Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751490Ab3FZEbV (ORCPT ); Wed, 26 Jun 2013 00:31:21 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58278 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750715Ab3FZEbU (ORCPT ); Wed, 26 Jun 2013 00:31:20 -0400 Date: Wed, 26 Jun 2013 00:31:06 -0400 From: Dave Jones To: Linux Kernel Cc: a.p.zijlstra@chello.nl, mingo@redhat.com Subject: __perf_event_overflow suspicious RCU usage. Message-ID: <20130626043106.GA31416@redhat.com> Mail-Followup-To: Dave Jones , Linux Kernel , a.p.zijlstra@chello.nl, mingo@redhat.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3237 Lines: 57 [40924.102878] =============================== [40924.102898] [ INFO: suspicious RCU usage. ] [40924.102918] 3.10.0-rc7+ #4 Not tainted [40924.102936] ------------------------------- [40924.102957] include/linux/rcupdate.h:780 rcu_read_lock() used illegally while idle! [40924.102987] other info that might help us debug this: [40924.103019] RCU used illegally from idle CPU! rcu_scheduler_active = 1, debug_locks = 0 [40924.103059] RCU used illegally from extended quiescent state! [40924.103084] 1 lock held by trinity-child2/7828: [40924.103104] #0: (rcu_read_lock){.+.+..}, at: [] __perf_event_overflow+0x108/0x310 [40924.103960] stack backtrace: [40924.105608] CPU: 2 PID: 7828 Comm: trinity-child2 Not tainted 3.10.0-rc7+ #4 [40924.107348] 0000000000000001 ffff8801df29ba90 ffffffff816dfc58 ffff8801df29bac0 [40924.108251] ffffffff810b5c47 ffff880231947000 0000000000000000 ffff8801df29bbc0 [40924.109152] 0000000000000000 ffff8801df29bb40 ffffffff8113e474 ffffffff8113e2e8 [40924.110059] Call Trace: [40924.110949] [] dump_stack+0x19/0x1b [40924.111848] [] lockdep_rcu_suspicious+0xe7/0x120 [40924.112752] [] __perf_event_overflow+0x294/0x310 [40924.113654] [] ? __perf_event_overflow+0x108/0x310 [40924.114556] [] ? ftrace_call+0x5/0x2f [40924.115450] [] perf_swevent_overflow+0x51/0xe0 [40924.116352] [] perf_swevent_event+0x5f/0x90 [40924.117251] [] perf_tp_event+0x109/0x4f0 [40924.118149] [] ? perf_tp_event+0x2af/0x4f0 [40924.119049] [] ? __rcu_read_lock+0x20/0x20 [40924.119944] [] perf_ftrace_function_call+0xbf/0xd0 [40924.120841] [] ? ftrace_ops_control_func+0x105/0x140 [40924.121743] [] ? __rcu_read_lock+0x20/0x20 [40924.122645] [] ? rcu_eqs_enter_common+0x5e/0x470 [40924.123544] [] ftrace_ops_control_func+0x105/0x140 [40924.124444] [] ? __rcu_read_lock+0x20/0x20 [40924.125344] [] ? rcu_eqs_enter_common+0x5e/0x470 [40924.126242] [] ftrace_ops_list_func+0x156/0x180 [40924.127139] [] ftrace_call+0x5/0x2f [40924.128031] [] ? ftrace_ops_list_func+0xb2/0x180 [40924.128932] [] ? ftrace_call+0x5/0x2f [40924.129825] [] ? debug_lockdep_rcu_enabled+0x5/0x40 [40924.130723] [] ? debug_lockdep_rcu_enabled+0x5/0x40 [40924.131611] [] ? rcu_eqs_enter_common+0x5e/0x470 [40924.132492] [] rcu_eqs_enter+0x6a/0xb0 [40924.133367] [] rcu_user_enter+0x13/0x20 [40924.134244] [] user_enter+0x6a/0xd0 [40924.135113] [] syscall_trace_leave+0x78/0x140 [40924.135975] [] int_check_syscall_exit_work+0x34/0x3d -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/