[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzZ=Z9kuXf-tAZpw3QTK4VA7vmCCP5nWJTV1L=x3wRhfKQ@mail.gmail.com>
Date: Mon, 12 Aug 2024 21:58:20 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Peter Ziljstra <peterz@...radead.org>
Cc: open list <linux-kernel@...r.kernel.org>,
"linux-perf-use." <linux-perf-users@...r.kernel.org>, Ingo Molnar <mingo@...hat.com>
Subject: New "using smp_processor_id() in preemptible" splat on tip/perf/core
Hey Peter,
I started getting a new splat on the latest tip/perf/core, I suspect
it's due to [0], which moved this_cpu_ptr() outside of
raw_spin_lock-protected area. Please take a look, thanks.
[0] https://lore.kernel.org/linux-perf-users/20240807115550.138301094@infradead.org
[ 139.529263] BUG: using smp_processor_id() in preemptible [00000000]
code: test_progs/2361
[ 139.530412] caller is event_function_call+0x2f/0x180
[ 139.531081] CPU: 10 UID: 0 PID: 2361 Comm: test_progs Tainted: G
OE 6.11.0-rc1-00043-gb5e7663f6aac #217
[ 139.532531] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[ 139.533246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 139.534789] Call Trace:
[ 139.535123] <TASK>
[ 139.535417] dump_stack_lvl+0x56/0x80
[ 139.535906] check_preemption_disabled+0xc6/0xe0
[ 139.536526] event_function_call+0x2f/0x180
[ 139.537088] ? preempt_count_add+0x6c/0xa0
[ 139.537639] perf_event_release_kernel+0x72/0x2b0
[ 139.538263] ? __rseq_handle_notify_resume+0x26e/0x4a0
[ 139.538973] perf_release+0x11/0x20
[ 139.539451] __fput+0xee/0x2c0
[ 139.539872] __x64_sys_close+0x38/0x80
[ 139.540389] do_syscall_64+0x47/0x100
[ 139.540900] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 139.541601] RIP: 0033:0x7f4b043fea94
[ 139.542095] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84
00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00
00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c
e8 c3
[ 139.544656] RSP: 002b:00007ffc19703188 EFLAGS: 00000202 ORIG_RAX:
0000000000000003
[ 139.545683] RAX: ffffffffffffffda RBX: 00007ffc19703748 RCX: 00007f4b043fea94
[ 139.546609] RDX: 00000000ffffffff RSI: 0000000000000939 RDI: 0000000000000007
[ 139.547548] RBP: 00007ffc19703270 R08: 0000000000000008 R09: 0000000000000000
[ 139.548515] R10: 00000000ffffffff R11: 0000000000000202 R12: 0000000000000000
[ 139.549486] R13: 00007ffc19703778 R14: 00007f4b0455b000 R15: 0000000001004d90
[ 139.550449] </TASK>
-- Andrii
Powered by blists - more mailing lists