Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2C6D4C05027 for ; Thu, 26 Jan 2023 15:14:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231846AbjAZPOQ (ORCPT ); Thu, 26 Jan 2023 10:14:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230016AbjAZPOP (ORCPT ); Thu, 26 Jan 2023 10:14:15 -0500 Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E37C118148 for ; Thu, 26 Jan 2023 07:14:12 -0800 (PST) Received: by mail-lj1-x22b.google.com with SMTP id e16so2213591ljn.3 for ; Thu, 26 Jan 2023 07:14:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=A62Wqcwz3KAe6w9tQ3XXCcSw0l3Me0LjkoGc02NA/6Q=; b=w0vs0Y0Q3/44L5Iaz//Wooo3lPXu2un4N6ox/lN1pIzp3kuwN7Ham8xaEBpbZeIQdA bEw9zD5QGgoWE+ueiVw7Dojz98yRZGhGqHdfIbJeQb6BxPC0ECejFkZt12JhQ4yJ2Wl8 +phgHVkV9h7acpThYUUegsH423gqEizBYYq7c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=A62Wqcwz3KAe6w9tQ3XXCcSw0l3Me0LjkoGc02NA/6Q=; b=Id4Z/8oegrBJ9wsrjofGU0aQ2HQPGPUcIhZWe4JSUm4Bj7N9k20vbizg4DbqoxPEKS tUAbudei+6oACFaw0RVokBweIo9hH+uZw0qyZnDP3t0INkOYXVTUcb8AdsSVcw17ZzDn RNEI/YqmEm29ggXJRlh56Lb58Q9+mGqDaK9FBBKQU/3y26Xfe/9/lr404CjAxlKINhWN bozQSOaNYZleOFlSWXktbS36W7+pU0SfmDwZ2KDt6q/xB2nm+w0NZNuWw/4SBaMq6f+c c63Uxx6siPZ2IefAIlsPqmlakOXpxze66i132fuk69xB4X3vVA/kQFxmxCkYG18RPt7p YxHw== X-Gm-Message-State: AFqh2kpJ01LTH6SmOKr58Gm/LVcbFaESoJPX/b7xbRxzEi8142IDckQu qPhEKPUCwO5xVJbxb73exyxkx96NX0K2Vv/IbYLwHA== X-Google-Smtp-Source: AMrXdXt1Ac5gzpIfDwY02UjPiREGilxXzFSY3KEOVzAwJot+JGBnZDVEP3SYo1aYFaKbzIEgqze3i4BRfuQQ3/9PQtE= X-Received: by 2002:a2e:944c:0:b0:28b:a09b:6135 with SMTP id o12-20020a2e944c000000b0028ba09b6135mr1780273ljh.221.1674746051139; Thu, 26 Jan 2023 07:14:11 -0800 (PST) MIME-Version: 1.0 References: <20230124173126.3492345-1-joel@joelfernandes.org> <20230124225628.GZ2948950@paulmck-ThinkPad-P17-Gen-1> In-Reply-To: From: Joel Fernandes Date: Thu, 26 Jan 2023 10:13:59 -0500 Message-ID: Subject: Re: [PATCH v2 RESEND] tick/nohz: Fix cpu_is_hotpluggable() by checking with nohz subsystem To: Zhouyi Zhou Cc: paulmck@kernel.org, linux-kernel@vger.kernel.org, Greg Kroah-Hartman , Frederic Weisbecker , Will Deacon , Marc Zyngier , rcu , stable@vger.kernel.org, Frederic Weisbecker , Ingo Molnar , "Rafael J. Wysocki" , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 26, 2023 at 10:01 AM Zhouyi Zhou wrote: > > On Thu, Jan 26, 2023 at 12:16 PM Zhouyi Zhou wrote: > > > > On Wed, Jan 25, 2023 at 8:13 AM Zhouyi Zhou wrote: > > > > > > On Wed, Jan 25, 2023 at 6:56 AM Paul E. McKenney wrote: > > > > > > > > On Tue, Jan 24, 2023 at 05:31:26PM +0000, Joel Fernandes (Google) wrote: > > > > > For CONFIG_NO_HZ_FULL systems, the tick_do_timer_cpu cannot be offlined. > > > > > However, cpu_is_hotpluggable() still returns true for those CPUs. This causes > > > > > torture tests that do offlining to end up trying to offline this CPU causing > > > > > test failures. Such failure happens on all architectures. > > > > > > > > > > Fix it by asking the opinion of the nohz subsystem on whether the CPU can > > > > > be hotplugged. > > > > > > > > > > [ Apply Frederic Weisbecker feedback on refactoring tick_nohz_cpu_down(). ] > > > > > > > > > > For drivers/base/ portion: > > > > > Acked-by: Greg Kroah-Hartman > > > > > > > > > > Cc: Frederic Weisbecker > > > > > Cc: "Paul E. McKenney" > > > > > Cc: Zhouyi Zhou > > > > > Cc: Will Deacon > > > > > Cc: Marc Zyngier > > > > > Cc: rcu > > > > > Cc: stable@vger.kernel.org > > > > > Fixes: 2987557f52b9 ("driver-core/cpu: Expose hotpluggability to the rest of the kernel") > > > > > Signed-off-by: Joel Fernandes (Google) > > > > > > > > Queued for further review and testing, thank you both! > > > > > > > > It might be a few hours until it becomes publicly visible, but it will > > > > get there. > > > A new round of rcutorture test on fixed linux-5.15.y[3] has been > > > performed in the PPC VM of Open Source Lab of Oregon State University > > > [1], which will last about 29 hours. The test result on original > > > linux-5.15.y is at [2]. > > From the result of [1], the HOTPLUG failure reports have been > > eliminated, but a new kernel null point bug related to scsi module has > > been reported [4] ;-( > > [ 5.178733][ C1] BUG: Kernel NULL pointer dereference on read at > > 0x00000008 > > ... > > [ 5.231013][ C1] [c00000001ff9fca0] [c0000000009ffbc8] > > scsi_end_request+0xd8/0x1f0 (unreliable)^M > > [ 5.234961][ C1] [c00000001ff9fcf0] [c000000000a00e68] > > scsi_io_completion+0x88/0x700^M > > [ 5.237863][ C1] [c00000001ff9fda0] [c0000000009f5028] > > scsi_finish_command+0xe8/0x150^M > > [ 5.240089][ C1] [c00000001ff9fdf0] [c000000000a00c70] > > scsi_complete+0x90/0x140^M > > [ 5.242481][ C1] [c00000001ff9fe20] [c0000000007e5170] > > blk_complete_reqs+0x80/0xa0^M > > [ 5.245187][ C1] [c00000001ff9fe50] [c000000000f0b5d0] > > __do_softirq+0x1e0/0x4e0^M > > [ 5.248479][ C1] [c00000001ff9ff90] [c0000000000170e8] > > do_softirq_own_stack+0x48/0x60^M > > [ 5.250919][ C1] [c00000000a5e7c40] [c00000000a5e7c80] > > 0xc00000000a5e7c80^M > > [ 5.253792][ C1] [c00000000a5e7c70] [c0000000001534c0] > > do_softirq+0xb0/0xc0^M > > [ 5.256824][ C1] [c00000000a5e7ca0] [c0000000001535ac] > > __local_bh_enable_ip+0xdc/0x110^M > > [ 5.259414][ C1] [c00000000a5e7cc0] [c0000000001d75e8] > > irq_forced_thread_fn+0xc8/0xf0^M > > [ 5.261921][ C1] [c00000000a5e7d00] [c0000000001d7ae4] > > irq_thread+0x1b4/0x2a0^M > > [ 5.265298][ C1] [c00000000a5e7da0] [c00000000017d8c8] > > kthread+0x1a8/0x1d0^M > > [ 5.269184][ C1] [c00000000a5e7e10] [c00000000000cee4] > > ret_from_kernel_thread+0x5c/0x64^M > > > > But when I invoked [5] by hand, the bug did not show again [6]. > > > > [4] http://140.211.169.189/linux-stable-rc/tools/testing/selftests/rcutorture/res/2023.01.25-00.04.30-torture/results-clocksourcewd-2/TREE03/console.log > > [5] http://140.211.169.189/linux-stable-rc/tools/testing/selftests/rcutorture/res/2023.01.25-00.04.30-torture/results-clocksourcewd-2/TREE03/qemu-cmd > > [6] http://140.211.169.189/linux-stable-rc/tools/testing/selftests/rcutorture/res/2023.01.25-00.04.30-torture/results-clocksourcewd-2/TREE03/console.zzy.log > > > > I think the bug is not caused by Joel's patch, there must be some > > other reason. I am starting the 29 hours' rcutorture test again. And I > > can give ssh access to you if you are interested in it. > > > > Sorry for the inconvenience that I bring > > > > Thanks > > Zhouyi > Hi the above kernel null pointer dereference bug has nothing to do > with Joel's fix because I can reproduce it on original 5.15.y [7] > using as while loop [8] (after 36 iterations, the bug fires). > So, Joel's patch is tested good! > Tested-by: Zhouyi Zhou Interesting. I have been running rcutorture's TREE03 on 5.15.y quite a lot and I don't see such an issue. However, your logs showed the crash is SCSI related. These were the recent SCSI commits in 5.15.y but I am not sure if it causes the issue: 13259b6 scsi: mpi3mr: Refer CONFIG_SCSI_MPI3MR in Makefile 513fdf0 scsi: ufs: Stop using the clock scaling lock in the error handler 7c26d21 scsi: ufs: core: WLUN suspend SSU/enter hibern Perhaps report it to the scsi and/or stable lists, or do some web searches for if someone else sees it. - Joel