Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp395253pxv; Wed, 14 Jul 2021 06:33:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwi3RcJaFxjYdg0K04mO2cru0OS9AOva4AUHXvgRJjAbakhmlUDWTbt8aEjgzY0DQEHPZg X-Received: by 2002:a5e:a816:: with SMTP id c22mr7377314ioa.94.1626269634110; Wed, 14 Jul 2021 06:33:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626269634; cv=none; d=google.com; s=arc-20160816; b=TUBJQBhoO9soDD/5Kciufn/TEYuLTenYnQgPSiBDejJiMmXpA9rdRAyw7+J3Idk2Aa c3OuWfyQixhVLgO0yu+yNZRot5ZTM0j7YN8AHs2HvyA8qNQP2Fn0a9IViRhe+60qACRC CIC17owLRCBConZ5K7KFHf7gztuE9pi6JdTZNqQXEO9dbZAxYk/H7Yo8yEfKf5eRxXsl +SeM1uaphRjR6OPeC2LGjdYrJaV0fauJQfXqHEYOPbNGwDcMFqwfgwySpiNKv3uTM+cQ glqlAJiU5MVLbfwANH8HoErj8LPHuVgsmpDPI6noeOnr0Iod1rO/iSE0hR3TlIQtWGg5 brHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=JjlRu8JMAzPXY/Feg5azK0Zeo20BvBkk70Wfg8IUYxc=; b=zCFTEDMtZkfgdBp7tk793AIPafJ+WuTdzjpdyw1efWdM7Tcu4ZZgwAA3fBplViU5ur Pbntlc2v5m7+WwTgcYetR5A8XrqF0Mi93cKuuSpV9q7QJ3z7/78ssbpuIu7e2aAlWqTn ICKBpy1v9s+mxTDNp+UnA6QT+0UpL3z39wxVwAhomljRrT03amkRr1z18jeDlZ+1T02J swdeA50iMpB2Mlse5O0r+Q7Tv7doWVSFzgCUyG7UVyJtvKoJe2p9bOMMCW2YYuqQAlHM 2jE5A246csOPcaZF2hj/7fUrgOi6+zjMhoo7P/Ilp7Vcjh7wYPYQJRq7wLpiF2y9ZDhw 7KoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oJJk6+vh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c20si2669404jap.38.2021.07.14.06.33.39; Wed, 14 Jul 2021 06:33:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oJJk6+vh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232191AbhGNNeG (ORCPT + 99 others); Wed, 14 Jul 2021 09:34:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:38414 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231730AbhGNNeF (ORCPT ); Wed, 14 Jul 2021 09:34:05 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EB528613B6; Wed, 14 Jul 2021 13:31:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626269473; bh=SV7sJSRe1aFUuLtQS99fMd9oF2zB7ZWYui7q+JCwgGw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=oJJk6+vhc0jI0ZhF90jb+S2WC44p+xmjzWq750MC+U1z4wy5PlOTAE+orcawuB47O 6sHjj6Pdcx12bmXz9PCnNOhNZAuZF9qQOIXIEQyVXrc9fbyviBaViafC3PIsphCVfm +isQaI3wvOnCU91hqKF1Rnwig1/0hWaKFMRcEVQQ= Date: Wed, 14 Jul 2021 15:31:10 +0200 From: Greg Kroah-Hartman To: Holger Kiehl Cc: Jan Kara , linux-kernel , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, stable@vger.kernel.org Subject: Re: [PATCH 5.13 000/800] 5.13.2-rc1 review Message-ID: References: <20210712060912.995381202@linuxfoundation.org> <68b6051-09c-9dc8-4b52-c4e766fee5@praktifix.dwd.de> <50fb4713-6b5d-b5e0-786a-6ece57896d2f@praktifix.dwd.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 14, 2021 at 01:26:26PM +0000, Holger Kiehl wrote: > On Wed, 14 Jul 2021, Holger Kiehl wrote: > > > On Wed, 14 Jul 2021, Greg Kroah-Hartman wrote: > > > > > On Wed, Jul 14, 2021 at 05:39:43AM +0000, Holger Kiehl wrote: > > > > Hello, > > > > > > > > On Mon, 12 Jul 2021, Greg Kroah-Hartman wrote: > > > > > > > > > This is the start of the stable review cycle for the 5.13.2 release. > > > > > There are 800 patches in this series, all will be posted as a response > > > > > to this one. If anyone has any issues with these being applied, please > > > > > let me know. > > > > > > > > > > Responses should be made by Wed, 14 Jul 2021 06:02:46 +0000. > > > > > Anything received after that time might be too late. > > > > > > > > > With this my system no longer boots: > > > > > > > > [ OK ] Reached target Swap. > > > > [ 75.213852] NMI watchdog: Watchdog detected hard LOCKUP on cpu 0 > > > > [ 75.213926] NMI watchdog: Watchdog detected hard LOCKUP on cpu 2 > > > > [ 75.213962] NMI watchdog: Watchdog detected hard LOCKUP on cpu 4 > > > > [FAILED] Failed to start Wait for udev To Complete Device Initialization. > > > > See 'systemctl status systemd-udev-settle.service' for details. > > > > Starting Activation of DM RAID sets... > > > > [ ] (1 of 2) A start job is running for Activation of DM RAID sets (..min ..s / no limit) > > > > [ ] (2 of 2) A start job is running for Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling (..min ..s / no limit) > > > > > > > > System is a Fedora 34 with all updates applied. Two other similar > > > > systems with AMD CPUs (Ryzen 4750G + 3400G) this does not happen > > > > and boots fine. The system where it does not boot has an Intel > > > > Xeon E3-1285L v4 CPU. All of them use a dm_crypt root filesystem. > > > > > > > > Any idea which patch I should drop to see if it boots again. I already > > > > dropped > > > > > > > > [PATCH 5.13 743/800] ASoC: Intel: sof_sdw: add quirk support for Brya and BT-offload > > > > > > > > and I just see that this one should also be dropped: > > > > > > > > [PATCH 5.13 768/800] hugetlb: address ref count racing in prep_compound_gigantic_page > > > > > > > > Will still need to test this. > > > > > > Can you run 'git bisect' to see what commit causes the problem? > > > > > Yes, will try to do that. I think it will take some time ... > > > With the help of Pavel Machek and Jiri Slaby I was able 'git bisect' > this to: > > yoda:/usr/src/kernels/linux-5.13.y# git bisect good > a483f513670541227e6a31ac7141826b8c785842 is the first bad commit > commit a483f513670541227e6a31ac7141826b8c785842 > Author: Jan Kara > Date: Wed Jun 23 11:36:33 2021 +0200 > > bfq: Remove merged request already in bfq_requests_merged() > > [ Upstream commit a921c655f2033dd1ce1379128efe881dda23ea37 ] > > Currently, bfq does very little in bfq_requests_merged() and handles all > the request cleanup in bfq_finish_requeue_request() called from > blk_mq_free_request(). That is currently safe only because > blk_mq_free_request() is called shortly after bfq_requests_merged() > while bfqd->lock is still held. However to fix a lock inversion between > bfqd->lock and ioc->lock, we need to call blk_mq_free_request() after > dropping bfqd->lock. That would mean that already merged request could > be seen by other processes inside bfq queues and possibly dispatched to > the device which is wrong. So move cleanup of the request from > bfq_finish_requeue_request() to bfq_requests_merged(). > > Acked-by: Paolo Valente > Signed-off-by: Jan Kara > Link: https://lore.kernel.org/r/20210623093634.27879-2-jack@suse.cz > Signed-off-by: Jens Axboe > Signed-off-by: Sasha Levin > > block/bfq-iosched.c | 41 +++++++++++++---------------------------- > 1 file changed, 13 insertions(+), 28 deletions(-) > > Holger Wonderful! So if you drop that, all works well? I'll go drop that from the queues now. thanks, greg k-h