[<prev] [next>] [day] [month] [year] [list]
Message-ID: <14717.1480441140@turing-police.cc.vt.edu>
Date: Tue, 29 Nov 2016 12:39:00 -0500
From: Valdis Kletnieks <Valdis.Kletnieks@...edu>
To: linux-kernel@...r.kernel.org
Subject: linux-next 20161129 - lockdep: kernel/sched/core.c:7747 Illegal context switch in RCU-bh read-side critical section!
May or may not be related to the BUG I just reported - the first hit
on that one was right after this in the log....
[ 2.740391] ===============================
[ 2.740433] suspicious RCU usage. ]
[ 2.740463] 4.9.0-rc7-next-20161129-dirty #361 Not tainted
[ 2.740464] -------------------------------
[ 2.740499] kernel/sched/core.c:7747 Illegal context switch in RCU-bh read-side critical section!
[ 2.740567]
other info that might help us debug this:
[ 2.740628]
rcu_scheduler_active = 1, debug_locks = 1
[ 2.740679] 3 locks held by systemd/1:
[ 2.740680] #0:
[ 2.740681] (
[ 2.740682] rtnl_mutex
[ 2.740683] ){+.+.+.}
[ 2.740684] , at:
[ 2.740689] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40
[ 2.740690] #1:
[ 2.740691] (
[ 2.740692] rcu_read_lock_bh
[ 2.740693] ){......}
[ 2.740694] , at:
[ 2.740698] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[ 2.740699] #2:
[ 2.740700] (
[ 2.740701] addrconf_hash_lock
[ 2.740702] ){+.....}
[ 2.740702] , at:
[ 2.740705] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0
[ 2.740706]
stack backtrace:
[ 2.740708] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361
[ 2.740709] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015
[ 2.740711] Call Trace:
[ 2.740716] dump_stack+0x7b/0xd1
[ 2.740719] lockdep_rcu_suspicious+0xc5/0x100
[ 2.740722] ___might_sleep+0x240/0x300
[ 2.740725] __alloc_pages_nodemask+0x13f/0x730
[ 2.740729] cache_alloc_refill+0x184/0x12e0
[ 2.740732] kmem_cache_alloc+0xef/0x4f0
[ 2.740734] dst_alloc+0x5f/0xf0
[ 2.740739] __ip6_dst_alloc+0x36/0xd0
[ 2.740744] ip6_dst_alloc+0x19/0x150
[ 2.740748] addrconf_dst_alloc+0x78/0x1c0
[ 2.740753] ipv6_add_addr+0x2d9/0xab0
[ 2.740757] ? ipv6_add_addr+0x9f/0xab0
[ 2.740762] ? trace_hardirqs_on_caller+0x1ab/0x2c0
[ 2.740767] add_addr+0x36/0x110
[ 2.740772] addrconf_notify+0x8c4/0x1230
[ 2.740776] ? fib_add_ifaddr+0x110/0x1b0
[ 2.740780] raw_notifier_call_chain+0x66/0xd0
[ 2.740784] call_netdevice_notifiers_info+0x73/0x90
[ 2.740787] __dev_notify_flags+0x8f/0xf0
[ 2.740790] ? __dev_change_flags+0xc3/0x1b0
[ 2.740792] dev_change_flags+0x62/0x90
[ 2.740795] do_setlink+0x3b5/0x1860
[ 2.740799] ? avc_has_perm_noaudit+0x1d9/0x330
[ 2.740801] ? preempt_count_sub+0x4a/0x90
[ 2.740805] ? avc_has_perm_noaudit+0x59/0x330
[ 2.740808] ? nla_parse+0x143/0x1c0
[ 2.740811] rtnl_setlink+0x118/0x1a0
[ 2.740816] ? do_setlink+0x1860/0x1860
[ 2.740819] rtnetlink_rcv_msg+0xfa/0x630
[ 2.740822] ? mutex_lock_nested+0x109/0x9f0
[ 2.740824] ? rtnetlink_rcv+0x1b/0x40
[ 2.740827] ? netlink_deliver_tap+0x5/0x4e0
[ 2.740830] ? rtnl_newlink+0xbe0/0xbe0
[ 2.740832] netlink_rcv_skb+0x87/0xc0
[ 2.740834] rtnetlink_rcv+0x2a/0x40
[ 2.740836] netlink_unicast+0x1e7/0x300
[ 2.740839] netlink_sendmsg+0x402/0x670
[ 2.740842] sock_sendmsg+0x5b/0xd0
[ 2.740845] SYSC_sendto+0x156/0x1f0
[ 2.740848] ? netlink_getsockopt+0x2f9/0x3d0
[ 2.740850] ? entry_SYSCALL_64_fastpath+0x5/0xad
[ 2.740853] ? trace_hardirqs_on_caller+0x1ab/0x2c0
[ 2.740856] ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 2.740859] SyS_sendto+0xe/0x10
[ 2.740864] entry_SYSCALL_64_fastpath+0x18/0xad
[ 2.740866] RIP: 0033:0x7fc497fffa73
[ 2.740985] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 2.740987] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73
[ 2.740989] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004
[ 2.740990] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010
[ 2.740992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8
[ 2.740993] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3
[ 2.740996] BUG: sleeping function called from invalid context at mm/page_alloc.c:3775
[ 2.741062] in_atomic(): 1, irqs_disabled(): 1, pid: 1, name: systemd
[ 2.741112] 3 locks held by systemd/1:
[ 2.741113] #0:
[ 2.741114] (
[ 2.741115] rtnl_mutex
[ 2.741116] ){+.+.+.}
[ 2.741117] , at:
[ 2.741119] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40
[ 2.741120] #1:
[ 2.741121] (
[ 2.741122] rcu_read_lock_bh
[ 2.741123] ){......}
[ 2.741123] , at:
[ 2.741126] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[ 2.741127] #2:
[ 2.741128] (
[ 2.741129] addrconf_hash_lock
[ 2.741130] ){+.....}
[ 2.741131] , at:
[ 2.741133] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0
[ 2.741134] irq event stamp: 1862459
[ 2.741135] hardirqs last enabled at (1862458):
[ 2.741137] [<ffffffffa939ec13>] kmem_cache_alloc_trace+0x2d3/0x4f0
[ 2.741138] hardirqs last disabled at (1862459):
[ 2.741140] [<ffffffffa939e4dc>] kmem_cache_alloc+0x8c/0x4f0
[ 2.741141] softirqs last enabled at (1862454):
[ 2.741144] [<ffffffffa9ee667b>] ipv6_mc_up+0x5b/0x80
[ 2.741145] softirqs last disabled at (1862456):
[ 2.741147] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[ 2.741149] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361
[ 2.741150] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015
[ 2.741151] Call Trace:
[ 2.741154] dump_stack+0x7b/0xd1
[ 2.741157] ___might_sleep+0x194/0x300
[ 2.741159] __alloc_pages_nodemask+0x13f/0x730
[ 2.741162] cache_alloc_refill+0x184/0x12e0
[ 2.741165] kmem_cache_alloc+0xef/0x4f0
[ 2.741168] dst_alloc+0x5f/0xf0
[ 2.741171] __ip6_dst_alloc+0x36/0xd0
[ 2.741174] ip6_dst_alloc+0x19/0x150
[ 2.741176] addrconf_dst_alloc+0x78/0x1c0
[ 2.741179] ipv6_add_addr+0x2d9/0xab0
[ 2.741181] ? ipv6_add_addr+0x9f/0xab0
[ 2.741183] ? trace_hardirqs_on_caller+0x1ab/0x2c0
[ 2.741187] add_addr+0x36/0x110
[ 2.741190] addrconf_notify+0x8c4/0x1230
[ 2.741192] ? fib_add_ifaddr+0x110/0x1b0
[ 2.741195] raw_notifier_call_chain+0x66/0xd0
[ 2.741199] call_netdevice_notifiers_info+0x73/0x90
[ 2.741201] __dev_notify_flags+0x8f/0xf0
[ 2.741204] ? __dev_change_flags+0xc3/0x1b0
[ 2.741207] dev_change_flags+0x62/0x90
[ 2.741209] do_setlink+0x3b5/0x1860
[ 2.741212] ? avc_has_perm_noaudit+0x1d9/0x330
[ 2.741214] ? preempt_count_sub+0x4a/0x90
[ 2.741217] ? avc_has_perm_noaudit+0x59/0x330
[ 2.741221] ? nla_parse+0x143/0x1c0
[ 2.741223] rtnl_setlink+0x118/0x1a0
[ 2.741228] ? do_setlink+0x1860/0x1860
[ 2.741231] rtnetlink_rcv_msg+0xfa/0x630
[ 2.741233] ? mutex_lock_nested+0x109/0x9f0
[ 2.741235] ? rtnetlink_rcv+0x1b/0x40
[ 2.741237] ? netlink_deliver_tap+0x5/0x4e0
[ 2.741240] ? rtnl_newlink+0xbe0/0xbe0
[ 2.741242] netlink_rcv_skb+0x87/0xc0
[ 2.741245] rtnetlink_rcv+0x2a/0x40
[ 2.741247] netlink_unicast+0x1e7/0x300
[ 2.741249] netlink_sendmsg+0x402/0x670
[ 2.741252] sock_sendmsg+0x5b/0xd0
[ 2.741255] SYSC_sendto+0x156/0x1f0
[ 2.741257] ? netlink_getsockopt+0x2f9/0x3d0
[ 2.741260] ? entry_SYSCALL_64_fastpath+0x5/0xad
[ 2.741262] ? trace_hardirqs_on_caller+0x1ab/0x2c0
[ 2.741264] ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 2.741267] SyS_sendto+0xe/0x10
[ 2.741269] entry_SYSCALL_64_fastpath+0x18/0xad
[ 2.741271] RIP: 0033:0x7fc497fffa73
[ 2.741273] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 2.741275] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73
[ 2.741277] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004
[ 2.741278] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010
[ 2.741279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8
[ 2.741281] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists