From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19380C43457 for ; Fri, 9 Oct 2020 17:50:47 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id B8E21222EA for ; Fri, 9 Oct 2020 17:50:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602265846; bh=mctx3A4UVHne4/43gs3GuVmNtcdJT4GUN3iMHEXTn5g=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:List-ID: From; b=Wxo0VZQprmJygltlJIxeZipi92zEcOKWBZJ/a+3u1vnvBmsn9dhpZPk6Z0PxHAdXO 8+8JXNOFHy9+af1NkSx04P6JpeWIAPSUNK18bIM3b8dshZne5h/WmYTH8o/F6JVOSN JE1MQCFCXnLHp+ou8Hr8p1u/Lfz4ZFECqIM660FM= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388298AbgJIRuo (ORCPT ); Fri, 9 Oct 2020 13:50:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:43858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387948AbgJIRun (ORCPT ); Fri, 9 Oct 2020 13:50:43 -0400 Received: from paulmck-ThinkPad-P72.home (50-39-104-11.bvtn.or.frontiernet.net [50.39.104.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BA51522284; Fri, 9 Oct 2020 17:50:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602265842; bh=mctx3A4UVHne4/43gs3GuVmNtcdJT4GUN3iMHEXTn5g=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=Inyh94euWuhIZBz1NYyvk1B5kq9Y8EKJRHi8oDzk+WD5/v/nKPl1IeRUaFCpe2Uwd /E6u2aTslSHiNFSudZQaNZ04VctBIq8O2Wr+W0ySSyMKIjmsJwRi/ZoOXRad7JFH9v dkgsyNxsFQr3ojUcXXLC8KnNWe0Htq4tey68iwm4= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 6359235227D5; Fri, 9 Oct 2020 10:50:42 -0700 (PDT) Date: Fri, 9 Oct 2020 10:50:42 -0700 From: "Paul E. McKenney" To: Qian Cai Cc: Peter Zijlstra , Steven Rostedt , Ingo Molnar , x86 , linux-kernel@vger.kernel.org, linux-tip-commits@vger.kernel.org, Linux Next Mailing List , Stephen Rothwell , Boqun Feng Subject: Re: [tip: locking/core] lockdep: Fix lockdep recursion Message-ID: <20201009175042.GJ29330@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <160223032121.7002.1269740091547117869.tip-bot2@tip-bot2> <20201009135837.GD29330@paulmck-ThinkPad-P72> <20201009162352.GR2611@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-next@vger.kernel.org On Fri, Oct 09, 2020 at 01:36:47PM -0400, Qian Cai wrote: > On Fri, 2020-10-09 at 18:23 +0200, Peter Zijlstra wrote: > > On Fri, Oct 09, 2020 at 06:58:37AM -0700, Paul E. McKenney wrote: > > > On Fri, Oct 09, 2020 at 09:41:24AM -0400, Qian Cai wrote: > > > > On Fri, 2020-10-09 at 07:58 +0000, tip-bot2 for Peter Zijlstra wrote: > > > > > The following commit has been merged into the locking/core branch of > > > > > tip: > > > > > > > > > > Commit-ID: 4d004099a668c41522242aa146a38cc4eb59cb1e > > > > > Gitweb: > > > > > https://git.kernel.org/tip/4d004099a668c41522242aa146a38cc4eb59cb1e > > > > > Author: Peter Zijlstra > > > > > AuthorDate: Fri, 02 Oct 2020 11:04:21 +02:00 > > > > > Committer: Ingo Molnar > > > > > CommitterDate: Fri, 09 Oct 2020 08:53:30 +02:00 > > > > > > > > > > lockdep: Fix lockdep recursion > > > > > > > > > > Steve reported that lockdep_assert*irq*(), when nested inside lockdep > > > > > itself, will trigger a false-positive. > > > > > > > > > > One example is the stack-trace code, as called from inside lockdep, > > > > > triggering tracing, which in turn calls RCU, which then uses > > > > > lockdep_assert_irqs_disabled(). > > > > > > > > > > Fixes: a21ee6055c30 ("lockdep: Change hardirq{s_enabled,_context} to > > > > > per-cpu > > > > > variables") > > > > > Reported-by: Steven Rostedt > > > > > Signed-off-by: Peter Zijlstra (Intel) > > > > > Signed-off-by: Ingo Molnar > > > > > > > > Reverting this linux-next commit fixed booting RCU-list warnings > > > > everywhere. > > > > > > Is it possible that the RCU-list warnings were being wrongly suppressed > > > without a21ee6055c30? As in are you certain that these RCU-list warnings > > > are in fact false positives? > > > > [ 4.002695][ T0] init_timer_key+0x29/0x220 > > > > [ 4.002695][ T0] identify_cpu+0xfcb/0x1980 > > > > [ 4.002695][ T0] identify_secondary_cpu+0x1d/0x190 > > > > [ 4.002695][ T0] smp_store_cpu_info+0x167/0x1f0 > > > > [ 4.002695][ T0] start_secondary+0x5b/0x290 > > > > [ 4.002695][ T0] secondary_startup_64_no_verify+0xb8/0xbb > > > > They're actually correct warnings, this is trying to use RCU before that > > CPU is reported to RCU. > > > > Possibly something like the below works, but I've not tested it, nor > > have I really thought hard about it, bring up tricky and this is just > > moving code. > > I don't think this will always work. Basically, anything like printk() would > trigger the warning because it tries to acquire a lock. For example, on arm64: > > [ 0.418627] lockdep_rcu_suspicious+0x134/0x14c > [ 0.418629] __lock_acquire+0x1c30/0x2600 > [ 0.418631] lock_acquire+0x274/0xc48 > [ 0.418632] _raw_spin_lock+0xc8/0x140 > [ 0.418634] vprintk_emit+0x90/0x3d0 > [ 0.418636] vprintk_default+0x34/0x40 > [ 0.418638] vprintk_func+0x378/0x590 > [ 0.418640] printk+0xa8/0xd4 > [ 0.418642] __cpuinfo_store_cpu+0x71c/0x868 > [ 0.418644] cpuinfo_store_cpu+0x2c/0xc8 > [ 0.418645] secondary_start_kernel+0x244/0x318 > > Back to x86, we have: > > start_secondary() > smp_callin() > apic_ap_setup() > setup_local_APIC() > printk() in certain conditions. > > which is before smp_store_cpu_info(). > > Can't we add a rcu_cpu_starting() at the very top for each start_secondary(), > secondary_start_kernel(), smp_start_secondary() etc, so we don't worry about any > printk() later? I can give you a definite "I do not know". As Peter said, CPU bringup is a tricky process. But why not try it and see what happens? Thanx, Paul > > --- > > > > diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c > > index 35ad8480c464..9173d64ee69d 100644 > > --- a/arch/x86/kernel/cpu/common.c > > +++ b/arch/x86/kernel/cpu/common.c > > @@ -1670,6 +1670,9 @@ void __init identify_boot_cpu(void) > > void identify_secondary_cpu(struct cpuinfo_x86 *c) > > { > > BUG_ON(c == &boot_cpu_data); > > + > > + rcu_cpu_starting(smp_processor_id()); > > + > > identify_cpu(c); > > #ifdef CONFIG_X86_32 > > enable_sep_cpu(); > > diff --git a/arch/x86/kernel/cpu/mtrr/mtrr.c b/arch/x86/kernel/cpu/mtrr/mtrr.c > > index 6a80f36b5d59..5f436cb4f7c4 100644 > > --- a/arch/x86/kernel/cpu/mtrr/mtrr.c > > +++ b/arch/x86/kernel/cpu/mtrr/mtrr.c > > @@ -794,8 +794,6 @@ void mtrr_ap_init(void) > > if (!use_intel() || mtrr_aps_delayed_init) > > return; > > > > - rcu_cpu_starting(smp_processor_id()); > > - > > /* > > * Ideally we should hold mtrr_mutex here to avoid mtrr entries > > * changed, but this routine will be called in cpu boot time, > > >