Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp616675pxx; Mon, 26 Oct 2020 17:02:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw6qIdCU79KlJa2R3/02KlkAfDyBBvGhIr/0kpP18rfmjBPeXdSsVxh2EfUxicq/PKpyM6D X-Received: by 2002:a17:906:3b8f:: with SMTP id u15mr17757387ejf.348.1603756948025; Mon, 26 Oct 2020 17:02:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603756948; cv=none; d=google.com; s=arc-20160816; b=LVrPylX59irdwflG+hhk9Dlv6JIptZdH7nWuEGcRC898yRRFMOPjTJQWXp8sovhiwU APL+y8rkGS6A+BLVh8ChBhos4xucCCrcbsK1/N5+kpIxUr3LjDkD1jgG4HOzg558lWie bgzfWtsi25VHW2eFMo+R5eXylQrRvn8skjPhCMnuYwqPU1uNIdhubluCxJGymbrtgqb4 zEyldGr2Oi3P3yx0vtoR1/Hk4VzMVnAeowKO/Avu1B2DQJBJfGDMlMiwV7kLzwaKXEh7 3jQbhrP1InPg35/6uG39X3rt0I26vzPbvPsMyDLc53cpqrfWyPW6sSl94/rdlbwVr0to FxaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:mail-followup-to:reply-to:message-id :subject:cc:to:from:date; bh=5atSwANYiFi7PBVAC5a5V5lWcM71UIex//yaxe5/iss=; b=dKHLO4fjeaYcYwmYqm309ybWyCLn2aS2tb5l9YeYrIc03GfwOq1xPxhkbDQ+3Yh9wP 95xGLR3qKlQl0Zl+d2DaXSc17/5paYG61h/9Huj/Oy6W9qBu4ceB4JNlFUXfnPfYIAWR QkQOgLPQquMK1J52WgbWlQGeproW7e2ZDSI4NfxGmSMboX8vNDrAhSzBzG8p0r2vDZVd 9/YWYwU0uRkMCqXBsxviPmYXXdKCFuXlJVQVjNzoX9n0KKiRYgE40ZHxdNJNTr9VilfN S6kx0n7Q+hsgqIihnzCHPuUP/FYl4ZzOFq/n7QvvGmehw97wJmYf3oVr+sHIBB1+Ws8C 9ZWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d21si8345033ejr.160.2020.10.26.17.02.06; Mon, 26 Oct 2020 17:02:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388541AbgJZUgh (ORCPT + 99 others); Mon, 26 Oct 2020 16:36:37 -0400 Received: from mx2.suse.de ([195.135.220.15]:43850 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388529AbgJZUgh (ORCPT ); Mon, 26 Oct 2020 16:36:37 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 7C04CAC7D; Mon, 26 Oct 2020 20:36:35 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 0055ADA6E2; Mon, 26 Oct 2020 21:35:01 +0100 (CET) Date: Mon, 26 Oct 2020 21:35:01 +0100 From: David Sterba To: Peter Zijlstra Cc: Filipe Manana , LKML , Jan Kara , David Sterba Subject: Re: possible lockdep regression introduced by 4d004099a668 ("lockdep: Fix lockdep recursion") Message-ID: <20201026203501.GU6756@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, Peter Zijlstra , Filipe Manana , LKML , Jan Kara , David Sterba References: <20201026114009.GN2594@hirez.programming.kicks-ass.net> <0c0d815c-bd5a-ff2d-1417-28a41173f2b4@suse.com> <20201026125524.GP2594@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201026125524.GP2594@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 26, 2020 at 01:55:24PM +0100, Peter Zijlstra wrote: > On Mon, Oct 26, 2020 at 11:56:03AM +0000, Filipe Manana wrote: > > > That smells like the same issue reported here: > > > > > > https://lkml.kernel.org/r/20201022111700.GZ2651@hirez.programming.kicks-ass.net > > > > > > Make sure you have commit: > > > > > > f8e48a3dca06 ("lockdep: Fix preemption WARN for spurious IRQ-enable") > > > > > > (in Linus' tree by now) and do you have CONFIG_DEBUG_PREEMPT enabled? > > > > Yes, CONFIG_DEBUG_PREEMPT is enabled. > > Bummer :/ My builds don't have that enabled (CONFIG_PREEMPT_NONE=y) but I still see the warning (same scenario as for Filipe). That is with today's master branch + your fix from locking/urgent. > > I'll try with that commit and let you know, however it's gonna take a > > few hours to build a kernel and run all fstests (on that test box it > > takes over 3 hours) to confirm that fixes the issue. > > *ouch*, 3 hours is painful. How long to make it sick with the current > kernel? quicker I would hope? > > > Thanks for the quick reply! > > Anyway, I don't think that commit can actually explain the issue :/ > > The false positive on lockdep_assert_held() happens when the recursion > count is !0, however we _should_ be having IRQs disabled when > lockdep_recursion > 0, so that should never be observable. > > My hope was that DEBUG_PREEMPT would trigger on one of the > __this_cpu_{inc,dec}(lockdep_recursion) instance, because that would > then be a clear violation. I can start another round (in my case it's more than 4 hours to reproduce it) with DEBUG_PREEMPT, unless you have something else to test.