Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp264233pxu; Wed, 25 Nov 2020 02:30:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJzRa53yW0JBXvJwTfIsIFfGs9cYRazHmOe3qF4NINitzVoRHVdekcvb9Ur9MP7hGcHxoajx X-Received: by 2002:aa7:db0c:: with SMTP id t12mr2938506eds.41.1606300253244; Wed, 25 Nov 2020 02:30:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606300253; cv=none; d=google.com; s=arc-20160816; b=i+SbMSSFNPjTRn4uk+kFoGpg6HnXItmqFhpfInC1apC5SVNW1p2690ZGG3XJCLaYT+ H2FojA/JRHp5zi0CvtIaCbim3tA2znj2RKUjetyz+UR4g0/T67i9Uhhyvezys+p7drCX 2isYQL/Ig2mXVeiJ68buJFQK+QW/6cF0lp21bBHXDZbPt/uxikD+S/sDmsvQGxmmxyWD cu5tyg/2CDJMpGLs2QQtImffCzyiYmCSZYEvrlySHKTn5BIWz4ZkkmXdhsMXvzFzPLeO jcVT6nhBX0XBl4kKdu4+/9wsl9+wiNYSdZbGPLCKmAm9Fr2HtuCnp6aLaxLpRIDQXV4U rvZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=KPnf+xhuoT1tlGGYFO0fv8Y/xY06pY4hZe6ns6CWD/8=; b=upw+MlO5Zl7ED5SvU+3aWyGaHnjWjcJvVscCC6Pat3YLR+T6ILfZ1F6oKZmFESAWvS Tv0Ilh9qf7KQRXK79RRjAvjrK1qT6YxhuoC5HeXs1gtFL6FhzOjTFucCpDceta1aahJG dks/3RxheD3Q+kmw9zhJi7U8dFb/tB4jlXrBdbLfWLN62VtdMOg5Pz7yDFnzwKz7ZEax ZYdJ3WvhFEGKN3Gbah1Dqa/XcfCNRy788fEuCTw5Fa3S+DYF09aeKj0l/JHF28TZaJDq 3y9Yx6ZnzGfa4cgArzahIiC9liHLmAWPKqQof3j3qV/kDSov57pIKrPNqYxNTJZNo2RN JGOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o18si1000908edz.265.2020.11.25.02.30.30; Wed, 25 Nov 2020 02:30:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726591AbgKYK3E (ORCPT + 99 others); Wed, 25 Nov 2020 05:29:04 -0500 Received: from foss.arm.com ([217.140.110.172]:38578 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725838AbgKYK3D (ORCPT ); Wed, 25 Nov 2020 05:29:03 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9AE40106F; Wed, 25 Nov 2020 02:29:02 -0800 (PST) Received: from C02TD0UTHF1T.local (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BDFA93F70D; Wed, 25 Nov 2020 02:28:59 -0800 (PST) Date: Wed, 25 Nov 2020 10:28:49 +0000 From: Mark Rutland To: Marco Elver Cc: Will Deacon , "Paul E. McKenney" , Steven Rostedt , Anders Roxell , Andrew Morton , Alexander Potapenko , Dmitry Vyukov , Jann Horn , Linux Kernel Mailing List , Linux-MM , kasan-dev , rcu@vger.kernel.org, Peter Zijlstra , Tejun Heo , Lai Jiangshan , linux-arm-kernel@lists.infradead.org, boqun.feng@gmail.com, tglx@linutronix.de Subject: Re: linux-next: stall warnings and deadlock on Arm64 (was: [PATCH] kfence: Avoid stalling...) Message-ID: <20201125102849.GB70906@C02TD0UTHF1T.local> References: <20201119184854.GY1437@paulmck-ThinkPad-P72> <20201119193819.GA2601289@elver.google.com> <20201119213512.GB1437@paulmck-ThinkPad-P72> <20201119225352.GA5251@willie-the-truck> <20201120103031.GB2328@C02TD0UTHF1T.local> <20201120140332.GA3120165@elver.google.com> <20201123193241.GA45639@C02TD0UTHF1T.local> <20201124140310.GA811510@elver.google.com> <20201124193034.GB8957@C02TD0UTHF1T.local> <20201125094517.GA1359135@elver.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201125094517.GA1359135@elver.google.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 25, 2020 at 10:45:17AM +0100, Marco Elver wrote: > On Tue, Nov 24, 2020 at 07:30PM +0000, Mark Rutland wrote: [...] > > > I noticed there are a bunch of warnings in the log > > > that might be relevant (see attached). > > > > > [ 91.184432] ============================= > > > [ 91.188301] WARNING: suspicious RCU usage > > > [ 91.192316] 5.10.0-rc4-next-20201119-00002-g51c2bf0ac853 #25 Tainted: G W > > > [ 91.197536] ----------------------------- > > > [ 91.201431] kernel/trace/trace_preemptirq.c:78 RCU not watching trace_hardirqs_off()! > > > [ 91.206546] > > > [ 91.206546] other info that might help us debug this: > > > [ 91.206546] > > > [ 91.211790] > > > [ 91.211790] rcu_scheduler_active = 2, debug_locks = 0 > > > [ 91.216454] RCU used illegally from extended quiescent state! > > > [ 91.220890] no locks held by swapper/0/0. > > > [ 91.224712] > > > [ 91.224712] stack backtrace: > > > [ 91.228794] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.10.0-rc4-next-20201119-00002-g51c2bf0ac853 #25 > > > [ 91.234877] Hardware name: linux,dummy-virt (DT) > > > [ 91.239032] Call trace: > > > [ 91.242587] dump_backtrace+0x0/0x240 > > > [ 91.246500] show_stack+0x34/0x88 > > > [ 91.250295] dump_stack+0x140/0x1bc > > > [ 91.254159] lockdep_rcu_suspicious+0xe4/0xf8 > > > [ 91.258332] trace_hardirqs_off+0x214/0x330 > > > [ 91.262462] trace_graph_return+0x1ac/0x1d8 > > > [ 91.266564] ftrace_return_to_handler+0xa4/0x170 > > > [ 91.270809] return_to_handler+0x1c/0x38 > > > [ 91.274826] default_idle_call+0x94/0x38c > > > [ 91.278869] do_idle+0x240/0x290 > > > [ 91.282633] rest_init+0x1e8/0x2dc > > > [ 91.286529] arch_call_rest_init+0x1c/0x28 > > > [ 91.290585] start_kernel+0x638/0x670 > > > > Hmm... I suspect that arch_cpu_idle() is being traced here, and I reckon > > we have to mark that and its callees as noinstr, since it doesn't seem > > sane to have ftrace check whether RCU is watching for every function > > call. Maybe Paul or Steve can correct me. ;) > > Yes, it's arch_cpu_idle(). > > > If you still have the binary lying around, can you check whether > > default_idle_call+0x94/0x38c is just after the call to arch_cpu_idle()? > > If you could dump the asm around that, along with whatever faddr2line > > tells you, that'd be a great help. > > I reran to be sure, with similar results. I've attached a > syz-symbolize'd version of the warnings. Thanks for confirming, and for the symbolized report. I'll see about getting this fixed ASAP. Thanks, Mark.