Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp32070792rwd; Fri, 7 Jul 2023 08:16:48 -0700 (PDT) X-Google-Smtp-Source: APBJJlGgCoJgR/4NdLaa++MFFGTyZE0SBjol5ZyWaJJAH13iju0lafMRL9OEIpy6qtN8i4TnWM/F X-Received: by 2002:a9d:7411:0:b0:6b7:5363:1eea with SMTP id n17-20020a9d7411000000b006b753631eeamr5319376otk.16.1688743007920; Fri, 07 Jul 2023 08:16:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688743007; cv=none; d=google.com; s=arc-20160816; b=rsbN8OOKMN+BQqQQnDfTO81rQ9zuN1nrZFMx8EVyG/1Ybk2KehCi/IDZLuvhidYIRq eKG4SLowt3uuFIqTvjPM+AiJUIPbg5qHcHFiXSsakBu4qoRnRvVjE1VfHS6JmhYoBvJM h7vWJ9s8oDR8/aiQHmdvPq/jcgVZZRVLtDuTPj4JwjF2r3wa1wHB/BtNEOuTQ3dSNOAp 03EDY+/cre6hh4VCt65hF49nwdJwPi2p+ZZ09nWDAHuiQceDfrCOTw2O+aHDEP2kvmyo XQ0csYGnp9lRBx+rTaY0ZWrzw0PdMH2SEqgbtLMist2DXdGOUpYKRdcOJN4oylVaT0c+ bB1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=eiOAjwadAWrcb7BoEkfxT+CYoQ+BF4xaAyjip1hV5Xs=; fh=VY/3fO6bCEYfHyB6mWP25YDCgBYo/YRAycHX6DK3WJI=; b=lctBwEPH4/DJSEUgwJ+G/KwhLu5in677oAQys7VyjQbs460uh2HZLMyL7vqoiUdhkt ZKG/W8CBS4LetfKFBSe7KRCiW6p4p1ek/Zpq72WLUgjiPPXfs1zv4IdEadoYN67LCl3R oyctT2B+wbCcOn0KE1ydzKTsUcGtSKWVo15dlZlaTpH3NgMcNRY0Q5gyPCNXJnClPqmb XQBWctwz70GvwlrPChfqv/bFspVom9Kzyf1h/bPqPTyAWCrd6oXy7s2+kxNehrOqbFKl ZgjOlLcgBDYvz+YLNPgNtQ8eAbwmXTe4mIDkNr2U/Bcg4rscEqtmlusupw6Y7ThwlT6v w8ow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zs5tnBao; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l187-20020a6325c4000000b0055bc257504fsi4332258pgl.497.2023.07.07.08.16.35; Fri, 07 Jul 2023 08:16:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zs5tnBao; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233180AbjGGO5p (ORCPT + 99 others); Fri, 7 Jul 2023 10:57:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233173AbjGGO5n (ORCPT ); Fri, 7 Jul 2023 10:57:43 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7520B1FE1 for ; Fri, 7 Jul 2023 07:57:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1688741819; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=eiOAjwadAWrcb7BoEkfxT+CYoQ+BF4xaAyjip1hV5Xs=; b=Zs5tnBao6KyW3yjgqKWmYdIwSHI7uwQJDiv7BcjmvAiZ9YqSey9ZWdTGuBx8uIqpU7moa3 NZJE7RfaVcVxb0ttszGNqwSZ3vaYZKZokUtDUCO9lrniENb3EoqVM5SbCK8T22t9XobWxM i9fHXCBTn6gRLh1fFUHs66RyIJ/jEV0= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-172-IuoQqGI5NpuHDIjJsSoFHQ-1; Fri, 07 Jul 2023 10:56:53 -0400 X-MC-Unique: IuoQqGI5NpuHDIjJsSoFHQ-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 79C973C0F685; Fri, 7 Jul 2023 14:56:52 +0000 (UTC) Received: from [10.22.34.12] (unknown [10.22.34.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id D2D2D2166B25; Fri, 7 Jul 2023 14:56:51 +0000 (UTC) Message-ID: Date: Fri, 7 Jul 2023 10:56:51 -0400 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [PATCH] refscale: Fix use of uninitalized wait_queue_head_t Content-Language: en-US To: Davidlohr Bueso Cc: "Paul E. McKenney" , Josh Triplett , Frederic Weisbecker , Neeraj Upadhyay , Joel Fernandes , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , Boqun Feng , Zqiang , rcu@vger.kernel.org, linux-kernel@vger.kernel.org References: <20230707000117.2371697-1-longman@redhat.com> From: Waiman Long In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.6 X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/7/23 10:07, Davidlohr Bueso wrote: > On Thu, 06 Jul 2023, Waiman Long wrote: > >> It was found that running the refscale test might sometimes crash the >> kernel with the following error: >> >> [ 8569.952896] BUG: unable to handle page fault for address: >> ffffffffffffffe8 >> [ 8569.952900] #PF: supervisor read access in kernel mode >> [ 8569.952902] #PF: error_code(0x0000) - not-present page >> [ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0 >> [ 8569.952910] Oops: 0000 [#1] PREEMPT_RT SMP NOPTI >> [ 8569.952916] Hardware name: Dell Inc. PowerEdge R750/0WMWCR, BIOS >> 1.2.4 05/28/2021 >> [ 8569.952917] RIP: 0010:prepare_to_wait_event+0x101/0x190 >>  : >> [ 8569.952940] Call Trace: >> [ 8569.952941]  >> [ 8569.952944]  ref_scale_reader+0x380/0x4a0 [refscale] >> [ 8569.952959]  kthread+0x10e/0x130 >> [ 8569.952966]  ret_from_fork+0x1f/0x30 >> [ 8569.952973]  >> >> This is likely caused by the fact that init_waitqueue_head() is called >> after the ref_scale_reader kthread is created. So the kthread may try >> to use the waitqueue head before it is properly initialized. Fix this >> by initializing the waitqueue head first before kthread creation. >> >> Fixes: 653ed64b01dc ("refperf: Add a test to measure performance of >> read-side synchronization") >> Signed-off-by: Waiman Long > > Strange this wasn't reported sooner. Red Hat does have a pretty large QE organization that run all sort of tests include this one pretty frequently. The race window is pretty small, but they did hit this once in a while. Cheers, Longman