Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753984Ab3FCIJ3 (ORCPT ); Mon, 3 Jun 2013 04:09:29 -0400 Received: from mail-ve0-f182.google.com ([209.85.128.182]:36963 "EHLO mail-ve0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753280Ab3FCIJY (ORCPT ); Mon, 3 Jun 2013 04:09:24 -0400 MIME-Version: 1.0 Date: Mon, 3 Jun 2013 11:09:23 +0300 Message-ID: Subject: kernel/events/callchain.c:141 suspicious rcu_dereference_check() usage! From: Tommi Rantala To: Peter Zijlstra , Paul Mackerras , Ingo Molnar , Arnaldo Carvalho de Melo Cc: LKML , Dave Jones , trinity@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3319 Lines: 67 Hello, Hit this while fuzzing v3.10-rc4-0-gd683b96 with trinity. Tommi [ 8703.304587] [ 8703.305106] =============================== [ 8703.305106] [ INFO: suspicious RCU usage. ] [ 8703.305106] 3.10.0-rc4 #1 Tainted: G I [ 8703.305106] ------------------------------- [ 8703.305106] /build/linux/kernel/events/callchain.c:141 suspicious rcu_dereference_check() usage! [ 8703.305106] [ 8703.305106] other info that might help us debug this: [ 8703.305106] [ 8703.305106] [ 8703.305106] rcu_scheduler_active = 1, debug_locks = 0 [ 8703.305106] 2 locks held by trinity-child28/23333: [ 8703.305106] #0: (&rq->lock){-.-.-.}, at: [] __schedule+0x1c8/0xa00 [ 8703.305106] #1: (&ctx->lock){-.-...}, at: [] __perf_event_task_sched_out+0x407/0x4b0 [ 8703.305106] [ 8703.305106] stack backtrace: [ 8703.305106] CPU: 1 PID: 23333 Comm: trinity-child28 Tainted: G I 3.10.0-rc4 #1 [ 8703.305106] Hardware name: Hewlett-Packard HP Compaq dc7800 Small Form Factor/0AA8h, BIOS 786F1 v01.24 03/18/2008 [ 8703.305106] 0000000000000001 ffff880103899a00 ffffffff8228e109 ffff880103899a30 [ 8703.305106] ffffffff81176f06 0000000000000001 0000000000000000 ffff8800d46e1bd8 [ 8703.305106] ffff880103899b88 ffff880103899a78 ffffffff811d36a3 ffff880102ab1a08 [ 8703.305106] Call Trace: [ 8703.305106] [] dump_stack+0x19/0x1b [ 8703.305106] [] lockdep_rcu_suspicious+0x116/0x140 [ 8703.305106] [] perf_callchain+0x153/0x290 [ 8703.305106] [] perf_prepare_sample+0x86/0x2b0 [ 8703.305106] [] intel_pmu_drain_bts_buffer+0xf8/0x1b0 [ 8703.305106] [] ? sched_clock_local+0x1d/0x90 [ 8703.305106] [] ? trace_hardirqs_off_caller+0x28/0xe0 [ 8703.305106] [] intel_pmu_disable_event+0x33/0x140 [ 8703.305106] [] x86_pmu_stop+0x43/0xd0 [ 8703.305106] [] x86_pmu_del+0x36/0x100 [ 8703.305106] [] event_sched_out.isra.28+0xba/0x150 [ 8703.305106] [] group_sched_out+0x56/0xd0 [ 8703.305106] [] ctx_sched_out+0x104/0x130 [ 8703.305106] [] __perf_event_task_sched_out+0x418/0x4b0 [ 8703.305106] [] ? __perf_event_task_sched_out+0x67/0x4b0 [ 8703.305106] [] ? trace_hardirqs_off_caller+0x28/0xe0 [ 8703.305106] [] ? trace_hardirqs_off+0xd/0x10 [ 8703.305106] [] perf_event_task_sched_out+0x87/0xa0 [ 8703.305106] [] ? do_raw_spin_unlock+0xa7/0xc0 [ 8703.305106] [] ? _raw_spin_unlock+0x22/0x40 [ 8703.305106] [] ? __dequeue_entity+0x3d/0x50 [ 8703.305106] [] ? set_next_entity+0x26/0x90 [ 8703.305106] [] ? pick_next_task_fair+0xd3/0x150 [ 8703.305106] [] __schedule+0x698/0xa00 [ 8703.305106] [] schedule+0x55/0x60 [ 8703.305106] [] sysret_careful+0x19/0x1c -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/