Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp175040ybl; Wed, 21 Aug 2019 17:04:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqzMglqvyHeXlCftXGO+801GD/jlgIWUBK/QTLvLpi+Ul5P0SrQnwqgHl8ixvl5+dZuI66Ax X-Received: by 2002:a17:90a:ab0d:: with SMTP id m13mr2478374pjq.84.1566432280163; Wed, 21 Aug 2019 17:04:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566432280; cv=none; d=google.com; s=arc-20160816; b=Zz+6dl+BpI0uygfcPuZ1XuMA9r2SNHr4PVtV8NjpXGLdq7zTsYDXkTponoBIIUaFUy 3PeuIwl4/RKZvy0MBATT3fvHDNA3yTX9kRIDH/3oEHgbldwche69n0Fz6NSVTZFWdG3k 79wGUIsOk2+//i+Q4w3h9C6Jcktlv/2pqvO/L8rSJ+BxQMF4jRgUYkq13nK1yTph1630 84w45S++4RrQOyPoEfnq92VguQlGz1QcjrffiaF1evVAyvOL4MopLnpzazF9XxeyFdus XzqAOk/719JFs907kgD5luhePWE10e21saHc3tRLaARU6HfeBaWamJ7vUkJZ6Sa1JjGU 8jgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=wMU14qSsO71TfOuwlxJvhucfbL0waCupnIeNh0lbLtY=; b=NSy6ghMsG5n6HzvPYYeTN2l7vlabX72AS1fV0Ja1sltn/HUyMMlKaYjiCjnEcvjK9H cwpnZbK+xmu4dbm1+0ZQDgfMokk6brYNbG5Llb/2ffY3GK582dNh0QDPuqebhWXrAyfJ csecDio9elOzcXgI/RDknWi39K7BtOJFZDbZrTCiAbj6y1V6UUID5mR3uwG1LeKUoo6M MljyCsNvObe1+gf1U9frZrPKbxSPmHtvvtlgHJ1nt8WcXl9X0LSwOZZUmrAyR1iyU4VQ PKk/8xDpUUOeo0NKso+cfJmjULgnNAgf9uY+XX3ZRTWX50bzGF4LhUiWXgYp/lPrkDE7 d9KA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e18si15195411pgv.139.2019.08.21.17.04.24; Wed, 21 Aug 2019 17:04:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731395AbfHUXTK (ORCPT + 99 others); Wed, 21 Aug 2019 19:19:10 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58950 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727685AbfHUXTK (ORCPT ); Wed, 21 Aug 2019 19:19:10 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4072A10F23E1; Wed, 21 Aug 2019 23:19:10 +0000 (UTC) Received: from t460p.redhat.com (ovpn-117-150.phx2.redhat.com [10.3.117.150]) by smtp.corp.redhat.com (Postfix) with ESMTP id D942660126; Wed, 21 Aug 2019 23:19:06 +0000 (UTC) From: Scott Wood To: Sebastian Andrzej Siewior Cc: linux-rt-users@vger.kernel.org, linux-kernel@vger.kernel.org, "Paul E . McKenney" , Joel Fernandes , Thomas Gleixner , Peter Zijlstra , Juri Lelli , Clark Williams Subject: [PATCH RT v2 0/3] RCU fixes Date: Wed, 21 Aug 2019 18:19:03 -0500 Message-Id: <20190821231906.4224-1-swood@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.66]); Wed, 21 Aug 2019 23:19:10 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is a respin of the "Address rcutorture issues" patchset, minus the actual rcutorture changes. I still plan to implement detection of bad nesting scenarios, but it's complicated by the need to distinguish (on a non-RT kernel) between irq/preempt disabling that would and would not happen on an RT kernel (which would also have the benefit of being able to detect nesting regular spinlocks inside raw spinlocks on a non-RT debug kernel). In the meantime I could send the rcutorture changes as a PREEMPT_RT only patch, though the extent of the changes depends on whether my migrate disable patchset is applied since it removes a restriction. Scott Wood (3): rcu: Acquire RCU lock when disabling BHs sched: migrate_enable: Use sleeping_lock to indicate involuntary sleep rcu: Disable use_softirq on PREEMPT_RT include/linux/rcupdate.h | 4 ++++ include/linux/sched.h | 4 ++-- kernel/rcu/tree.c | 9 ++++++++- kernel/rcu/tree_plugin.h | 2 +- kernel/rcu/update.c | 4 ++++ kernel/sched/core.c | 8 ++++++++ kernel/softirq.c | 12 +++++++++--- 7 files changed, 36 insertions(+), 7 deletions(-) -- 1.8.3.1