lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202409131559.545634cc-oliver.sang@intel.com>
Date: Fri, 13 Sep 2024 16:51:29 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Kan Liang <kan.liang@...ux.intel.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Linux Memory Management List
	<linux-mm@...ck.org>, Peter Zijlstra <peterz@...radead.org>,
	<linux-perf-users@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
	<oliver.sang@...el.com>
Subject: [linux-next:master] [perf]  4ba4f1afb6: WARNING:suspicious_RCU_usage



Hello,

kernel test robot noticed "WARNING:suspicious_RCU_usage" on:

commit: 4ba4f1afb6a9fed8ef896c2363076e36572f71da ("perf: Generic hotplug support for a PMU with a scope")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master 57f962b956f1d116cd64d5c406776c4975de549d]

in testcase: rcutorture
version: 
with following parameters:

	runtime: 300s
	test: cpuhotplug
	torture_type: tasks-tracing



compiler: clang-18
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202409131559.545634cc-oliver.sang@intel.com


[  125.180122][   T21] WARNING: suspicious RCU usage
[  125.180886][   T21] 6.11.0-rc5-00040-g4ba4f1afb6a9 #1 Not tainted
[  125.181734][   T21] -----------------------------
[  125.182393][   T21] kernel/events/core.c:13946 RCU-list traversed in non-reader section!!
[  125.183478][   T21]
[  125.183478][   T21] other info that might help us debug this:
[  125.183478][   T21]
[  125.184868][   T21]
[  125.184868][   T21] rcu_scheduler_active = 2, debug_locks = 1
[  125.208754][   T21] 3 locks held by cpuhp/1/21:
[ 125.209326][ T21] #0: c306b6cc (cpu_hotplug_lock){++++}-{0:0}, at: lockdep_acquire_cpus_lock (kernel/cpu.c:538) 
[ 125.210479][ T21] #1: c306b7d0 (cpuhp_state-down){+.+.}-{0:0}, at: cpuhp_lock_acquire (kernel/cpu.c:102) 
[ 125.211538][ T21] #2: c33ac828 (pmus_lock){+.+.}-{3:3}, at: perf_event_exit_cpu (kernel/events/core.c:13962 include/asm-generic/bitops/instrumented-atomic.h:42 include/linux/cpumask.h:529 kernel/events/core.c:13928 kernel/events/core.c:13967 kernel/events/core.c:14041) 
[  125.212625][   T21]
[  125.212625][   T21] stack backtrace:
[  125.213367][   T21] CPU: 1 UID: 0 PID: 21 Comm: cpuhp/1 Not tainted 6.11.0-rc5-00040-g4ba4f1afb6a9 #1
[  125.216087][   T21] Call Trace:
[ 125.216541][ T21] dump_stack_lvl (lib/dump_stack.c:121) 
[ 125.217219][ T21] dump_stack (lib/dump_stack.c:128) 
[ 125.217785][ T21] lockdep_rcu_suspicious (include/linux/context_tracking.h:122 include/linux/context_tracking.h:143 kernel/locking/lockdep.c:6684) 
[ 125.218515][ T21] perf_event_exit_cpu (kernel/events/core.c:? kernel/events/core.c:13967 kernel/events/core.c:14041) 
[ 125.219211][ T21] cpuhp_invoke_callback (kernel/cpu.c:194) 
[ 125.219935][ T21] ? perf_event_init_cpu (kernel/events/core.c:14040) 
[ 125.220755][ T21] cpuhp_thread_fun (kernel/cpu.c:1102) 
[ 125.221431][ T21] smpboot_thread_fn (kernel/smpboot.c:?) 
[ 125.222120][ T21] kthread (kernel/kthread.c:391) 
[ 125.222888][ T21] ? smpboot_unregister_percpu_thread (kernel/smpboot.c:107) 
[ 125.223731][ T21] ? kthread_unuse_mm (kernel/kthread.c:342) 
[ 125.224312][ T21] ? kthread_unuse_mm (kernel/kthread.c:342) 
[ 125.224906][ T21] ret_from_fork (arch/x86/kernel/process.c:153) 
[ 125.225425][ T21] ret_from_fork_asm (??:?) 
[ 125.226044][ T21] entry_INT80_32 (init_task.c:?) 



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240913/202409131559.545634cc-oliver.sang@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ