Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1452083rwr; Wed, 26 Apr 2023 15:33:03 -0700 (PDT) X-Google-Smtp-Source: AKy350YigM5Sn4WVf4udtWhylcqFexrQuN/U5+/96jwn/UKeDwHs9MscBCIbtny3ztCpRame5M95 X-Received: by 2002:a05:6a20:a698:b0:ef:cb4c:c23e with SMTP id ba24-20020a056a20a69800b000efcb4cc23emr25729080pzb.29.1682548382770; Wed, 26 Apr 2023 15:33:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682548382; cv=none; d=google.com; s=arc-20160816; b=ioO5nUdydsVkuALYVHqxkYopxOgCV8iHyey74wsuEngm7/NmtR2Cf6wbh+ByyhRR3U Cjf0fh/RC0GGHUVQ+2JXG8IiM23tYMK0JRDpZz3f9ccHYQD2rTjvnLNp9/QkexD5lwNH Js0/HlUgJFWauB6ORbZUzKCIE1xldj5IaNHaBjXJ1TsZNdCDWbMEULGSg9H7sPLp0yux lMjkS0VbkzSe2D/nUnvuR1sVoTLWm15WyE6vsnwJwi4SOrZR3wxU77aCXvLEwCV0RZI9 slZMaI5qLmqjTsXSVMnVQh0viN7xLeKjcNIDzkJzaHE6mbGuW060ZnhyJew2k3Kw4ExY ymFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=ZqKDOBTN3kIsC96wiGPzHNchqLffZdwSfCTkb4oL4jo=; b=sbrWSxxNC3IA11nJRw9y9X/5jt8d4GVJYyP2ymIEZ8HAp0UzaglVhso46ijShuQ6Vp kM3ehZmCA2aQj7VVpB6PMZqMjpwHZ/dmt2GfmfwfyjfKhQyqUAIA5eUkrCW4Qbc2kGba +8UYLhQUbh3bTDYj/2SexXJ6AbdnP0H2UlACPKTflkakjCkJgIZt+VfMkAe1ftZid+Zy IQBnAGfDT4miJDtVuYqv+1DGbsEDOGqNazQhJCgwJz+1KK0BwgZBfI+tx8fTa0/0iGxV 2QwwqaO0es0ukFeiEJ77pRdVQPzsPjsvxu73TEyD/hlSBJvMn3lUFPuz5qRomkQ/RQcF ez9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ot3-20020a17090b3b4300b00247ad6e4188si21925051pjb.51.2023.04.26.15.32.45; Wed, 26 Apr 2023 15:33:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239635AbjDZWOX (ORCPT + 99 others); Wed, 26 Apr 2023 18:14:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42016 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229889AbjDZWOW (ORCPT ); Wed, 26 Apr 2023 18:14:22 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98009DD; Wed, 26 Apr 2023 15:14:20 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3181A6323A; Wed, 26 Apr 2023 22:14:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6AB8AC433D2; Wed, 26 Apr 2023 22:14:17 +0000 (UTC) Date: Wed, 26 Apr 2023 18:14:15 -0400 From: Steven Rostedt To: Naresh Kamboju Cc: Greg Kroah-Hartman , Masami Hiramatsu , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, Mark Rutland , "Paul E. McKenney" , Peter Zijlstra Subject: Re: [PATCH 4.19 00/29] 4.19.282-rc1 review Message-ID: <20230426181415.17c893f5@gandalf.local.home> In-Reply-To: <20230426170945.0ec0f1ef@gandalf.local.home> References: <20230424131121.155649464@linuxfoundation.org> <20230426170945.0ec0f1ef@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 26 Apr 2023 17:09:45 -0400 Steven Rostedt wrote: > Now the question is, why is this triggering on 4.19 but not in latest > mainline? I found it, I backported this patch and the warning goes away (at least for me). Can you add this and see if it makes the warning go away for you too? -- Steve From: Peter Zijlstra Date: Fri, 7 Aug 2020 20:50:19 +0200 Subject: [PATCH] sched,idle,rcu: Push rcu_idle deeper into the idle path commit 1098582a0f6c4e8fd28da0a6305f9233d02c9c1d upstream. Lots of things take locks, due to a wee bug, rcu_lockdep didn't notice that the locking tracepoints were using RCU. Push rcu_idle_{enter,exit}() as deep as possible into the idle paths, this also resolves a lot of _rcuidle()/RCU_NONIDLE() usage. Specifically, sched_clock_idle_wakeup_event() will use ktime which will use seqlocks which will tickle lockdep, and stop_critical_timings() uses lock. Signed-off-by: Peter Zijlstra (Intel) Reviewed-by: Steven Rostedt (VMware) Reviewed-by: Thomas Gleixner Acked-by: Rafael J. Wysocki Tested-by: Marco Elver Link: https://lkml.kernel.org/r/20200821085348.310943801@infradead.org --- drivers/cpuidle/cpuidle.c | 12 ++++++++---- kernel/sched/idle.c | 22 ++++++++-------------- 2 files changed, 16 insertions(+), 18 deletions(-) diff --git a/drivers/cpuidle/cpuidle.c b/drivers/cpuidle/cpuidle.c index 2d182dc1b49e..01bde6dec13a 100644 --- a/drivers/cpuidle/cpuidle.c +++ b/drivers/cpuidle/cpuidle.c @@ -140,13 +140,14 @@ static void enter_s2idle_proper(struct cpuidle_driver *drv, * executing it contains RCU usage regarded as invalid in the idle * context, so tell RCU about that. */ - RCU_NONIDLE(tick_freeze()); + tick_freeze(); /* * The state used here cannot be a "coupled" one, because the "coupled" * cpuidle mechanism enables interrupts and doing that with timekeeping * suspended is generally unsafe. */ stop_critical_timings(); + rcu_idle_enter(); drv->states[index].enter_s2idle(dev, drv, index); if (WARN_ON_ONCE(!irqs_disabled())) local_irq_disable(); @@ -155,7 +156,8 @@ static void enter_s2idle_proper(struct cpuidle_driver *drv, * first CPU executing it calls functions containing RCU read-side * critical sections, so tell RCU about that. */ - RCU_NONIDLE(tick_unfreeze()); + rcu_idle_exit(); + tick_unfreeze(); start_critical_timings(); time_end = ns_to_ktime(local_clock()); @@ -224,16 +226,18 @@ int cpuidle_enter_state(struct cpuidle_device *dev, struct cpuidle_driver *drv, /* Take note of the planned idle state. */ sched_idle_set_state(target_state); - trace_cpu_idle_rcuidle(index, dev->cpu); + trace_cpu_idle(index, dev->cpu); time_start = ns_to_ktime(local_clock()); stop_critical_timings(); + rcu_idle_enter(); entered_state = target_state->enter(dev, drv, index); + rcu_idle_exit(); start_critical_timings(); sched_clock_idle_wakeup_event(); time_end = ns_to_ktime(local_clock()); - trace_cpu_idle_rcuidle(PWR_EVENT_EXIT, dev->cpu); + trace_cpu_idle(PWR_EVENT_EXIT, dev->cpu); /* The cpu is no longer idle or about to enter idle. */ sched_idle_set_state(NULL); diff --git a/kernel/sched/idle.c b/kernel/sched/idle.c index 44a17366c8ec..4e3d149d64ad 100644 --- a/kernel/sched/idle.c +++ b/kernel/sched/idle.c @@ -53,17 +53,18 @@ __setup("hlt", cpu_idle_nopoll_setup); static noinline int __cpuidle cpu_idle_poll(void) { + trace_cpu_idle(0, smp_processor_id()); + stop_critical_timings(); rcu_idle_enter(); - trace_cpu_idle_rcuidle(0, smp_processor_id()); local_irq_enable(); - stop_critical_timings(); while (!tif_need_resched() && - (cpu_idle_force_poll || tick_check_broadcast_expired())) + (cpu_idle_force_poll || tick_check_broadcast_expired())) cpu_relax(); - start_critical_timings(); - trace_cpu_idle_rcuidle(PWR_EVENT_EXIT, smp_processor_id()); + rcu_idle_exit(); + start_critical_timings(); + trace_cpu_idle(PWR_EVENT_EXIT, smp_processor_id()); return 1; } @@ -90,7 +91,9 @@ void __cpuidle default_idle_call(void) local_irq_enable(); } else { stop_critical_timings(); + rcu_idle_enter(); arch_cpu_idle(); + rcu_idle_exit(); start_critical_timings(); } } @@ -148,7 +151,6 @@ static void cpuidle_idle_call(void) if (cpuidle_not_available(drv, dev)) { tick_nohz_idle_stop_tick(); - rcu_idle_enter(); default_idle_call(); goto exit_idle; @@ -166,19 +168,15 @@ static void cpuidle_idle_call(void) if (idle_should_enter_s2idle() || dev->use_deepest_state) { if (idle_should_enter_s2idle()) { - rcu_idle_enter(); entered_state = cpuidle_enter_s2idle(drv, dev); if (entered_state > 0) { local_irq_enable(); goto exit_idle; } - - rcu_idle_exit(); } tick_nohz_idle_stop_tick(); - rcu_idle_enter(); next_state = cpuidle_find_deepest_state(drv, dev); call_cpuidle(drv, dev, next_state); @@ -195,8 +193,6 @@ static void cpuidle_idle_call(void) else tick_nohz_idle_retain_tick(); - rcu_idle_enter(); - entered_state = call_cpuidle(drv, dev, next_state); /* * Give the governor an opportunity to reflect on the outcome @@ -212,8 +208,6 @@ static void cpuidle_idle_call(void) */ if (WARN_ON_ONCE(irqs_disabled())) local_irq_enable(); - - rcu_idle_exit(); } /* -- 2.39.2