[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160930015102.GB20189@yexl-desktop>
Date: Fri, 30 Sep 2016 09:51:02 +0800
From: kernel test robot <xiaolong.ye@...el.com>
To: Con Kolivas <kernel@...ivas.org>
Cc: Ingo Molnar <mingo@...nel.org>, Alfred Chen <cchalpha@...il.com>,
Peter Zijlstra <peterz@...radead.org>,
LKML <linux-kernel@...r.kernel.org>,
Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [lkp] [sched/core] 4fa5cd5245: BUG: sleeping function called from
invalid context at kernel/locking/mutex.c:97
FYI, we noticed the following commit:
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
commit 4fa5cd5245b627db88c9ca08ae442373b02596b4 ("sched/core: Do not use smp_processor_id() with preempt enabled in smpboot_thread_fn()")
in testcase: will-it-scale
with following parameters:
test: open2
cpufreq_governor: performance
Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two.
on test machine: 48 threads 2 sockets Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GHz with 64G memory
caused below changes:
+-----------------------------------------------------------------------------+------------+------------+
| | d59dc7bcfa | 4fa5cd5245 |
+-----------------------------------------------------------------------------+------------+------------+
| boot_successes | 15 | 2 |
| boot_failures | 8 | 12 |
| WARNING:at_kernel/events/core.c:#perf_event_read | 7 | 2 |
| calltrace:SyS_read | 7 | 2 |
| BUG:kernel_reboot-without-warning_in_test_stage | 1 | 2 |
| BUG:sleeping_function_called_from_invalid_context_at_kernel/locking/mutex.c | 0 | 10 |
| calltrace:smpboot_thread_fn | 0 | 10 |
+-----------------------------------------------------------------------------+------------+------------+
user :notice: [ 37.079160] IPMI Device Information
kern :info : [ 37.086367] ipmi device interface
kern :err : [ 37.180350] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:97
kern :err : [ 37.192550] in_atomic(): 1, irqs_disabled(): 0, pid: 14, name: watchdog/0
kern :warn : [ 37.200866] CPU: 0 PID: 14 Comm: watchdog/0 Not tainted 4.8.0-rc5-00037-g4fa5cd5 #1
kern :warn : [ 37.210142] Hardware name: Intel Corporation S2600WP/S2600WP, BIOS SE5C600.86B.02.02.0002.122320131210 12/23/2013
kern :warn : [ 37.222331] 0000000000000000 ffff88081ab67d90 ffffffff8144f659 ffff88081ab3cb80
kern :warn : [ 37.231371] 0000000000000061 ffff88081ab67da8 ffffffff810a4ca4 ffffffff81ca2258
kern :warn : [ 37.240415] ffff88081ab67dd0 ffffffff810a4d39 ffff88081e01d1a8 ffff88081dc37800
kern :warn : [ 37.249439] Call Trace:
kern :warn : [ 37.252907] [<ffffffff8144f659>] dump_stack+0x63/0x8a
kern :warn : [ 37.259387] [<ffffffff810a4ca4>] ___might_sleep+0xd4/0x120
kern :warn : [ 37.266354] [<ffffffff810a4d39>] __might_sleep+0x49/0x80
kern :warn : [ 37.273104] [<ffffffff81930e20>] mutex_lock+0x20/0x50
kern :warn : [ 37.279565] [<ffffffff81169b72>] perf_event_ctx_lock_nested+0x52/0xa0
kern :warn : [ 37.288360] [<ffffffff8116ccaf>] perf_event_disable+0xf/0x30
kern :warn : [ 37.295509] [<ffffffff8112e906>] watchdog_nmi_disable+0x36/0x70
kern :warn : [ 37.302948] [<ffffffff810a15b4>] ? smpboot_thread_fn+0x34/0x1e0
kern :warn : [ 37.310388] [<ffffffff8112e98d>] watchdog_disable+0x4d/0x60
kern :warn : [ 37.317430] [<ffffffff810a16de>] smpboot_thread_fn+0x15e/0x1e0
kern :warn : [ 37.324750] [<ffffffff810a1580>] ? sort_range+0x30/0x30
kern :warn : [ 37.331394] [<ffffffff8109e194>] kthread+0xd4/0xf0
kern :warn : [ 37.337548] [<ffffffff81933c3f>] ret_from_fork+0x1f/0x40
kern :warn : [ 37.344284] [<ffffffff8109e0c0>] ? kthread_create_on_node+0x180/0x180
user :notice: [ 37.466233] BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Disabled
user :notice: [ 38.078292] 2016-09-29 21:16:05 ./runtest.py open2 25 both 1 12 24 36 48
kern :notice: [ 112.518727] random: crng init done
kern :warn : [ 124.655523] ------------[ cut here ]------------
kern :warn : [ 124.662221] WARNING: CPU: 2 PID: 883 at kernel/events/core.c:3554 perf_event_read+0x17d/0x190
kern :warn : [ 124.675342] Modules linked in: ipmi_devintf rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver sd_mod sg intel_rapl sb_edac edac_core x86_pkg_temp_thermal mgag200 intel_powerclamp ttm coretemp drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops kvm_intel isci drm snd_pcm kvm snd_timer irqbypass libsas crct10dif_pclmul crc32_pclmul ahci snd scsi_transport_sas crc32c_intel soundcore ghash_clmulni_intel libahci aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr libata shpchp wmi ipmi_si ipmi_msghandler ip_tables
kern :warn : [ 124.739874] CPU: 2 PID: 883 Comm: perf Tainted: G W 4.8.0-rc5-00037-g4fa5cd5 #1
kern :warn : [ 124.750790] Hardware name: Intel Corporation S2600WP/S2600WP, BIOS SE5C600.86B.02.02.0002.122320131210 12/23/2013
kern :warn : [ 124.763775] 0000000000000000 ffff880806c9fcf0 ffffffff8144f659 0000000000000000
kern :warn : [ 124.773539] 0000000000000000 ffff880806c9fd30 ffffffff8107e70b 00000de20a73d540
kern :warn : [ 124.783256] ffff8808032a8800 0000000000000000 0000000000000003 ffff8808032a8800
kern :warn : [ 124.793019] Call Trace:
kern :warn : [ 124.797047] [<ffffffff8144f659>] dump_stack+0x63/0x8a
kern :warn : [ 124.804100] [<ffffffff8107e70b>] __warn+0xcb/0xf0
kern :warn : [ 124.810741] [<ffffffff8107e7fd>] warn_slowpath_null+0x1d/0x20
kern :warn : [ 124.818591] [<ffffffff8116961d>] perf_event_read+0x17d/0x190
kern :warn : [ 124.826322] [<ffffffff81169675>] perf_event_read_value+0x45/0x130
kern :warn : [ 124.834551] [<ffffffff8116dceb>] perf_read+0x17b/0x2d0
kern :warn : [ 124.841694] [<ffffffff8120d108>] __vfs_read+0x28/0x130
kern :warn : [ 124.848827] [<ffffffff813dbc90>] ? security_file_permission+0xa0/0xc0
kern :warn : [ 124.857433] [<ffffffff8120d4ce>] ? rw_verify_area+0x4e/0xb0
kern :warn : [ 124.865067] [<ffffffff8120d5c6>] vfs_read+0x96/0x130
kern :warn : [ 124.871984] [<ffffffff8120e9b6>] SyS_read+0x46/0xa0
kern :warn : [ 124.878800] [<ffffffff81933a32>] entry_SYSCALL_64_fastpath+0x1a/0xa4
kern :warn : [ 124.887299] ---[ end trace 7fd930587be847d3 ]---
kern :warn : [ 124.887299] ---[ end trace 7fd930587be847d3 ]---
To reproduce:
git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
cd lkp-tests
bin/lkp install job.yaml # job file is attached in this email
bin/lkp run job.yaml
Thanks,
Xiaolong
View attachment "config-4.8.0-rc5-00037-g4fa5cd5" of type "text/plain" (152641 bytes)
View attachment "job-script" of type "text/plain" (6479 bytes)
Download attachment "kmsg.xz" of type "application/octet-stream" (21644 bytes)
View attachment "will-it-scale" of type "text/plain" (330 bytes)
View attachment "job.yaml" of type "text/plain" (4094 bytes)
View attachment "reproduce" of type "text/plain" (144 bytes)
Powered by blists - more mailing lists