Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp544258rwb; Tue, 29 Nov 2022 02:04:01 -0800 (PST) X-Google-Smtp-Source: AA0mqf6K9Te0WhYVjDIqcBsxpFL2NaEfWtwrbnPEQb4wENA9mHWuvfq/ebrzEJgQ+kPp/r8kKKDX X-Received: by 2002:a63:f50b:0:b0:477:96e1:fa72 with SMTP id w11-20020a63f50b000000b0047796e1fa72mr31705237pgh.523.1669716241073; Tue, 29 Nov 2022 02:04:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669716241; cv=none; d=google.com; s=arc-20160816; b=FLt6ClVfQX8xZVhvbQTm7molHQu3KFEZF2X1f9zrI/6o6v/kEaSgSDhVZ++ZRfB2BZ yNb/8YgSOzeligsabKEx+rQZsRYUFUrdoNBAsBx09TE5sYAEPT3aTF8U+Twc04xSQFTc CUwc8Hdss/OWuFjsAKwvveFUU27vOFq3UKmtZR327CJjClMv1cEO2HNJM4pbj88CsWib 3USafJSh0Ieg/Fd6K/5zCpU82omSRuQT9d9z9fDlnQUfg86R6OOsfY0N5csDhIT5RMJj cy+MKYpotarp8GjT6iakTokVDA5JwRQXX/pdW02QzMMZVYhgxAq8Fddr59o+ov+MlUpN bkHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id; bh=y/7iSjz8T9ZV3uSHFcC0DpHkkH+cPlkCYkwkK3c5jz0=; b=wmM3e6lyNIFUzflx/Cpv5XYV8u09gSpfo3g5QGFNVzcSgcZNQl+nUPfMJNMcP++OhO qa1QM3R+eC3fAiqLNsSlwR3tFQsbY8LWMLkJXzeIH3XHtLjU3b0VkmOPThu6vIg1JNMn AkeLqTP9kns57TUT93kyV1ZQZpshwTqoiSNM3xc8Pi9zGXhv/0v8HB/cRG0Z4EPi7Jl/ SIjEgqLDD0AhRcsoT/KaeTeGryZ9emc1w9iMeTatlm5mn7lqMS6Iuf/vrp1Mkg8vDA77 OEH4y0OeQx/GH1t0s8q0Tx9jDmZy8nsqiLSjYTNjTsZPF25RMs130lB2eWEGIE/q+pKd xz3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x22-20020a170902b41600b00188e9ec511dsi12965355plr.397.2022.11.29.02.03.49; Tue, 29 Nov 2022 02:04:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231391AbiK2Iyc (ORCPT + 83 others); Tue, 29 Nov 2022 03:54:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32888 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229694AbiK2IyF (ORCPT ); Tue, 29 Nov 2022 03:54:05 -0500 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B28AB4FF81 for ; Tue, 29 Nov 2022 00:53:59 -0800 (PST) Received: from [2a02:8108:963f:de38:eca4:7d19:f9a2:22c5]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1ozwNK-0005sb-Ad; Tue, 29 Nov 2022 09:53:58 +0100 Message-ID: Date: Tue, 29 Nov 2022 09:53:57 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.1 Subject: Re: INFO: rcu_preempt detected expedited stalls on CPUs/tasks (6.1.0-rc3): in cat /sys/kernel/debug/kmemleak #forregzbot Content-Language: en-US, de-DE From: Thorsten Leemhuis To: "regressions@lists.linux.dev" Cc: LKML References: <7ebd090d-4a6c-1a26-6e31-b0554c627e83@leemhuis.info> In-Reply-To: <7ebd090d-4a6c-1a26-6e31-b0554c627e83@leemhuis.info> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1669712039;3d6cf4e9; X-HE-SMSGID: 1ozwNK-0005sb-Ad X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09.11.22 11:48, Thorsten Leemhuis wrote: > [Note: this mail is primarily send for documentation purposes and/or for > regzbot, my Linux kernel regression tracking bot. That's why I removed > most or all folks from the list of recipients, but left any that looked > like a mailing lists. These mails usually contain '#forregzbot' in the > subject, to make them easy to spot and filter out.] > > On 04.11.22 23:01, Mirsad Goran Todorovac wrote: >> >> When investigating thermald kmemleak, it occurred that the "cat >> /sys/kernel/debug/kmemleak" >> and "tail -20 /sys/kernel/debug/kmemleak" commands take unusual amount >> of time. >> >> Dmesg output showed expedited stalls that the commands caused NMIs and >> NMI backtraces: >> >> [ 8123.263464] rcu: INFO: rcu_preempt detected expedited stalls on >> CPUs/tasks: { 0-.... } 26 jiffies s: 3829 root: 0x1/. >> [ 8123.263500] rcu: blocking rcu_node structures (internal RCU debug): >> [ 8123.263508] Sending NMI from CPU 7 to CPUs 0: >> [ 8123.263528] NMI backtrace for cpu 0 >> [ 8123.263539] CPU: 0 PID: 27898 Comm: cat Not tainted 6.1.0-rc3 #1 >> [ 8123.263552] Hardware name: LENOVO 82H8/LNVNB161216, BIOS GGCN34WW >> 03/08/2022 > > #regzbot ^introduced 28b3ae426598e > #regzbot title rcu: thermald causes a kmemleak > #regzbot ignore-activity #regzbot invalid: likely not a regression and just a odd config For details see the discussion ending here: https://lore.kernel.org/all/20221124201552.GV4001@paulmck-ThinkPad-P17-Gen-1/ Ciao, Thorsten