Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262013AbVBJCVF (ORCPT ); Wed, 9 Feb 2005 21:21:05 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262014AbVBJCVF (ORCPT ); Wed, 9 Feb 2005 21:21:05 -0500 Received: from unused.mind.net ([69.9.134.98]:30668 "EHLO echo.lysdexia.org") by vger.kernel.org with ESMTP id S262013AbVBJCUp (ORCPT ); Wed, 9 Feb 2005 21:20:45 -0500 Date: Wed, 9 Feb 2005 18:20:31 -0800 (PST) From: William Weston To: Stephen Smalley cc: Ingo Molnar , lkml , James Morris Subject: Re: [patch] Real-Time Preemption, -RT-2.6.11-rc3-V0.7.38-01 In-Reply-To: <1107953301.17568.6.camel@moss-spartans.epoch.ncsc.mil> Message-ID: References: <20050204100347.GA13186@elte.hu> <1107953301.17568.6.camel@moss-spartans.epoch.ncsc.mil> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5214 Lines: 132 Two more of these sel_netif_lookup related BUGs were found with -RT-2.6.11-rc3-V0.7.38-06: BUG: sleeping function called from invalid context ksoftirqd/0(2) at kernel/rt.c:1448 in_atomic():1 [00000001], irqs_disabled():0 [] dump_stack+0x23/0x30 (20) [] __might_sleep+0xd8/0xf0 (36) [] __spin_lock+0x38/0x60 (24) [] _spin_lock+0x1d/0x20 (16) [] kmem_cache_alloc+0x3f/0x140 (44) [] sel_netif_lookup+0x69/0x160 (40) [] sel_netif_sids+0x38/0xd0 (40) [] selinux_socket_sock_rcv_skb+0xc3/0x2a0 (152) [] udp_queue_rcv_skb+0xca/0x2d0 (40) [] udp_rcv+0x1c8/0x430 (96) [] ip_local_deliver+0x6c/0x210 (36) [] ip_rcv+0x239/0x430 (56) [] netif_receive_skb+0x147/0x180 (48) [] process_backlog+0x7f/0x110 (28) [] net_rx_action+0x7c/0x130 (32) [] ___do_softirq+0x57/0xf0 (40) [] _do_softirq+0x25/0x30 (8) [] ksoftirqd+0xa5/0x100 (28) [] kthread+0xa6/0xe0 (48) [] kernel_thread_helper+0x5/0xc (537116692) --------------------------- | preempt count: 00000002 ] | 2-level deep critical section nesting: ---------------------------------------- .. [] .... __do_IRQ+0xfb/0x1a0 .....[] .. ( <= do_IRQ+0x6f/0xb0) .. [] .... print_traces+0x1b/0x60 .....[] .. ( <= dump_stack+0x23/0x30) BUG: sleeping function called from invalid context ksoftirqd/0(2) at kernel/rt.c:1448 in_atomic():1 [00000001], irqs_disabled():0 [] dump_stack+0x23/0x30 (20) [] __might_sleep+0xd8/0xf0 (36) [] __spin_lock+0x38/0x60 (24) [] _spin_lock+0x1d/0x20 (16) [] kmem_cache_alloc+0x3f/0x140 (44) [] sel_netif_lookup+0x69/0x160 (40) [] sel_netif_sids+0x38/0xd0 (40) [] selinux_socket_sock_rcv_skb+0xc3/0x2a0 (152) [] tcp_v4_rcv+0x502/0x950 (76) [] ip_local_deliver+0x6c/0x210 (36) [] ip_rcv+0x239/0x430 (56) [] netif_receive_skb+0x147/0x180 (48) [] process_backlog+0x7f/0x110 (28) [] net_rx_action+0x7c/0x130 (32) [] ___do_softirq+0x57/0xf0 (40) [] _do_softirq+0x25/0x30 (8) [] ksoftirqd+0xa5/0x100 (28) [] kthread+0xa6/0xe0 (48) [] kernel_thread_helper+0x5/0xc (537116692) --------------------------- | preempt count: 00000002 ] | 2-level deep critical section nesting: ---------------------------------------- .. [] .... __do_IRQ+0xfb/0x1a0 .....[] .. ( <= do_IRQ+0x6f/0xb0) .. [] .... print_traces+0x1b/0x60 .....[] .. ( <= dump_stack+0x23/0x30) Additional info about the system/kernel/config can be found at http://www.sysex.net/testing/ Best Regards, --William Weston On Wed, 9 Feb 2005, Stephen Smalley wrote: > On Tue, 2005-02-08 at 16:58, William Weston wrote: > > Hi Ingo, > > > > Great work on the -RT kernel! Here's a status report from my Athlon box > > w/ kernel -RT-2.6.11-rc3-V0.7.38-03, realtime-lsm-0.8.5, jack-0.99.48, > > alsa-1.0.8, and latencytest-0.5.5: > > > A couple BUGs are being logged (see below), but without any ill effect > > other than taking up space on my /var. > > > Network interface (via rhine) startup triggers these two BUGs: > > > > BUG: sleeping function called from invalid context ksoftirqd/0(2) at > > kernel/rt.c:1448 > > in_atomic():1 [00000001], irqs_disabled():0 > > [] dump_stack+0x17/0x20 (12) > > [] __might_sleep+0xd9/0xf0 (40) > > [] __spin_lock+0x36/0x50 (24) > > [] kmem_cache_alloc+0x34/0x120 (44) > > [] sel_netif_lookup+0x63/0x150 (28) > > [] sel_netif_sids+0x2d/0xb0 (28) > > [] selinux_socket_sock_rcv_skb+0xac/0x230 (144) > > I'm not sure I understand, as sel_netif_lookup passes GFP_ATOMIC to > kmalloc. > > > [] udp_queue_rcv_skb+0xb8/0x280 (28) > > [] udp_rcv+0x192/0x3e0 (100) > > [] ip_local_deliver+0x64/0x1c0 (32) > > [] ip_rcv+0x215/0x3f0 (56) > > [] netif_receive_skb+0x12c/0x160 (40) > > [] process_backlog+0x7e/0x110 (32) > > [] net_rx_action+0x72/0x130 (24) > > [] ___do_softirq+0x48/0xd0 (40) > > [] _do_softirq+0x1b/0x30 (8) > > [] ksoftirqd+0xa0/0xf0 (28) > > [] kthread+0x8b/0xc0 (36) > > [] kernel_thread_helper+0x5/0x10 (537116692) > > --------------------------- > > | preempt count: 00000002 ] > > | 2-level deep critical section nesting: > > ---------------------------------------- > > .. [] .... __do_IRQ+0xef/0x180 > > .....[] .. ( <= do_IRQ+0x56/0xa0) > > .. [] .... print_traces+0x10/0x40 > > .....[] .. ( <= dump_stack+0x17/0x20) > > -- > Stephen Smalley > National Security Agency - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/