Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4324312rwb; Sat, 21 Jan 2023 09:35:03 -0800 (PST) X-Google-Smtp-Source: AMrXdXuxlO6/HbnOLbfFLvDzdsy81nMg5PbVdfT09QxHRNzFalrDkGoIe7tzlaHTsewOo/CsRsHU X-Received: by 2002:a05:6a21:2d88:b0:ad:79bb:a417 with SMTP id ty8-20020a056a212d8800b000ad79bba417mr19944567pzb.9.1674322503651; Sat, 21 Jan 2023 09:35:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674322503; cv=none; d=google.com; s=arc-20160816; b=lx25OQqa3tWOdkFusG3ex2GH/BAhnGhMVtrMuAvqdV70TtsB3Y81oNd6AkQxcSwgct +qxEId51PwrHcRXiyygZHVJhkvwKfMXhPBN7YJqW6ePWfrfNR65net+w5pqqjGA1QHmz 7vqPi9ZNsfyHj1URrQqdhzae8wuL7e9/ZNWfY8CXiRPobHmVMjA1mOsDfWdcKYWOMDK2 bjgRhJwgwWWOAV+daJEHeSAE2dH+SmKYljxE0M5/NdhOfL4pjvAAhovEVvEwL5hGJlaa dcQSQHsZDK0Fg+SwLhM63Gty2bAZjDVJNcSnTHJ42U27FPgrT3szErmYEXDMj+6qZlkh ISBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=dD7IcWOz3GFxXehgYoB5c16oZV3uEhYVIuGLkDRstRY=; b=KHiPoGgP5xqvZvkvWJ/GZQVBnCQTH7q8+cGf6qhEnBf3A4Bd6e8vT9skdXy0NLYzsZ dFliIITOKhGFIru62YtIO+XUECqlkYCyl0T8wsKdrxe3YnjikNac1ReNOHQuUigbC9PC NVMhHDeueCXKIfU1W2dLjxcl8Wh3ha3Bx4BZ3QHLSTsn/gO0g0Q+WG0vo6yXlaNsWlQJ W+NeJBHRGEVAfwMYC4qHYnLinBbudO9JFhlNeALEGax2JcVQfjVnbWJZXqEAj0bD/Hvt EVfIjqJers5qpievtdxj1Z0VjGOGPRKHNYEjIMvhSdIGBps2V4SmuFkQNiZ/geFEzgX9 PE8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e15-20020a056a00162f00b00588a0da3b50si22763949pfc.61.2023.01.21.09.34.58; Sat, 21 Jan 2023 09:35:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229875AbjAUQtL (ORCPT + 50 others); Sat, 21 Jan 2023 11:49:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38688 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229493AbjAUQtK (ORCPT ); Sat, 21 Jan 2023 11:49:10 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EF2D128D27; Sat, 21 Jan 2023 08:49:08 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8A819601BC; Sat, 21 Jan 2023 16:49:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 00EF2C433D2; Sat, 21 Jan 2023 16:49:06 +0000 (UTC) Date: Sat, 21 Jan 2023 11:49:04 -0500 From: Steven Rostedt To: Peter Zijlstra Cc: kernel test robot , oe-lkp@lists.linux.dev, lkp@intel.com, linux-kernel@vger.kernel.org, x86@kernel.org, Ingo Molnar , linux-trace-kernel@vger.kernel.org Subject: Re: [tip:sched/core] [tracing, hardirq] 9aedeaed6f: WARNING:suspicious_RCU_usage Message-ID: <20230121114904.13d6825d@gandalf.local.home> In-Reply-To: References: <202301192148.58ece903-oliver.sang@intel.com> <20230119112433.611fa273@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.6 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 20 Jan 2023 10:51:18 +0100 Peter Zijlstra wrote: > > does trigger the issue, you can then bisect the functions with the script: > > > > scripts/tracing/ftrace-bisect.sh > > Pff, that all sounds like actual work :-) > > Instead I did me the below hack and added my early_printk() hacks and > that got me a usable backtrace. Well, if you system is still running after the issue, then sure. I created this when it would cause a triple fault reboot. In which case, there was no real debugging output to use. -- Steve > > diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c > index 5e7ead52cfdb..7defc6e24f8f 100644 > --- a/arch/x86/kernel/ftrace.c > +++ b/arch/x86/kernel/ftrace.c > @@ -646,6 +646,9 @@ void prepare_ftrace_return(unsigned long ip, unsigned long *parent, > if (unlikely(atomic_read(¤t->tracing_graph_pause))) > return; > > + if (WARN_ONCE(!rcu_is_watching(), "RCU not on for: %pS\n", (void *)ip)) > + return; > + > bit = ftrace_test_recursion_trylock(ip, *parent); > if (bit < 0) > return;