Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755992Ab3EXNqX (ORCPT ); Fri, 24 May 2013 09:46:23 -0400 Received: from hrndva-omtalb.mail.rr.com ([71.74.56.122]:29010 "EHLO hrndva-omtalb.mail.rr.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751406Ab3EXNqW (ORCPT ); Fri, 24 May 2013 09:46:22 -0400 X-Authority-Analysis: v=2.0 cv=L+efspv8 c=1 sm=0 a=rXTBtCOcEpjy1lPqhTCpEQ==:17 a=mNMOxpOpBa8A:10 a=s9b0WtSLZS4A:10 a=5SG0PmZfjMsA:10 a=IkcTkHD0fZMA:10 a=meVymXHHAAAA:8 a=_vU5-hpMSx0A:10 a=D19gQVrFAAAA:8 a=h3eMrPuamLM8XZzfFb4A:9 a=QEXdDO2ut3YA:10 a=rXTBtCOcEpjy1lPqhTCpEQ==:117 X-Cloudmark-Score: 0 X-Authenticated-User: X-Originating-IP: 74.67.115.198 Message-ID: <1369403180.6828.223.camel@gandalf.local.home> Subject: Re: rcu_read_lock() used illegally while idle! From: Steven Rostedt To: Dave Jones Cc: paulmck@linux.vnet.ibm.com, Linux Kernel , fweisbec@gmail.com Date: Fri, 24 May 2013 09:46:20 -0400 In-Reply-To: <20130523164004.GJ16419@redhat.com> References: <20130521173100.GA2076@redhat.com> <20130522093624.GZ3578@linux.vnet.ibm.com> <1369226958.6828.175.camel@gandalf.local.home> <20130523164004.GJ16419@redhat.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3210 Lines: 71 On Thu, 2013-05-23 at 12:40 -0400, Dave Jones wrote: > On Wed, May 22, 2013 at 08:49:18AM -0400, Steven Rostedt wrote: > > > > =============================== > > > [ INFO: suspicious RCU usage. ] > > > 3.10.0-rc2+ #1 Not tainted > > > ------------------------------- > > > include/linux/rcupdate.h:771 rcu_read_lock() used illegally while idle! > > > other info that might help us debug this: > > > RCU used illegally from idle CPU! rcu_scheduler_active = 1, debug_locks = 0 > > > RCU used illegally from extended quiescent state! > > > 2 locks held by cc1/63645: > > > #0: (&rq->lock){-.-.-.}, at: [] __schedule+0xed/0x9b0 > > > #1: (rcu_read_lock){.+.+..}, at: [] cpuacct_charge+0x5/0x1f0 > > > > > > CPU: 1 PID: 63645 Comm: cc1 Not tainted 3.10.0-rc2+ #1 [loadavg: 40.57 27.55 13.39 25/277 64369] > > > Hardware name: Gigabyte Technology Co., Ltd. GA-MA78GM-S2H/GA-MA78GM-S2H, BIOS F12a 04/23/2010 > > > 0000000000000000 ffff88010f78fcf8 ffffffff816ae383 ffff88010f78fd28 > > > ffffffff810b698d ffff88011c092548 000000000023d073 ffff88011c092500 > > > 0000000000000001 ffff88010f78fd60 ffffffff8109d7c5 ffffffff8109d645 > > > Call Trace: > > > [] dump_stack+0x19/0x1b > > > [] lockdep_rcu_suspicious+0xfd/0x130 > > > [] cpuacct_charge+0x185/0x1f0 > > > [] ? cpuacct_charge+0x5/0x1f0 > > > [] update_curr+0xec/0x240 > > > [] put_prev_task_fair+0x228/0x480 > > > [] __schedule+0x161/0x9b0 > > > [] preempt_schedule+0x51/0x80 > > > [] ? __cond_resched_softirq+0x60/0x60 > > > [] ? retint_careful+0x12/0x2e > > > [] ftrace_ops_control_func+0x1dc/0x210 > > > [] ftrace_call+0x5/0x2f > > > [] ? retint_careful+0xb/0x2e > > > [] ? schedule_user+0x5/0x70 > > > [] ? schedule_user+0x5/0x70 > > > [] ? retint_careful+0x12/0x2e > > > ------------[ cut here ]------------ > > > > This looks to be the caused by the same issue that this patch fixes: > > > > https://lkml.org/lkml/2013/5/10/537 > > > > The schedule_user() was traced, and the preempt_enable_no_trace() that > > the function tracer does caused for a schedule to occur. As the > > scheduler uses rcu, and it was called before schedule_user() could tell > > the kernel that the context is changing from user to kernel. > > That patch doesn't help unfortunatly. > Dave, Can you send me your full .config, and also what you did to trigger this? As I see ftrace_call is there, I'm assuming you have function tracing enabled somewhere. Probably via perf, as ftrace_ops_control_func is used by perf. Also, if you added anything special on the kernel command line, that info will be useful too. Thanks, -- Steve -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/