patch the kernel warning doesn't occur anymore. So if this > is supposed to be the fix feel free to add: Yes, it's supposed to be the fix. > > However now I see every now and then the following failure from the > same test case: > > tst-robustpi8: ../nptl/pthread_mutex_lock.c:425: __pthread_mutex_lock_full: Assertion `INTERNAL_SYSCALL_ERRNO (e, __err) != ESRCH || !robust' failed. > > /* ESRCH can happen only for non-robust PI mutexes where > the owner of the lock died. */ > assert (INTERNAL_SYSCALL_ERRNO (e, __err) != ESRCH || !robust); > > I just verified that this happened also without your patch, I just > didn't see it since I started my tests with panic_on_warn=1 and the > warning triggered always earlier. > So, this seems to be something different. Moo. I ran the test loop all night (simply because I forgot to stop it) and of course this does not trigger here. Could you try to gather a bit more information with lightweight tracing? Something like the below should give us at least a clue. Stop the tst loop when the assert triggers and then extract the trace. Thanks, tglx 8<-------------- #!/bin/sh # Substitute with your ld comm string if it starts differently C=ld-linux echo 'comm ~ "$C*"' >/sys/kernel/debug/tracing/events/syscalls/sys_enter_futex/filter echo 'comm ~ "$C*"' >/sys/kernel/debug/tracing/events/syscalls/sys_exit_futex/filter echo 'comm ~ "$C*"' >/sys/kernel/debug/tracing/events/sched/sched_process_exit/filter echo 'prev_comm ~ "$C*" || next_comm ~ "$C*"' >/sys/kernel/debug/tracing/events/sched/sched_switch/filter echo 1 > /sys/kernel/debug/tracing/events/syscalls/sys_enter_futex/enable echo 1 > /sys/kernel/debug/tracing/events/syscalls/sys_exit_futex/enable echo 1 > /sys/kernel/debug/tracing/events/sched/sched_process_exit/enable echo 1 > /sys/kernel/debug/tracing/events/sched/sched_switch/enable