[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202409131559.545634cc-oliver.sang@intel.com>
Date: Fri, 13 Sep 2024 16:51:29 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Kan Liang <kan.liang@...ux.intel.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Linux Memory Management List
<linux-mm@...ck.org>, Peter Zijlstra <peterz@...radead.org>,
<linux-perf-users@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
<oliver.sang@...el.com>
Subject: [linux-next:master] [perf] 4ba4f1afb6: WARNING:suspicious_RCU_usage
Hello,
kernel test robot noticed "WARNING:suspicious_RCU_usage" on:
commit: 4ba4f1afb6a9fed8ef896c2363076e36572f71da ("perf: Generic hotplug support for a PMU with a scope")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
[test failed on linux-next/master 57f962b956f1d116cd64d5c406776c4975de549d]
in testcase: rcutorture
version:
with following parameters:
runtime: 300s
test: cpuhotplug
torture_type: tasks-tracing
compiler: clang-18
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202409131559.545634cc-oliver.sang@intel.com
[ 125.180122][ T21] WARNING: suspicious RCU usage
[ 125.180886][ T21] 6.11.0-rc5-00040-g4ba4f1afb6a9 #1 Not tainted
[ 125.181734][ T21] -----------------------------
[ 125.182393][ T21] kernel/events/core.c:13946 RCU-list traversed in non-reader section!!
[ 125.183478][ T21]
[ 125.183478][ T21] other info that might help us debug this:
[ 125.183478][ T21]
[ 125.184868][ T21]
[ 125.184868][ T21] rcu_scheduler_active = 2, debug_locks = 1
[ 125.208754][ T21] 3 locks held by cpuhp/1/21:
[ 125.209326][ T21] #0: c306b6cc (cpu_hotplug_lock){++++}-{0:0}, at: lockdep_acquire_cpus_lock (kernel/cpu.c:538)
[ 125.210479][ T21] #1: c306b7d0 (cpuhp_state-down){+.+.}-{0:0}, at: cpuhp_lock_acquire (kernel/cpu.c:102)
[ 125.211538][ T21] #2: c33ac828 (pmus_lock){+.+.}-{3:3}, at: perf_event_exit_cpu (kernel/events/core.c:13962 include/asm-generic/bitops/instrumented-atomic.h:42 include/linux/cpumask.h:529 kernel/events/core.c:13928 kernel/events/core.c:13967 kernel/events/core.c:14041)
[ 125.212625][ T21]
[ 125.212625][ T21] stack backtrace:
[ 125.213367][ T21] CPU: 1 UID: 0 PID: 21 Comm: cpuhp/1 Not tainted 6.11.0-rc5-00040-g4ba4f1afb6a9 #1
[ 125.216087][ T21] Call Trace:
[ 125.216541][ T21] dump_stack_lvl (lib/dump_stack.c:121)
[ 125.217219][ T21] dump_stack (lib/dump_stack.c:128)
[ 125.217785][ T21] lockdep_rcu_suspicious (include/linux/context_tracking.h:122 include/linux/context_tracking.h:143 kernel/locking/lockdep.c:6684)
[ 125.218515][ T21] perf_event_exit_cpu (kernel/events/core.c:? kernel/events/core.c:13967 kernel/events/core.c:14041)
[ 125.219211][ T21] cpuhp_invoke_callback (kernel/cpu.c:194)
[ 125.219935][ T21] ? perf_event_init_cpu (kernel/events/core.c:14040)
[ 125.220755][ T21] cpuhp_thread_fun (kernel/cpu.c:1102)
[ 125.221431][ T21] smpboot_thread_fn (kernel/smpboot.c:?)
[ 125.222120][ T21] kthread (kernel/kthread.c:391)
[ 125.222888][ T21] ? smpboot_unregister_percpu_thread (kernel/smpboot.c:107)
[ 125.223731][ T21] ? kthread_unuse_mm (kernel/kthread.c:342)
[ 125.224312][ T21] ? kthread_unuse_mm (kernel/kthread.c:342)
[ 125.224906][ T21] ret_from_fork (arch/x86/kernel/process.c:153)
[ 125.225425][ T21] ret_from_fork_asm (??:?)
[ 125.226044][ T21] entry_INT80_32 (init_task.c:?)
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240913/202409131559.545634cc-oliver.sang@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists