Received: by 2002:a05:7412:da14:b0:e2:908c:2ebd with SMTP id fe20csp564175rdb; Fri, 6 Oct 2023 11:22:01 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHA/W5dhAeVKv5pEBfZd4qa1mGboHpPL4C1s/bIenEfOfsvZmkRlr8gMl7QrrT7yR5tE0Us X-Received: by 2002:a05:6830:14c5:b0:6c4:9035:fef with SMTP id t5-20020a05683014c500b006c490350fefmr9465083otq.12.1696616521721; Fri, 06 Oct 2023 11:22:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696616521; cv=none; d=google.com; s=arc-20160816; b=DarQOfM2YcgAhEsR/yttjw6JMI/Nd68M1/tG9P5DIIpdLfSBE3knxbsR0Kecn9I1CI mqmYDI5wQMFnLLZpHD4UzcdGhBvY6uWMembIFmHMEdeLPpteDVFt1+LFxlY5t/Nox7VM G54oFJnFq05/aIFVTiqGbRSY7rxPd9iQrf0UDBMs+KM5X+Z6ftKFEusRtYbJOt6rS+n9 OVu3f2S8IMntUdyaqiCSLYLEq5wx4uBy81zngXp+UuHBAIbRHKSSkWeB9o0+9pS42dY2 jpB/Sfg0YYngwfeEeXu6tsNmzJiSiCUzdNzsGq5fgZCQQ0ad2j2TrQStS03RRlmzwcV0 N9Tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=cOsSZmlamXx7XuTznWaz2OuAJqZfFVoFquwYFrW8MZ0=; fh=ccuT7XxG7ZKczigIfCVyDwssn7joyfukrxKuPpLrSvE=; b=XJMlFAZ+fnAENHH2FgB6hSqt8d+z6LDhjrqZXFER7z3eZr26TLN1BU6fxSPv1r8z9I eT6fIrHNJzXYS+c15AS8xWVG97ogjD6IwzCE1knaj0AgQAD151+WqJiVQPNMUM/Ex9hU hqad0sQ+/cje3n7306CbsWSxoVLyzbBr8D/xiQI6y0JveISeyw1mALNvyQ5v40OwRD8z /lrhFQT0MZOuBPHM7ed2UquFN2krCJvGnar0cjRWWtzb1dx3+WB2foYnmmW1Vu90Hdfg oBvt30GQ/mBYMHbd1F4PTCCJFI3LQ83T8SXv57N5e0P0e1vd0uarvfGFra0xgFANe8tw kytQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YMddIapo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id b18-20020a656692000000b0056c297d163asi4228565pgw.523.2023.10.06.11.22.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Oct 2023 11:22:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YMddIapo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id B59A080ACED2; Fri, 6 Oct 2023 11:21:14 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233170AbjJFSVB (ORCPT + 99 others); Fri, 6 Oct 2023 14:21:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232906AbjJFSU7 (ORCPT ); Fri, 6 Oct 2023 14:20:59 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AA2A1B6; Fri, 6 Oct 2023 11:20:57 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 461EEC433C8; Fri, 6 Oct 2023 18:20:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696616457; bh=bW7xb8UcwfoF/vlsFYDPvx7RfEeNLXCBqnmUHKIXv6s=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=YMddIapoFKWjCnbNCVbFVs6w/jUVcZyHar1ZNtg6Lgm+t6RD67qeCCtrLrWZI5jkq vbITgAQs5Nw7mx2S+4/DzzvQexQitGyduWJELFYuVQ/uu1Gp7+uN+uHEKkXjWDBaZq bPnWkqW3PbyyacsIr6NL4c2xfJjl4iXbZsVcgxZ0wAi1b5bPrRJjm5XbqjJ+ZJRMd9 TKcrzMx2IqyLoSppbG2Ca9nBFEywhE8bUv/odlLv/+PcxH6c4p5IVW9AacmrIEsHNl qc+Ue+oUUorDJpArpbgSAfj5CxXVedDY2lVwTiWxuqjCEO2XKk8AiBR0Msn+lXjI15 RziamoxWQ9Tng== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id D5489CE0B6B; Fri, 6 Oct 2023 11:20:56 -0700 (PDT) Date: Fri, 6 Oct 2023 11:20:56 -0700 From: "Paul E. McKenney" To: "Liam R. Howlett" Cc: Naresh Kamboju , Greg Kroah-Hartman , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, Chengming Zhou , Joel Fernandes , Peter Zijlstra , Ovidiu Panait , Ingo Molnar , rcu Subject: Re: [PATCH 5.15 000/183] 5.15.134-rc1 review Message-ID: <7652477c-a37c-4509-9dc9-7f9d1dc08291@paulmck-laptop> Reply-To: paulmck@kernel.org References: <20231004175203.943277832@linuxfoundation.org> <20231006162038.d3q7sl34b4ouvjxf@revolver> <57c1ff4d-f138-4f89-8add-c96fb3ba6701@paulmck-laptop> <20231006175714.begtgj6wrs46ukmo@revolver> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20231006175714.begtgj6wrs46ukmo@revolver> X-Spam-Status: No, score=2.4 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Fri, 06 Oct 2023 11:21:15 -0700 (PDT) X-Spam-Level: ** On Fri, Oct 06, 2023 at 01:57:14PM -0400, Liam R. Howlett wrote: > * Paul E. McKenney [231006 12:47]: > > On Fri, Oct 06, 2023 at 12:20:38PM -0400, Liam R. Howlett wrote: > > > * Naresh Kamboju [231005 13:49]: > > > > On Wed, 4 Oct 2023 at 23:33, Greg Kroah-Hartman > > > > wrote: > > > > > > > > > > This is the start of the stable review cycle for the 5.15.134 release. > > > > > There are 183 patches in this series, all will be posted as a response > > > > > to this one. If anyone has any issues with these being applied, please > > > > > let me know. > > > > > > > > > > Responses should be made by Fri, 06 Oct 2023 17:51:12 +0000. > > > > > Anything received after that time might be too late. > > > > > > > > > > The whole patch series can be found in one patch at: > > > > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.134-rc1.gz > > > > > or in the git tree and branch at: > > > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y > > > > > and the diffstat can be found below. > > > > > > > > > > thanks, > > > > > > > > > > greg k-h > > > > > > > > Results from Linaro’s test farm. > > > > Regressions on x86. > > > > > > > > Following kernel warning noticed on x86 while booting stable-rc 5.15.134-rc1 > > > > with selftest merge config built kernel. > > > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > > > Anyone noticed this kernel warning ? > > > > > > > > This is always reproducible while booting x86 with a given config. > > > > > > >From that config: > > > # > > > # RCU Subsystem > > > # > > > CONFIG_TREE_RCU=y > > > # CONFIG_RCU_EXPERT is not set > > > CONFIG_SRCU=y > > > CONFIG_TREE_SRCU=y > > > CONFIG_TASKS_RCU_GENERIC=y > > > CONFIG_TASKS_RUDE_RCU=y > > > CONFIG_TASKS_TRACE_RCU=y > > > CONFIG_RCU_STALL_COMMON=y > > > CONFIG_RCU_NEED_SEGCBLIST=y > > > # end of RCU Subsystem > > > > > > # > > > # RCU Debugging > > > # > > > CONFIG_PROVE_RCU=y > > > # CONFIG_RCU_SCALE_TEST is not set > > > # CONFIG_RCU_TORTURE_TEST is not set > > > # CONFIG_RCU_REF_SCALE_TEST is not set > > > CONFIG_RCU_CPU_STALL_TIMEOUT=21 > > > CONFIG_RCU_TRACE=y > > > # CONFIG_RCU_EQS_DEBUG is not set > > > # end of RCU Debugging > > > > > > > > > > > > > > x86 boot log: > > > > ----- > > > > [ 0.000000] Linux version 5.15.134-rc1 (tuxmake@tuxmake) > > > > (x86_64-linux-gnu-gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils > > > > for Debian) 2.40) #1 SMP @1696443178 > > > > ... > > > > [ 1.480701] ------------[ cut here ]------------ > > > > [ 1.481296] WARNING: CPU: 0 PID: 13 at kernel/rcu/tasks.h:958 > > > > trc_inspect_reader+0x80/0xb0 > > > > [ 1.481296] Modules linked in: > > > > [ 1.481296] CPU: 0 PID: 13 Comm: rcu_tasks_trace Not tainted 5.15.134-rc1 #1 > > > > [ 1.481296] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > > > > 2.5 11/26/2020 > > > > [ 1.481296] RIP: 0010:trc_inspect_reader+0x80/0xb0 > > > > > > This function has changed a lot, including the dropping of this > > > WARN_ON_ONCE(). The warning was replaced in 897ba84dc5aa ("rcu-tasks: > > > Handle idle tasks for recently offlined CPUs") with something that looks > > > equivalent so I'm not sure why it would not trigger in newer revisions. > > > > > > Obviously the behaviour I changed was the test for the task being idle. > > > I am not sure how best to short-circuit that test from happening during > > > boot as I am not familiar with the RCU code. > > > > The usual test for RCU's notion of early boot being completed is > > (rcu_scheduler_active != RCU_SCHEDULER_INIT). > > > > Except that "ofl" should always be false that early in boot, at least > > in mainline. > > Is this still true in the final version of the patch where we set the > boot task as !idle until just before the early boot is finished? I > wouldn't think of this as 'early in boot' anymore as much as the entire > kernel setup. Maybe we need to shorten the time we stay in !idle mode > for earlier kernels? In mainline, the ofl variable is defined as cpu_is_offline(cpu), and during boot, the boot CPU is guaranteed to be online. (As opposed to the boot CPU's idle-task state.) > How frequent is this function called? We could check something for > early boot... or track down where the cpu is put online and restore idle > before that happens? Once per RCU Tasks Trace grace period per reader seen to be blocking that grace period. Its performance is as issue, but not to anywhere near the same extent as (say) rcu_read_lock_trace(). > > > It's also worth noting that the bug this fixes wasn't exposed until the > > > maple tree (added in v6.1) was used for the IRQ descriptors (added in > > > v6.5). > > > > Lots of latent bugs, to be sure, even with rcutorture. :-/ > > The Right Thing is to fix the bug all the way back to the introduction, > but what fallout makes the backport less desirable than living with the > unexposed bug? You are quite right that it is possible for the risk of a backport to exceed the risk of the original bug. I defer to Joel (CCed) on how best to resolve this in -stable. Thanx, Paul