Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754096Ab0DYUUW (ORCPT ); Sun, 25 Apr 2010 16:20:22 -0400 Received: from mail-gw0-f46.google.com ([74.125.83.46]:56363 "EHLO mail-gw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753982Ab0DYUUU (ORCPT ); Sun, 25 Apr 2010 16:20:20 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=xyXV+UcFGYPA2cllhz7W0Fj1ViibsEMfawbe6WhOREJIYgfSLQAJBbUIiqVM7GMVOM T7eAYUonEB8WxPH90PgPg+vdi5gMHm6Y70b0sqbywrfMmo4OHA3VWSYqyonL0rwluDu8 IAySWhByD2y6V/9mk+bTVz/PoD15MpYWS0usw= MIME-Version: 1.0 In-Reply-To: References: <1271766716.2972.16.camel@dhcp231-113.rdu.redhat.com> <20100421213543.GO2563@linux.vnet.ibm.com> <20100422145640.GB3228@redhat.com> <20100422160144.GC2524@linux.vnet.ibm.com> <20100423194255.GE2589@linux.vnet.ibm.com> <20100425023455.GM2440@linux.vnet.ibm.com> Date: Sun, 25 Apr 2010 16:20:13 -0400 Message-ID: Subject: Re: [PATCH] RCU: don't turn off lockdep when find suspicious rcu_dereference_check() usage From: Miles Lane To: paulmck@linux.vnet.ibm.com Cc: Vivek Goyal , Eric Paris , Lai Jiangshan , Ingo Molnar , Peter Zijlstra , LKML , nauman@google.com, eric.dumazet@gmail.com, netdev@vger.kernel.org, Jens Axboe , Gui Jianfeng , Li Zefan , Johannes Berg Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3920 Lines: 79 > I am down to seeing three suspicious rcu_dereference_check traces when > I apply this patch and all the previous patches to 2.6.34-rc5-git6. > > 1. The "__sched_setscheduler+0x19d/0x300" trace. > 2. The two "is_swiotlb_buffer+0x2e/0x3b" traces (waiting to see > Johannes' patch show up in a Linux snapshot) > > Did I miss a patch for the setscheduler issue? Hmm. I am still seeing these two messages as well. [ 83.363146] [ INFO: suspicious rcu_dereference_check() usage. ] [ 83.363148] --------------------------------------------------- [ 83.363151] include/net/inet_timewait_sock.h:227 invoked rcu_dereference_check() without protection! [ 83.363154] [ 83.363155] other info that might help us debug this: [ 83.363156] [ 83.363158] [ 83.363159] rcu_scheduler_active = 1, debug_locks = 1 [ 83.363162] 2 locks held by gwibber-service/5076: [ 83.363164] #0: (&p->lock){+.+.+.}, at: [] seq_read+0x37/0x381 [ 83.363176] #1: (&(&hashinfo->ehash_locks[i])->rlock){+.-...}, at: [] established_get_next+0xc4/0x132 [ 83.363186] [ 83.363187] stack backtrace: [ 83.363191] Pid: 5076, comm: gwibber-service Not tainted 2.6.34-rc5-git6 #27 [ 83.363194] Call Trace: [ 83.363202] [] lockdep_rcu_dereference+0x9d/0xa5 [ 83.363207] [] twsk_net+0x4f/0x57 [ 83.363212] [] established_get_next+0x54/0x132 [ 83.363216] [] tcp_seq_next+0x5d/0x6a [ 83.363221] [] seq_read+0x286/0x381 [ 83.363226] [] ? seq_read+0x0/0x381 [ 83.363231] [] proc_reg_read+0x8d/0xac [ 83.363236] [] vfs_read+0xa6/0x103 [ 83.363241] [] sys_read+0x45/0x69 [ 83.363246] [] system_call_fastpath+0x16/0x1b [ 84.660302] [ INFO: suspicious rcu_dereference_check() usage. ] [ 84.660304] --------------------------------------------------- [ 84.660308] include/net/inet_timewait_sock.h:227 invoked rcu_dereference_check() without protection! [ 84.660311] [ 84.660312] other info that might help us debug this: [ 84.660313] [ 84.660315] [ 84.660316] rcu_scheduler_active = 1, debug_locks = 1 [ 84.660319] no locks held by gwibber-service/5081. [ 84.660321] [ 84.660322] stack backtrace: [ 84.660325] Pid: 5081, comm: gwibber-service Not tainted 2.6.34-rc5-git6 #27 [ 84.660328] Call Trace: [ 84.660339] [] lockdep_rcu_dereference+0x9d/0xa5 [ 84.660345] [] twsk_net+0x4f/0x57 [ 84.660350] [] __inet_twsk_hashdance+0x50/0x158 [ 84.660355] [] tcp_time_wait+0x1c1/0x24b [ 84.660360] [] tcp_fin+0x83/0x162 [ 84.660364] [] tcp_data_queue+0x1ff/0xa1e [ 84.660370] [] ? mod_timer+0x1e/0x20 [ 84.660375] [] tcp_rcv_state_process+0x89d/0x8f2 [ 84.660381] [] ? release_sock+0x30/0x10b [ 84.660386] [] tcp_v4_do_rcv+0x2de/0x33f [ 84.660391] [] release_sock+0x82/0x10b [ 84.660395] [] tcp_close+0x1b5/0x37e [ 84.660401] [] inet_release+0x50/0x57 [ 84.660405] [] sock_release+0x1a/0x66 [ 84.660410] [] sock_close+0x22/0x26 [ 84.660415] [] __fput+0x120/0x1cd [ 84.660420] [] fput+0x15/0x17 [ 84.660424] [] filp_close+0x63/0x6d [ 84.660428] [] sys_close+0xd7/0x111 [ 84.660434] [] system_call_fastpath+0x16/0x1b -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/