LKML Archive on lore.kernel.org
help / color / mirror / Atom feed
* [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval
@ 2021-02-23 10:49 Juri Lelli
  2021-02-23 11:00 ` Sebastian Andrzej Siewior
  0 siblings, 1 reply; 5+ messages in thread
From: Juri Lelli @ 2021-02-23 10:49 UTC (permalink / raw)
  To: Sebastian Andrzej Siewior; +Cc: linux-rt-users, LKML

Hi,

I'm seeing the following splat right after boot (or during late boot
phases) with v5.11-rt7 (LOCKDEP enabled).

[   85.273583] ------------[ cut here ]------------
[   85.273588] WARNING: CPU: 5 PID: 1416 at include/linux/seqlock.h:271 nft_counter_eval+0x95/0x130 [nft_counter]
[   85.273600] Modules linked in: nft_counter tun bridge stp llc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6_tables nft_compat ip_set nf_tables nfnetlink cmac bnep sunrpc iwlmvm mac80211 intel_rapl_msr intel_rapl_common rtsx_usb_ms memstick sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp libarc4 crct10dif_pclmul crc32_pclmul joydev ghash_clmulni_intel iwlwifi rapl intel_cstate snd_hda_codec_realtek snd_hda_codec_generic intel_uncore cfg80211 ledtrig_audio wmi_bmof intel_wmi_thunderbolt btusb mei_wdt btrtl snd_hda_codec_hdmi pcspkr btbcm btintel bluetooth iTCO_wdt snd_hda_intel iTCO_vendor_support snd_intel_dspcfg snd_hda_codec snd_hwdep snd_hda_core ecdh_generic ecc rfkill snd_seq snd_seq_device snd_pcm snd_timer mei_me snd mei i2c_i801 i2c_smbus lpc_ich soundcore acpi_cpufreq ip_tables xfs libcrc32c nouveau sr_mod sd_mod cdrom t10_pi
[   85.273678]  hid_logitech_hidpp sg drm_ttm_helper ttm video drm_kms_helper rtsx_usb_sdmmc mmc_core syscopyarea sysfillrect sysimgblt fb_sys_fops hid_logitech_dj drm crc32c_intel mxm_wmi rtsx_usb igb ahci libahci ata_generic r8169 e1000e libata dca i2c_algo_bit realtek wmi dm_mirror dm_region_hash dm_log dm_mod fuse
[   85.273707] CPU: 5 PID: 1416 Comm: irq/44-eno1 Tainted: G S                5.11.0-rt7 #4
[   85.273711] Hardware name: LENOVO 30B6S2F900/1030, BIOS S01KT65A 08/06/2019
[   85.273713] RIP: 0010:nft_counter_eval+0x95/0x130 [nft_counter]
[   85.273718] Code: 6c f6 85 c0 74 26 65 8b 05 28 0f bf 3e 85 c0 75 1b 65 8b 05 1d fb a2 3e a9 ff ff ff 7f 75 0d 65 8b 05 03 0c a3 3e 85 c0 74 02 <0f> 0b 83 45 00 01 ff 74 24 28 4c 8d 6d 08 45 31 c9 31 c9 41 b8 01
[   85.273722] RSP: 0018:ffffb1ec0d1cf7d0 EFLAGS: 00010202
[   85.273725] RAX: 0000000000000001 RBX: ffffd1e3ffc173d0 RCX: 0000000000000001
[   85.273726] RDX: ffff95c488d23580 RSI: ffffffffb6f8df42 RDI: ffffffffb6f5cafe
[   85.273728] RBP: ffff95cbdfdee020 R08: 0000000000000002 R09: 0000000000000001
[   85.273730] R10: 0000000000000100 R11: 0000000000000001 R12: ffffb1ec0d1cf9f8
[   85.273732] R13: ffff95cc3acc6500 R14: ffff95cc3ad30ee8 R15: ffff95cc3ad30eb8
[   85.273734] FS:  0000000000000000(0000) GS:ffff95cbdfc00000(0000) knlGS:0000000000000000
[   85.273736] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   85.273738] CR2: 000056404f3b3300 CR3: 000000028833e001 CR4: 00000000001706e0
[   85.273740] Call Trace:
[   85.273752]  nft_do_chain+0x17e/0x6a0 [nf_tables]
[   85.273771]  ? call_rcu+0x319/0x5e0
[   85.273806]  ? rt_cache_route+0x88/0xa0
[   85.273817]  ? ip_route_input_slow+0x9ea/0x11b0
[   85.273832]  ? sched_clock+0x5/0x10
[   85.273847]  ? __lock_acquire+0x3cb/0x15e0
[   85.273910]  nft_do_chain_ipv4+0x66/0x80 [nf_tables]
[   85.273936]  nf_hook_slow+0x44/0xc0
[   85.273948]  ip_local_deliver+0x10e/0x240
[   85.273959]  ? ip_protocol_deliver_rcu+0x2d0/0x2d0
[   85.273972]  ip_rcv+0x142/0x220
[   85.273982]  ? ip_rcv_finish_core.isra.22+0x5e0/0x5e0
[   85.273995]  __netif_receive_skb_core+0x5ee/0x1420
[   85.274033]  ? __netif_receive_skb_list_core+0x13b/0x2c0
[   85.274036]  __netif_receive_skb_list_core+0x13b/0x2c0
[   85.274059]  netif_receive_skb_list_internal+0x260/0x420
[   85.274066]  ? e1000_clean_rx_irq+0x31c/0x420 [e1000e]
[   85.274100]  napi_complete_done+0x6e/0x1b0
[   85.274109]  e1000e_poll+0xc9/0x290 [e1000e]
[   85.274136]  net_rx_action+0x112/0x550
[   85.274161]  __do_softirq+0xb8/0x5f4
[   85.274188]  __local_bh_enable_ip+0x13d/0x170
[   85.274200]  ? irq_finalize_oneshot.part.45+0xe0/0xe0
[   85.274204]  ? irq_thread+0xa7/0x1d0
[   85.274205]  irq_forced_thread_fn+0x6a/0x80
[   85.274213]  irq_thread+0x111/0x1d0
[   85.274220]  ? wake_threads_waitq+0x30/0x30
[   85.274229]  ? irq_thread_check_affinity+0xd0/0xd0
[   85.274233]  kthread+0x194/0x1b0
[   85.274239]  ? kthread_park+0x80/0x80
[   85.274250]  ret_from_fork+0x22/0x30
[   85.274286] irq event stamp: 7056
[   85.274288] hardirqs last  enabled at (7058): [<ffffffffb5d8263b>] vprintk_store+0x45b/0x580
[   85.274294] hardirqs last disabled at (7059): [<ffffffffb5d824ea>] vprintk_store+0x30a/0x580
[   85.274298] softirqs last  enabled at (6634): [<ffffffffb5cf5250>] __local_bh_enable_ip+0xc0/0x170
[   85.274302] softirqs last disabled at (6644): [<ffffffffb5d87775>] irq_forced_thread_fn+0x5/0x80
[   85.274304] ---[ end trace 0000000000000002 ]---

Please let me know if this is known already and/or if you need more
info (configs/etc).

Best,
Juri


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval
  2021-02-23 10:49 [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval Juri Lelli
@ 2021-02-23 11:00 ` Sebastian Andrzej Siewior
  2021-02-23 13:53   ` Juri Lelli
  0 siblings, 1 reply; 5+ messages in thread
From: Sebastian Andrzej Siewior @ 2021-02-23 11:00 UTC (permalink / raw)
  To: Juri Lelli; +Cc: linux-rt-users, LKML, Ahmed S. Darwish, Peter Zijlstra

On 2021-02-23 11:49:07 [+0100], Juri Lelli wrote:
> Hi,
Hi,

> I'm seeing the following splat right after boot (or during late boot
> phases) with v5.11-rt7 (LOCKDEP enabled).
> [   85.273588] WARNING: CPU: 5 PID: 1416 at include/linux/seqlock.h:271 nft_counter_eval+0x95/0x130 [nft_counter]
> [   85.273713] RIP: 0010:nft_counter_eval+0x95/0x130 [nft_counter]

This is a per-CPU seqcount_t in net/netfilter/nft_counter.c which is
only protected by local_bh_disabled(). The warning expects preemption
to be disabled which is the case on !RT but not on RT.

Not sure what to do about this. It is doing anything wrong as of now. It
is noisy.

> Best,
> Juri

Sebastian

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval
  2021-02-23 11:00 ` Sebastian Andrzej Siewior
@ 2021-02-23 13:53   ` Juri Lelli
  2021-02-23 14:20     ` Ahmed S. Darwish
  2021-02-23 14:21     ` Sebastian Andrzej Siewior
  0 siblings, 2 replies; 5+ messages in thread
From: Juri Lelli @ 2021-02-23 13:53 UTC (permalink / raw)
  To: Sebastian Andrzej Siewior
  Cc: linux-rt-users, LKML, Ahmed S. Darwish, Peter Zijlstra

On 23/02/21 12:00, Sebastian Andrzej Siewior wrote:
> On 2021-02-23 11:49:07 [+0100], Juri Lelli wrote:
> > Hi,
> Hi,
> 
> > I'm seeing the following splat right after boot (or during late boot
> > phases) with v5.11-rt7 (LOCKDEP enabled).
> …
> > [   85.273588] WARNING: CPU: 5 PID: 1416 at include/linux/seqlock.h:271 nft_counter_eval+0x95/0x130 [nft_counter]
> …
> > [   85.273713] RIP: 0010:nft_counter_eval+0x95/0x130 [nft_counter]
> 
> This is a per-CPU seqcount_t in net/netfilter/nft_counter.c which is
> only protected by local_bh_disabled(). The warning expects preemption
> to be disabled which is the case on !RT but not on RT.
> 
> Not sure what to do about this. It is doing anything wrong as of now. It
> is noisy.

So, I'm a bit confused and I'm very likely missing details (still
digesting the seqprop_ magic), but write_seqcount_being() has

 if (seqprop_preemptible(s))
     preempt_disable();

which in this case (no lock associated) is defined to return false, 
while it should return true on RT (or in some occasions)? Or maybe this
is what you are saying already.

Also, the check for preemption been disabled happens before we can
actually potentially disable it, no?

Thanks for the quick reply!

Best,
Juri


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval
  2021-02-23 13:53   ` Juri Lelli
@ 2021-02-23 14:20     ` Ahmed S. Darwish
  2021-02-23 14:21     ` Sebastian Andrzej Siewior
  1 sibling, 0 replies; 5+ messages in thread
From: Ahmed S. Darwish @ 2021-02-23 14:20 UTC (permalink / raw)
  To: Juri Lelli
  Cc: Sebastian Andrzej Siewior, linux-rt-users, LKML, Peter Zijlstra

On Tue, Feb 23, 2021 at 02:53:40PM +0100, Juri Lelli wrote:
> On 23/02/21 12:00, Sebastian Andrzej Siewior wrote:
> > On 2021-02-23 11:49:07 [+0100], Juri Lelli wrote:
> > > Hi,
> > Hi,
> >
> > > I'm seeing the following splat right after boot (or during late boot
> > > phases) with v5.11-rt7 (LOCKDEP enabled).
> > …
> > > [   85.273588] WARNING: CPU: 5 PID: 1416 at include/linux/seqlock.h:271 nft_counter_eval+0x95/0x130 [nft_counter]
> > …
> > > [   85.273713] RIP: 0010:nft_counter_eval+0x95/0x130 [nft_counter]
> >
> > This is a per-CPU seqcount_t in net/netfilter/nft_counter.c which is
> > only protected by local_bh_disabled(). The warning expects preemption
> > to be disabled which is the case on !RT but not on RT.
> >
> > Not sure what to do about this. It is doing anything wrong as of now. It
> > is noisy.
>
> So, I'm a bit confused and I'm very likely missing details (still
> digesting the seqprop_ magic), but write_seqcount_being() has
>
>  if (seqprop_preemptible(s))
>      preempt_disable();
>
> which in this case (no lock associated) is defined to return false,

Preemption is disabled if and only if:

  1. It's a CONFIG_PREEMPT_RT=n system
  2. There's a lock associated with the sequence counter
  3. That lock is also preemptible (e.g., a mutex)

In your case, the 3 condititions are OFF. You're on a PREEMPT_RT=y
kernel and the sequence counter in question has no lock associated.

As Sebastian summarized, the error is just "noisy" at this point.

We will of course need to find a (mainline-friendly) way to let the
lockdep splat go away for -rt kernels. But for now, it's not harmful.

Good luck,

--
Ahmed S. Darwish

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval
  2021-02-23 13:53   ` Juri Lelli
  2021-02-23 14:20     ` Ahmed S. Darwish
@ 2021-02-23 14:21     ` Sebastian Andrzej Siewior
  1 sibling, 0 replies; 5+ messages in thread
From: Sebastian Andrzej Siewior @ 2021-02-23 14:21 UTC (permalink / raw)
  To: Juri Lelli
  Cc: linux-rt-users, LKML, Ahmed S. Darwish, Peter Zijlstra, Thomas Gleixner

On 2021-02-23 14:53:40 [+0100], Juri Lelli wrote:
> 
> So, I'm a bit confused and I'm very likely missing details (still
> digesting the seqprop_ magic), but write_seqcount_being() has
> 
>  if (seqprop_preemptible(s))
>      preempt_disable();
> 
> which in this case (no lock associated) is defined to return false, 
> while it should return true on RT (or in some occasions)? Or maybe this
> is what you are saying already.

write_seqcount_begin() has seqprop_assert() at the very beginning which
ends in __seqprop_assert() in your case (seqcount_t). Your warning.


> Also, the check for preemption been disabled happens before we can
> actually potentially disable it, no?

That seqprop_preemptible() is true for !RT for mutex/ww_mutex locks. On
RT it is always false since it does lock()+unlock() of the lock that is
part of the seqcount.

But back to the original issue: at write_seqcount_begin() preemption is
disabled !RT implicit by local_bh_disable(). Therefore no warning.
On RT local_bh_disable() disables BH on the CPUs so locking wise (since
it is a per-CPU seqcount it should work. Preemption remains enabled so
we have a warning.

I have no idea what annotation would be best here. Having a
local_bh_disable() type of a lock and the seqcount is not part of the data
structure it protects is less than ideal.
However, if I understand this correct then this nft_counter_percpu_priv
exists once per nft rule. The seqcount exists once per-CPU since it is
unlikely to modify two counters at once on a single CPU :) So there is
that.

While looking at it, there is nft_counter_reset() which modifies the
values without a seqcount write lock. This might be okay.

> Thanks for the quick reply!
> 
> Best,
> Juri

Sebastian

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2021-02-23 14:22 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-02-23 10:49 [RT v5.11-rt7] WARNING at include/linux/seqlock.h:271 nft_counter_eval Juri Lelli
2021-02-23 11:00 ` Sebastian Andrzej Siewior
2021-02-23 13:53   ` Juri Lelli
2021-02-23 14:20     ` Ahmed S. Darwish
2021-02-23 14:21     ` Sebastian Andrzej Siewior

This is a public inbox, see mirroring instructions
on how to clone and mirror all data and code used for this inbox