git checkout 56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:56032fc504c9ce9dd6fd697e4687441a7d0ea4a2:bisect-usb 2014-03-09-17:53:06 56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 kernel: /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/vmlinuz-3.14.0-rc5-06721-g56032fc 2014-03-09-17:59:06 detecting boot state ......... 2 TEST FAILURE [ 1.479536] Kprobe smoke test started [ 1.507964] [ 1.508630] ====================================================== [ 1.509828] [ INFO: possible circular locking dependency detected ] [ 1.510808] 3.14.0-rc5-06721-g56032fc #1 Not tainted [ 1.510808] ------------------------------------------------------- [ 1.510808] kworker/1:1/25 is trying to acquire lock: [ 1.510808] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.510808] [ 1.510808] but task is already holding lock: [ 1.510808] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.510808] [ 1.510808] which lock already depends on the new lock. [ 1.510808] [ 1.510808] [ 1.510808] the existing dependency chain (in reverse order) is: [ 1.510808] -> #2 (module_mutex){+.+...}: [ 1.510808] [] __lock_acquire+0x907/0x9fb [ 1.510808] [] lock_acquire+0xa4/0xc4 [ 1.510808] [] mutex_lock_nested+0x65/0x34a [ 1.510808] [] module_alloc+0x42/0xb5 [ 1.510808] [] alloc_insn_page+0xe/0x10 [ 1.510808] [] __get_insn_slot+0xe0/0x165 [ 1.510808] [] arch_prepare_kprobe+0x36/0xb7 [ 1.510808] [] register_kprobe+0x330/0x490 [ 1.510808] [] init_test_probes+0x4e/0x489 [ 1.510808] [] init_kprobes+0x17b/0x189 [ 1.510808] [] do_one_initcall+0x9f/0x135 [ 1.510808] [] kernel_init_freeable+0x104/0x196 [ 1.510808] [] kernel_init+0x9/0xd5 [ 1.510808] [] ret_from_fork+0x7c/0xb0 [ 1.510808] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.510808] [] __lock_acquire+0x907/0x9fb [ 1.510808] [] lock_acquire+0xa4/0xc4 [ 1.510808] [] mutex_lock_nested+0x65/0x34a [ 1.510808] [] __get_insn_slot+0x1c/0x165 [ 1.510808] [] arch_prepare_kprobe+0x36/0xb7 [ 1.510808] [] register_kprobe+0x330/0x490 [ 1.510808] [] init_test_probes+0x4e/0x489 [ 1.510808] [] init_kprobes+0x17b/0x189 [ 1.510808] [] do_one_initcall+0x9f/0x135 [ 1.510808] [] kernel_init_freeable+0x104/0x196 [ 1.510808] [] kernel_init+0x9/0xd5 [ 1.510808] [] ret_from_fork+0x7c/0xb0 [ 1.510808] -> #0 (text_mutex){+.+.+.}: [ 1.510808] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.510808] [] __lock_acquire+0x907/0x9fb [ 1.510808] [] lock_acquire+0xa4/0xc4 [ 1.510808] [] mutex_lock_nested+0x65/0x34a [ 1.510808] [] kprobe_optimizer+0x121/0x23c [ 1.510808] [] process_one_work+0x237/0x3db [ 1.510808] [] worker_thread+0x1cb/0x2c4 [ 1.510808] [] kthread+0xf1/0xf9 [ 1.510808] [] ret_from_fork+0x7c/0xb0 [ 1.510808] [ 1.510808] other info that might help us debug this: [ 1.510808] [ 1.510808] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.510808] Possible unsafe locking scenario: [ 1.510808] [ 1.510808] CPU0 CPU1 [ 1.510808] ---- ---- [ 1.510808] lock(module_mutex); [ 1.510808] lock(kprobe_insn_slots.mutex); [ 1.510808] lock(module_mutex); [ 1.510808] lock(text_mutex); [ 1.510808] [ 1.510808] *** DEADLOCK *** [ 1.510808] [ 1.510808] 4 locks held by kworker/1:1/25: [ 1.510808] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.510808] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.510808] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.510808] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.510808] [ 1.510808] stack backtrace: [ 1.510808] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 3.14.0-rc5-06721-g56032fc #1 [ 1.510808] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.510808] Workqueue: events kprobe_optimizer [ 1.510808] 0000000000000000 ffff88000712fb60 ffffffff8cdb343d ffffffff8d866110 [ 1.510808] ffff88000712fba0 ffffffff8cdb01eb ffff880007130650 ffff8800071312f0 [ 1.510808] ffff880007130650 ffff8800071312f0 0000000000000004 ffff8800071312c8 [ 1.510808] Call Trace: [ 1.510808] [] dump_stack+0x4d/0x66 [ 1.510808] [] print_circular_bug+0x2b4/0x2c2 [ 1.510808] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.510808] [] __lock_acquire+0x907/0x9fb [ 1.510808] [] lock_acquire+0xa4/0xc4 [ 1.510808] [] ? kprobe_optimizer+0x121/0x23c [ 1.510808] [] mutex_lock_nested+0x65/0x34a [ 1.510808] [] ? kprobe_optimizer+0x121/0x23c [ 1.510808] [] ? trace_hardirqs_on+0xd/0xf [ 1.510808] [] kprobe_optimizer+0x121/0x23c [ 1.510808] [] process_one_work+0x237/0x3db [ 1.510808] [] ? process_one_work+0x1d1/0x3db [ 1.510808] [] worker_thread+0x1cb/0x2c4 [ 1.510808] [] ? rescuer_thread+0x29b/0x29b [ 1.510808] [] kthread+0xf1/0xf9 [ 1.510808] [] ? kthread_stop+0x5a/0x5a [ 1.510808] [] ret_from_fork+0x7c/0xb0 [ 1.510808] [] ? kthread_stop+0x5a/0x5a [ 1.673947] Kprobe smoke test passed successfully [ 1.675817] bounce pool size: 64 pages [ 1.676890] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/dmesg-quantal-inn-5:20140309180343:x86_64-randconfig-r5-03091328:: /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/dmesg-quantal-roam-46:20140309180342:x86_64-randconfig-r5-03091328:3.14.0-rc5-06721-g56032fc:1 /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/dmesg-quantal-snb-17:20140309180342:x86_64-randconfig-r5-03091328:: /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/dmesg-quantal-xian-16:20140309180346:x86_64-randconfig-r5-03091328:3.14.0-rc5-06721-g56032fc:1 /kernel/x86_64-randconfig-r5-03091328/56032fc504c9ce9dd6fd697e4687441a7d0ea4a2/dmesg-yocto-xian-1:20140309180347:x86_64-randconfig-r5-03091328:3.14.0-rc5-06721-g56032fc:1 2:5:5 all_good:bad:all_bad boots bisect: bad commit 56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 git checkout v3.13 ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:d8ec26d7f8287f5788a494f56e8814210f0e64be:bisect-usb 2014-03-09-18:04:16 d8ec26d7f8287f5788a494f56e8814210f0e64be compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d8ec26d7f8287f5788a494f56e8814210f0e64be Check for kernel in /kernel/x86_64-randconfig-r5-03091328/d8ec26d7f8287f5788a494f56e8814210f0e64be waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d8ec26d7f8287f5788a494f56e8814210f0e64be waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-d8ec26d7f8287f5788a494f56e8814210f0e64be kernel: /kernel/x86_64-randconfig-r5-03091328/d8ec26d7f8287f5788a494f56e8814210f0e64be/vmlinuz-3.13.0 2014-03-09-18:10:16 detecting boot state . 2 6 15 17 19 22. 25 SUCCESS bisect: good commit v3.13 git bisect start 56032fc504c9ce9dd6fd697e4687441a7d0ea4a2 v3.13 -- /c/kernel-tests/linear-bisect: ["-b", "56032fc504c9ce9dd6fd697e4687441a7d0ea4a2", "-g", "v3.13", "/c/kernel-tests/bisect-test-boot-failure.sh", "/home/wfg/usb/obj-bisect"] Bisecting: 19426 revisions left to test after this (roughly 15 steps) [7df4d0c9784117f7bbaec17e9ac7f6545049b56d] Merge tag 'spi-v3.14-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:7df4d0c9784117f7bbaec17e9ac7f6545049b56d:bisect-usb 2014-03-09-18:14:54 7df4d0c9784117f7bbaec17e9ac7f6545049b56d compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-7df4d0c9784117f7bbaec17e9ac7f6545049b56d Check for kernel in /kernel/x86_64-randconfig-r5-03091328/7df4d0c9784117f7bbaec17e9ac7f6545049b56d waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-7df4d0c9784117f7bbaec17e9ac7f6545049b56d waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-7df4d0c9784117f7bbaec17e9ac7f6545049b56d kernel: /kernel/x86_64-randconfig-r5-03091328/7df4d0c9784117f7bbaec17e9ac7f6545049b56d/vmlinuz-3.14.0-rc2-00256-g7df4d0c 2014-03-09-18:19:54 detecting boot state 1 4 6. 7 8. 9 12 15 17.... 18 22. 23.... 24 25 SUCCESS Bisecting: 7591 revisions left to test after this (roughly 13 steps) [b338b822eba2fdcbad7aa4149899fb734f9f16ec] Merge remote-tracking branch 'input-current/for-linus' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:b338b822eba2fdcbad7aa4149899fb734f9f16ec:bisect-usb 2014-03-09-18:32:27 b338b822eba2fdcbad7aa4149899fb734f9f16ec compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-b338b822eba2fdcbad7aa4149899fb734f9f16ec Check for kernel in /kernel/x86_64-randconfig-r5-03091328/b338b822eba2fdcbad7aa4149899fb734f9f16ec waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-b338b822eba2fdcbad7aa4149899fb734f9f16ec waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-b338b822eba2fdcbad7aa4149899fb734f9f16ec kernel: /kernel/x86_64-randconfig-r5-03091328/b338b822eba2fdcbad7aa4149899fb734f9f16ec/vmlinuz-3.14.0-rc5-00241-gb338b82 2014-03-09-18:42:27 detecting boot state . 2 4 9 23 25 SUCCESS Bisecting: 6480 revisions left to test after this (roughly 13 steps) [992670b5cd97fdc97e9fe15c3f8c16c218749c96] Merge remote-tracking branch 'net-next/master' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:992670b5cd97fdc97e9fe15c3f8c16c218749c96:bisect-usb 2014-03-09-18:45:30 992670b5cd97fdc97e9fe15c3f8c16c218749c96 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-992670b5cd97fdc97e9fe15c3f8c16c218749c96 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/992670b5cd97fdc97e9fe15c3f8c16c218749c96 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-992670b5cd97fdc97e9fe15c3f8c16c218749c96 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-992670b5cd97fdc97e9fe15c3f8c16c218749c96 kernel: /kernel/x86_64-randconfig-r5-03091328/992670b5cd97fdc97e9fe15c3f8c16c218749c96/vmlinuz-3.14.0-rc5-02877-g992670b 2014-03-09-18:53:31 detecting boot state .. 1 3 5 15. 19 24 25 SUCCESS Bisecting: 3844 revisions left to test after this (roughly 12 steps) [8b42ab5d6c5140cad34957a32fa6bdf43e7e0303] Merge remote-tracking branch 'spi/for-next' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:8b42ab5d6c5140cad34957a32fa6bdf43e7e0303:bisect-usb 2014-03-09-18:58:34 8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 kernel: /kernel/x86_64-randconfig-r5-03091328/8b42ab5d6c5140cad34957a32fa6bdf43e7e0303/vmlinuz-3.14.0-rc5-05068-g8b42ab5 2014-03-09-19:10:34 detecting boot state .. 3 8 11 14 17 25 SUCCESS Bisecting: 1653 revisions left to test after this (roughly 11 steps) [25ec37d3e3bf1f9efec6f05d79fd976bff4624cd] Merge remote-tracking branch 'staging/staging-next' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:25ec37d3e3bf1f9efec6f05d79fd976bff4624cd:bisect-usb 2014-03-09-19:14:37 25ec37d3e3bf1f9efec6f05d79fd976bff4624cd compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-25ec37d3e3bf1f9efec6f05d79fd976bff4624cd Check for kernel in /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-25ec37d3e3bf1f9efec6f05d79fd976bff4624cd waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-25ec37d3e3bf1f9efec6f05d79fd976bff4624cd kernel: /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/vmlinuz-3.14.0-rc5-06394-g25ec37d 2014-03-09-19:31:37 detecting boot state ... 2 TEST FAILURE [ 0.971514] Kprobe smoke test started [ 0.998923] [ 0.999562] ====================================================== [ 0.999840] [ INFO: possible circular locking dependency detected ] [ 0.999840] 3.14.0-rc5-06394-g25ec37d #1 Not tainted [ 0.999840] ------------------------------------------------------- [ 0.999840] kworker/0:1/24 is trying to acquire lock: [ 0.999840] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 0.999840] [ 0.999840] but task is already holding lock: [ 0.999840] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 0.999840] [ 0.999840] which lock already depends on the new lock. [ 0.999840] [ 0.999840] [ 0.999840] the existing dependency chain (in reverse order) is: [ 0.999840] -> #2 (module_mutex){+.+...}: [ 0.999840] [] __lock_acquire+0x907/0x9fb [ 0.999840] [] lock_acquire+0xa4/0xc4 [ 0.999840] [] mutex_lock_nested+0x65/0x34a [ 0.999840] [] module_alloc+0x42/0xb5 [ 0.999840] [] alloc_insn_page+0xe/0x10 [ 0.999840] [] __get_insn_slot+0xe0/0x165 [ 0.999840] [] arch_prepare_kprobe+0x36/0xb7 [ 0.999840] [] register_kprobe+0x330/0x490 [ 0.999840] [] init_test_probes+0x4e/0x489 [ 0.999840] [] init_kprobes+0x17b/0x189 [ 0.999840] [] do_one_initcall+0x9f/0x135 [ 0.999840] [] kernel_init_freeable+0x103/0x194 [ 0.999840] [] kernel_init+0x9/0xd5 [ 0.999840] [] ret_from_fork+0x7c/0xb0 [ 0.999840] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 0.999840] [] __lock_acquire+0x907/0x9fb [ 0.999840] [] lock_acquire+0xa4/0xc4 [ 0.999840] [] mutex_lock_nested+0x65/0x34a [ 0.999840] [] __get_insn_slot+0x1c/0x165 [ 0.999840] [] arch_prepare_kprobe+0x36/0xb7 [ 0.999840] [] register_kprobe+0x330/0x490 [ 0.999840] [] init_test_probes+0x4e/0x489 [ 0.999840] [] init_kprobes+0x17b/0x189 [ 0.999840] [] do_one_initcall+0x9f/0x135 [ 0.999840] [] kernel_init_freeable+0x103/0x194 [ 0.999840] [] kernel_init+0x9/0xd5 [ 0.999840] [] ret_from_fork+0x7c/0xb0 [ 0.999840] -> #0 (text_mutex){+.+.+.}: [ 0.999840] [] validate_chain.isra.20+0x8cf/0xf2e [ 0.999840] [] __lock_acquire+0x907/0x9fb [ 0.999840] [] lock_acquire+0xa4/0xc4 [ 0.999840] [] mutex_lock_nested+0x65/0x34a [ 0.999840] [] kprobe_optimizer+0x121/0x23c [ 0.999840] [] process_one_work+0x237/0x3db [ 0.999840] [] worker_thread+0x1cb/0x2c4 [ 0.999840] [] kthread+0xf1/0xf9 [ 0.999840] [] ret_from_fork+0x7c/0xb0 [ 0.999840] [ 0.999840] other info that might help us debug this: [ 0.999840] [ 0.999840] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 0.999840] Possible unsafe locking scenario: [ 0.999840] [ 0.999840] CPU0 CPU1 [ 0.999840] ---- ---- [ 0.999840] lock(module_mutex); [ 0.999840] lock(kprobe_insn_slots.mutex); [ 0.999840] lock(module_mutex); [ 0.999840] lock(text_mutex); [ 0.999840] [ 0.999840] *** DEADLOCK *** [ 0.999840] [ 0.999840] 4 locks held by kworker/0:1/24: [ 0.999840] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 0.999840] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 0.999840] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 0.999840] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 0.999840] [ 0.999840] stack backtrace: [ 0.999840] CPU: 0 PID: 24 Comm: kworker/0:1 Not tainted 3.14.0-rc5-06394-g25ec37d #1 [ 0.999840] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.999840] Workqueue: events kprobe_optimizer [ 0.999840] 0000000000000000 ffff8800123afb60 ffffffff8edb0126 ffffffff8f865110 [ 0.999840] ffff8800123afba0 ffffffff8edacedc ffff8800123b0610 ffff8800123b12b0 [ 0.999840] ffff8800123b0610 ffff8800123b12b0 0000000000000004 ffff8800123b1288 [ 0.999840] Call Trace: [ 0.999840] [] dump_stack+0x4d/0x66 [ 0.999840] [] print_circular_bug+0x2b4/0x2c2 [ 0.999840] [] validate_chain.isra.20+0x8cf/0xf2e [ 0.999840] [] __lock_acquire+0x907/0x9fb [ 0.999840] [] lock_acquire+0xa4/0xc4 [ 0.999840] [] ? kprobe_optimizer+0x121/0x23c [ 0.999840] [] mutex_lock_nested+0x65/0x34a [ 0.999840] [] ? kprobe_optimizer+0x121/0x23c [ 0.999840] [] ? trace_hardirqs_on+0xd/0xf [ 0.999840] [] kprobe_optimizer+0x121/0x23c [ 0.999840] [] process_one_work+0x237/0x3db [ 0.999840] [] ? process_one_work+0x1d1/0x3db [ 0.999840] [] worker_thread+0x1cb/0x2c4 [ 0.999840] [] ? rescuer_thread+0x29b/0x29b [ 0.999840] [] kthread+0xf1/0xf9 [ 0.999840] [] ? kthread_stop+0x5a/0x5a [ 0.999840] [] ret_from_fork+0x7c/0xb0 [ 0.999840] [] ? kthread_stop+0x5a/0x5a [ 1.104871] Kprobe smoke test passed successfully [ 1.106192] bounce pool size: 64 pages [ 1.106985] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-quantal-ivytown2-17:20140309193303:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-quantal-ivytown2-19:20140309193304:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-ivytown2-23:20140309193306:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-ivytown2-2:20140309193310:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-ivytown2-4:20140309193315:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-ivytown2-25:20140309193325:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-xgwo-6:20140309193324:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 /kernel/x86_64-randconfig-r5-03091328/25ec37d3e3bf1f9efec6f05d79fd976bff4624cd/dmesg-yocto-ivytown2-31:20140309193332:x86_64-randconfig-r5-03091328:3.14.0-rc5-06394-g25ec37d:1 2:8:8 all_good:bad:all_bad boots Bisecting: 1326 revisions left to test after this (roughly 11 steps) [d2d275f41085c59209725f813c243d318f185d36] Merge remote-tracking branch 'workqueues/for-next' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:d2d275f41085c59209725f813c243d318f185d36:bisect-usb 2014-03-09-19:33:40 d2d275f41085c59209725f813c243d318f185d36 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d2d275f41085c59209725f813c243d318f185d36 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/d2d275f41085c59209725f813c243d318f185d36 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d2d275f41085c59209725f813c243d318f185d36 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-d2d275f41085c59209725f813c243d318f185d36 kernel: /kernel/x86_64-randconfig-r5-03091328/d2d275f41085c59209725f813c243d318f185d36/vmlinuz-3.14.0-rc5-05479-gd2d275f 2014-03-09-19:54:40 detecting boot state .. TEST FAILURE [ 1.010056] Kprobe smoke test started [ 1.036640] [ 1.037088] ====================================================== [ 1.037581] [ INFO: possible circular locking dependency detected ] [ 1.037581] 3.14.0-rc5-05479-gd2d275f #1 Not tainted [ 1.037581] ------------------------------------------------------- [ 1.037581] kworker/0:1/24 is trying to acquire lock: [ 1.037581] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.037581] [ 1.037581] but task is already holding lock: [ 1.037581] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.037581] [ 1.037581] which lock already depends on the new lock. [ 1.037581] [ 1.037581] [ 1.037581] the existing dependency chain (in reverse order) is: [ 1.037581] -> #2 (module_mutex){+.+...}: [ 1.037581] [] __lock_acquire+0x907/0x9fb [ 1.037581] [] lock_acquire+0xa4/0xc4 [ 1.037581] [] mutex_lock_nested+0x65/0x34a [ 1.037581] [] module_alloc+0x42/0xb5 [ 1.037581] [] alloc_insn_page+0xe/0x10 [ 1.037581] [] __get_insn_slot+0xe0/0x165 [ 1.037581] [] arch_prepare_kprobe+0x36/0xb7 [ 1.037581] [] register_kprobe+0x330/0x490 [ 1.037581] [] init_test_probes+0x4e/0x489 [ 1.037581] [] init_kprobes+0x17b/0x189 [ 1.037581] [] do_one_initcall+0x9f/0x135 [ 1.037581] [] kernel_init_freeable+0x103/0x194 [ 1.037581] [] kernel_init+0x9/0xd5 [ 1.037581] [] ret_from_fork+0x7c/0xb0 [ 1.037581] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.037581] [] __lock_acquire+0x907/0x9fb [ 1.037581] [] lock_acquire+0xa4/0xc4 [ 1.037581] [] mutex_lock_nested+0x65/0x34a [ 1.037581] [] __get_insn_slot+0x1c/0x165 [ 1.037581] [] arch_prepare_kprobe+0x36/0xb7 [ 1.037581] [] register_kprobe+0x330/0x490 [ 1.037581] [] init_test_probes+0x4e/0x489 [ 1.037581] [] init_kprobes+0x17b/0x189 [ 1.037581] [] do_one_initcall+0x9f/0x135 [ 1.037581] [] kernel_init_freeable+0x103/0x194 [ 1.037581] [] kernel_init+0x9/0xd5 [ 1.037581] [] ret_from_fork+0x7c/0xb0 [ 1.037581] -> #0 (text_mutex){+.+.+.}: [ 1.037581] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.037581] [] __lock_acquire+0x907/0x9fb [ 1.037581] [] lock_acquire+0xa4/0xc4 [ 1.037581] [] mutex_lock_nested+0x65/0x34a [ 1.037581] [] kprobe_optimizer+0x121/0x23c [ 1.037581] [] process_one_work+0x237/0x3db [ 1.037581] [] worker_thread+0x1cb/0x2c4 [ 1.037581] [] kthread+0xf1/0xf9 [ 1.037581] [] ret_from_fork+0x7c/0xb0 [ 1.037581] [ 1.037581] other info that might help us debug this: [ 1.037581] [ 1.037581] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.037581] Possible unsafe locking scenario: [ 1.037581] [ 1.037581] CPU0 CPU1 [ 1.037581] ---- ---- [ 1.037581] lock(module_mutex); [ 1.037581] lock(kprobe_insn_slots.mutex); [ 1.037581] lock(module_mutex); [ 1.037581] lock(text_mutex); [ 1.037581] [ 1.037581] *** DEADLOCK *** [ 1.037581] [ 1.037581] 4 locks held by kworker/0:1/24: [ 1.037581] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.037581] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.037581] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.037581] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.037581] [ 1.037581] stack backtrace: [ 1.037581] CPU: 0 PID: 24 Comm: kworker/0:1 Not tainted 3.14.0-rc5-05479-gd2d275f #1 [ 1.037581] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.037581] Workqueue: events kprobe_optimizer [ 1.037581] 0000000000000000 ffff8800123afb60 ffffffff875af306 ffffffff88065110 [ 1.037581] ffff8800123afba0 ffffffff875ac0bc ffff8800123b0610 ffff8800123b12b0 [ 1.037581] ffff8800123b0610 ffff8800123b12b0 0000000000000004 ffff8800123b1288 [ 1.037581] Call Trace: [ 1.037581] [] dump_stack+0x4d/0x66 [ 1.037581] [] print_circular_bug+0x2b4/0x2c2 [ 1.037581] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.037581] [] __lock_acquire+0x907/0x9fb [ 1.037581] [] lock_acquire+0xa4/0xc4 [ 1.037581] [] ? kprobe_optimizer+0x121/0x23c [ 1.037581] [] mutex_lock_nested+0x65/0x34a [ 1.037581] [] ? kprobe_optimizer+0x121/0x23c [ 1.037581] [] ? trace_hardirqs_on+0xd/0xf [ 1.037581] [] kprobe_optimizer+0x121/0x23c [ 1.037581] [] process_one_work+0x237/0x3db [ 1.037581] [] ? process_one_work+0x1d1/0x3db [ 1.037581] [] worker_thread+0x1cb/0x2c4 [ 1.037581] [] ? rescuer_thread+0x29b/0x29b [ 1.037581] [] kthread+0xf1/0xf9 [ 1.037581] [] ? kthread_stop+0x5a/0x5a [ 1.037581] [] ret_from_fork+0x7c/0xb0 [ 1.037581] [] ? kthread_stop+0x5a/0x5a [ 1.142611] Kprobe smoke test passed successfully [ 1.143882] bounce pool size: 64 pages [ 1.144590] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/d2d275f41085c59209725f813c243d318f185d36/dmesg-quantal-ivytown2-25:20140309195523:x86_64-randconfig-r5-03091328:3.14.0-rc5-05479-gd2d275f:1 /kernel/x86_64-randconfig-r5-03091328/d2d275f41085c59209725f813c243d318f185d36/dmesg-yocto-ivytown2-18:20140309195534:x86_64-randconfig-r5-03091328:3.14.0-rc5-05479-gd2d275f:1 0:2:2 all_good:bad:all_bad boots Bisecting: 411 revisions left to test after this (roughly 9 steps) [e88f8465cfcce042e48ff38e796b64df973c7048] Merge remote-tracking branch 'ftrace/for-next' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:e88f8465cfcce042e48ff38e796b64df973c7048:bisect-usb 2014-03-09-19:55:43 e88f8465cfcce042e48ff38e796b64df973c7048 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-e88f8465cfcce042e48ff38e796b64df973c7048 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-e88f8465cfcce042e48ff38e796b64df973c7048 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-e88f8465cfcce042e48ff38e796b64df973c7048 kernel: /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048/vmlinuz-3.14.0-rc5-05424-ge88f846 2014-03-09-20:05:44 detecting boot state .... TEST FAILURE [ 1.663857] Kprobe smoke test started [ 1.689696] [ 1.690513] ====================================================== [ 1.690610] [ INFO: possible circular locking dependency detected ] [ 1.693307] 3.14.0-rc5-05424-ge88f846 #1 Not tainted [ 1.693307] ------------------------------------------------------- [ 1.693307] kworker/1:1/25 is trying to acquire lock: [ 1.693307] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.693307] [ 1.693307] but task is already holding lock: [ 1.693307] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.693307] [ 1.693307] which lock already depends on the new lock. [ 1.693307] [ 1.693307] [ 1.693307] the existing dependency chain (in reverse order) is: [ 1.693307] -> #2 (module_mutex){+.+...}: [ 1.693307] [] __lock_acquire+0x907/0x9fb [ 1.693307] [] lock_acquire+0xa4/0xc4 [ 1.693307] [] mutex_lock_nested+0x65/0x34a [ 1.693307] [] module_alloc+0x42/0xb5 [ 1.693307] [] alloc_insn_page+0xe/0x10 [ 1.693307] [] __get_insn_slot+0xe0/0x165 [ 1.693307] [] arch_prepare_kprobe+0x36/0xb7 [ 1.693307] [] register_kprobe+0x330/0x490 [ 1.693307] [] init_test_probes+0x4e/0x489 [ 1.693307] [] init_kprobes+0x17b/0x189 [ 1.693307] [] do_one_initcall+0x9f/0x135 [ 1.693307] [] kernel_init_freeable+0x103/0x194 [ 1.693307] [] kernel_init+0x9/0xd5 [ 1.693307] [] ret_from_fork+0x7c/0xb0 [ 1.693307] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.693307] [] __lock_acquire+0x907/0x9fb [ 1.693307] [] lock_acquire+0xa4/0xc4 [ 1.693307] [] mutex_lock_nested+0x65/0x34a [ 1.693307] [] __get_insn_slot+0x1c/0x165 [ 1.693307] [] arch_prepare_kprobe+0x36/0xb7 [ 1.693307] [] register_kprobe+0x330/0x490 [ 1.693307] [] init_test_probes+0x4e/0x489 [ 1.693307] [] init_kprobes+0x17b/0x189 [ 1.693307] [] do_one_initcall+0x9f/0x135 [ 1.693307] [] kernel_init_freeable+0x103/0x194 [ 1.693307] [] kernel_init+0x9/0xd5 [ 1.693307] [] ret_from_fork+0x7c/0xb0 [ 1.693307] -> #0 (text_mutex){+.+.+.}: [ 1.693307] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.693307] [] __lock_acquire+0x907/0x9fb [ 1.693307] [] lock_acquire+0xa4/0xc4 [ 1.693307] [] mutex_lock_nested+0x65/0x34a [ 1.693307] [] kprobe_optimizer+0x121/0x23c [ 1.693307] [] process_one_work+0x237/0x3db [ 1.693307] [] worker_thread+0x1cb/0x2c4 [ 1.693307] [] kthread+0xf1/0xf9 [ 1.693307] [] ret_from_fork+0x7c/0xb0 [ 1.693307] [ 1.693307] other info that might help us debug this: [ 1.693307] [ 1.693307] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.693307] Possible unsafe locking scenario: [ 1.693307] [ 1.693307] CPU0 CPU1 [ 1.693307] ---- ---- [ 1.693307] lock(module_mutex); [ 1.693307] lock(kprobe_insn_slots.mutex); [ 1.693307] lock(module_mutex); [ 1.693307] lock(text_mutex); [ 1.693307] [ 1.693307] *** DEADLOCK *** [ 1.693307] [ 1.693307] 4 locks held by kworker/1:1/25: [ 1.693307] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.693307] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.693307] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.693307] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.693307] [ 1.693307] stack backtrace: [ 1.693307] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 3.14.0-rc5-05424-ge88f846 #1 [ 1.693307] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.693307] Workqueue: events kprobe_optimizer [ 1.693307] 0000000000000000 ffff880008541b60 ffffffff861b0350 ffffffff86c650d0 [ 1.693307] ffff880008541ba0 ffffffff861ad106 ffff88000853c650 ffff88000853d2f0 [ 1.693307] ffff88000853c650 ffff88000853d2f0 0000000000000004 ffff88000853d2c8 [ 1.693307] Call Trace: [ 1.693307] [] dump_stack+0x4d/0x66 [ 1.693307] [] print_circular_bug+0x2b4/0x2c2 [ 1.693307] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.693307] [] __lock_acquire+0x907/0x9fb [ 1.693307] [] lock_acquire+0xa4/0xc4 [ 1.693307] [] ? kprobe_optimizer+0x121/0x23c [ 1.693307] [] mutex_lock_nested+0x65/0x34a [ 1.693307] [] ? kprobe_optimizer+0x121/0x23c [ 1.693307] [] ? trace_hardirqs_on+0xd/0xf [ 1.693307] [] kprobe_optimizer+0x121/0x23c [ 1.693307] [] process_one_work+0x237/0x3db [ 1.693307] [] ? process_one_work+0x1d1/0x3db [ 1.693307] [] worker_thread+0x1cb/0x2c4 [ 1.693307] [] ? rescuer_thread+0x29b/0x29b [ 1.693307] [] kthread+0xf1/0xf9 [ 1.693307] [] ? kthread_stop+0x5a/0x5a [ 1.693307] [] ret_from_fork+0x7c/0xb0 [ 1.693307] [] ? kthread_stop+0x5a/0x5a [ 1.850235] Kprobe smoke test passed successfully [ 1.852638] bounce pool size: 64 pages [ 1.853844] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048/dmesg-quantal-roam-43:20140309200719:x86_64-randconfig-r5-03091328:3.14.0-rc5-05424-ge88f846:1 /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048/dmesg-yocto-ivytown2-16:20140309200731:x86_64-randconfig-r5-03091328:3.14.0-rc5-05424-ge88f846:1 /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048/dmesg-yocto-ivytown2-3:20140309200733:x86_64-randconfig-r5-03091328:3.14.0-rc5-05424-ge88f846:1 /kernel/x86_64-randconfig-r5-03091328/e88f8465cfcce042e48ff38e796b64df973c7048/dmesg-yocto-ivytown2-10:20140309200737:x86_64-randconfig-r5-03091328:3.14.0-rc5-05424-ge88f846:1 0:4:4 all_good:bad:all_bad boots Bisecting: 356 revisions left to test after this (roughly 9 steps) [f4f48a2692f9de0d1ebbeee7ba192a99e86d1773] Merge remote-tracking branch 'tip/auto-latest' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:f4f48a2692f9de0d1ebbeee7ba192a99e86d1773:bisect-usb 2014-03-09-20:07:48 f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 kernel: /kernel/x86_64-randconfig-r5-03091328/f4f48a2692f9de0d1ebbeee7ba192a99e86d1773/vmlinuz-3.14.0-rc5-05390-gf4f48a2 2014-03-09-20:22:48 detecting boot state ... TEST FAILURE [ 1.108614] Kprobe smoke test started [ 1.136980] [ 1.137625] ====================================================== [ 1.138843] [ INFO: possible circular locking dependency detected ] [ 1.138843] 3.14.0-rc5-05390-gf4f48a2 #2 Not tainted [ 1.138843] ------------------------------------------------------- [ 1.138843] kworker/1:1/25 is trying to acquire lock: [ 1.143824] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.143824] [ 1.143824] but task is already holding lock: [ 1.143824] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.143824] [ 1.143824] which lock already depends on the new lock. [ 1.143824] [ 1.143824] [ 1.143824] the existing dependency chain (in reverse order) is: [ 1.143824] -> #2 (module_mutex){+.+...}: [ 1.143824] [] __lock_acquire+0x907/0x9fb [ 1.143824] [] lock_acquire+0xa4/0xc4 [ 1.143824] [] mutex_lock_nested+0x65/0x34a [ 1.143824] [] module_alloc+0x42/0xb5 [ 1.143824] [] alloc_insn_page+0xe/0x10 [ 1.143824] [] __get_insn_slot+0xe0/0x165 [ 1.143824] [] arch_prepare_kprobe+0x36/0xb7 [ 1.143824] [] register_kprobe+0x330/0x490 [ 1.143824] [] init_test_probes+0x4e/0x489 [ 1.143824] [] init_kprobes+0x17b/0x189 [ 1.143824] [] do_one_initcall+0x9f/0x135 [ 1.143824] [] kernel_init_freeable+0x103/0x194 [ 1.143824] [] kernel_init+0x9/0xd5 [ 1.143824] [] ret_from_fork+0x7c/0xb0 [ 1.143824] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.143824] [] __lock_acquire+0x907/0x9fb [ 1.143824] [] lock_acquire+0xa4/0xc4 [ 1.143824] [] mutex_lock_nested+0x65/0x34a [ 1.143824] [] __get_insn_slot+0x1c/0x165 [ 1.143824] [] arch_prepare_kprobe+0x36/0xb7 [ 1.143824] [] register_kprobe+0x330/0x490 [ 1.143824] [] init_test_probes+0x4e/0x489 [ 1.143824] [] init_kprobes+0x17b/0x189 [ 1.143824] [] do_one_initcall+0x9f/0x135 [ 1.143824] [] kernel_init_freeable+0x103/0x194 [ 1.143824] [] kernel_init+0x9/0xd5 [ 1.143824] [] ret_from_fork+0x7c/0xb0 [ 1.143824] -> #0 (text_mutex){+.+.+.}: [ 1.143824] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.143824] [] __lock_acquire+0x907/0x9fb [ 1.143824] [] lock_acquire+0xa4/0xc4 [ 1.143824] [] mutex_lock_nested+0x65/0x34a [ 1.143824] [] kprobe_optimizer+0x121/0x23c [ 1.143824] [] process_one_work+0x237/0x3db [ 1.143824] [] worker_thread+0x1cb/0x2c4 [ 1.143824] [] kthread+0xf1/0xf9 [ 1.143824] [] ret_from_fork+0x7c/0xb0 [ 1.143824] [ 1.143824] other info that might help us debug this: [ 1.143824] [ 1.143824] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.143824] Possible unsafe locking scenario: [ 1.143824] [ 1.143824] CPU0 CPU1 [ 1.143824] ---- ---- [ 1.143824] lock(module_mutex); [ 1.143824] lock(kprobe_insn_slots.mutex); [ 1.143824] lock(module_mutex); [ 1.143824] lock(text_mutex); [ 1.143824] [ 1.143824] *** DEADLOCK *** [ 1.143824] [ 1.143824] 4 locks held by kworker/1:1/25: [ 1.143824] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.143824] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.143824] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.143824] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.143824] [ 1.143824] stack backtrace: [ 1.143824] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 3.14.0-rc5-05390-gf4f48a2 #2 [ 1.143824] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.143824] Workqueue: events kprobe_optimizer [ 1.143824] 0000000000000000 ffff88000ad2fb60 ffffffff8b5b0350 ffffffff8c0650d0 [ 1.143824] ffff88000ad2fba0 ffffffff8b5ad106 ffff88000ad30650 ffff88000ad312f0 [ 1.143824] ffff88000ad30650 ffff88000ad312f0 0000000000000004 ffff88000ad312c8 [ 1.143824] Call Trace: [ 1.143824] [] dump_stack+0x4d/0x66 [ 1.143824] [] print_circular_bug+0x2b4/0x2c2 [ 1.143824] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.143824] [] __lock_acquire+0x907/0x9fb [ 1.143824] [] lock_acquire+0xa4/0xc4 [ 1.143824] [] ? kprobe_optimizer+0x121/0x23c [ 1.143824] [] mutex_lock_nested+0x65/0x34a [ 1.143824] [] ? kprobe_optimizer+0x121/0x23c [ 1.143824] [] ? trace_hardirqs_on+0xd/0xf [ 1.143824] [] kprobe_optimizer+0x121/0x23c [ 1.143824] [] process_one_work+0x237/0x3db [ 1.143824] [] ? process_one_work+0x1d1/0x3db [ 1.143824] [] worker_thread+0x1cb/0x2c4 [ 1.143824] [] ? rescuer_thread+0x29b/0x29b [ 1.143824] [] kthread+0xf1/0xf9 [ 1.143824] [] ? kthread_stop+0x5a/0x5a [ 1.143824] [] ret_from_fork+0x7c/0xb0 [ 1.143824] [] ? kthread_stop+0x5a/0x5a [ 1.298964] Kprobe smoke test passed successfully [ 1.300642] bounce pool size: 64 pages [ 1.301643] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/f4f48a2692f9de0d1ebbeee7ba192a99e86d1773/dmesg-quantal-ivytown2-28:20140309202349:x86_64-randconfig-r5-03091328:3.14.0-rc5-05390-gf4f48a2:2 /kernel/x86_64-randconfig-r5-03091328/f4f48a2692f9de0d1ebbeee7ba192a99e86d1773/dmesg-quantal-ivytown2-19:20140309202410:x86_64-randconfig-r5-03091328:3.14.0-rc5-05390-gf4f48a2:2 /kernel/x86_64-randconfig-r5-03091328/f4f48a2692f9de0d1ebbeee7ba192a99e86d1773/dmesg-quantal-ivytown2-20:20140309202407:x86_64-randconfig-r5-03091328:3.14.0-rc5-05390-gf4f48a2:2 3:3:1 all_good:bad:all_bad boots linear-bisect: bad branch may be remote-tracking branch 'tip/auto-latest' linear-bisect: handle over to git bisect linear-bisect: git bisect start f4f48a2692f9de0d1ebbeee7ba192a99e86d1773 8b42ab5d6c5140cad34957a32fa6bdf43e7e0303 -- Previous HEAD position was f4f48a2... Merge remote-tracking branch 'tip/auto-latest' HEAD is now at 6e46645... Linux 3.11 Bisecting: 143 revisions left to test after this (roughly 7 steps) [c149ec107189eeaa818dff7d97e6fe74b0d61bc2] Merge branch 'perf/core' linear-bisect: git bisect run /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:c149ec107189eeaa818dff7d97e6fe74b0d61bc2:bisect-usb 2014-03-09-20:24:44 c149ec107189eeaa818dff7d97e6fe74b0d61bc2 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-c149ec107189eeaa818dff7d97e6fe74b0d61bc2 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/c149ec107189eeaa818dff7d97e6fe74b0d61bc2 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-c149ec107189eeaa818dff7d97e6fe74b0d61bc2 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-c149ec107189eeaa818dff7d97e6fe74b0d61bc2 kernel: /kernel/x86_64-randconfig-r5-03091328/c149ec107189eeaa818dff7d97e6fe74b0d61bc2/vmlinuz-3.14.0-rc5-00188-gc149ec1 2014-03-09-20:37:44 detecting boot state ... 1 2 3 4 6 9 14 22 23...... 24.... 25 SUCCESS Bisecting: 66 revisions left to test after this (roughly 6 steps) [d27c8438eeedb6e1367b592c101e3c87cca0b50f] Merge branch 'timers/core' into sched/idle running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:d27c8438eeedb6e1367b592c101e3c87cca0b50f:bisect-usb 2014-03-09-20:49:45 d27c8438eeedb6e1367b592c101e3c87cca0b50f compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d27c8438eeedb6e1367b592c101e3c87cca0b50f Check for kernel in /kernel/x86_64-randconfig-r5-03091328/d27c8438eeedb6e1367b592c101e3c87cca0b50f waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d27c8438eeedb6e1367b592c101e3c87cca0b50f waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-d27c8438eeedb6e1367b592c101e3c87cca0b50f kernel: /kernel/x86_64-randconfig-r5-03091328/d27c8438eeedb6e1367b592c101e3c87cca0b50f/vmlinuz-3.14.0-rc3-00296-gd27c843 2014-03-09-21:08:46 detecting boot state . 3 6 7 8 9.. 10 17 19. 21. 22. 25 SUCCESS Bisecting: 30 revisions left to test after this (roughly 5 steps) [abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7] Merge branch 'x86/asmlinkage' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7:bisect-usb 2014-03-09-21:17:17 abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7 kernel: /kernel/x86_64-randconfig-r5-03091328/abb27428861a8e3fb90c063e2f2c3cdf8e20b1b7/vmlinuz-3.14.0-rc5-00305-gabb2742 2014-03-09-21:27:18 detecting boot state .. 2. 7 10 21 24 25 SUCCESS Bisecting: 14 revisions left to test after this (roughly 4 steps) [1a1985d4555edb30b8d807046c7c6f3ca9221217] Merge branch 'x86/mm' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:1a1985d4555edb30b8d807046c7c6f3ca9221217:bisect-usb 2014-03-09-21:31:49 1a1985d4555edb30b8d807046c7c6f3ca9221217 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-1a1985d4555edb30b8d807046c7c6f3ca9221217 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/1a1985d4555edb30b8d807046c7c6f3ca9221217 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-1a1985d4555edb30b8d807046c7c6f3ca9221217 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-1a1985d4555edb30b8d807046c7c6f3ca9221217 kernel: /kernel/x86_64-randconfig-r5-03091328/1a1985d4555edb30b8d807046c7c6f3ca9221217/vmlinuz-3.14.0-rc5-00321-g1a1985d 2014-03-09-21:39:49 detecting boot state .... TEST FAILURE [ 0.970829] Kprobe smoke test started [ 0.995067] [ 0.995479] ====================================================== [ 0.996012] [ INFO: possible circular locking dependency detected ] [ 0.996012] 3.14.0-rc5-00321-g1a1985d #1 Not tainted [ 0.996012] ------------------------------------------------------- [ 0.996012] kworker/0:1/24 is trying to acquire lock: [ 0.996012] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 0.996012] [ 0.996012] but task is already holding lock: [ 0.996012] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 0.996012] [ 0.996012] which lock already depends on the new lock. [ 0.996012] [ 0.996012] [ 0.996012] the existing dependency chain (in reverse order) is: [ 0.996012] -> #2 (module_mutex){+.+...}: [ 0.996012] [] __lock_acquire+0x907/0x9fb [ 0.996012] [] lock_acquire+0xa4/0xc4 [ 0.996012] [] mutex_lock_nested+0x65/0x34a [ 0.996012] [] module_alloc+0x42/0xb5 [ 0.996012] [] alloc_insn_page+0xe/0x10 [ 0.996012] [] __get_insn_slot+0xe0/0x165 [ 0.996012] [] arch_prepare_kprobe+0x36/0xb7 [ 0.996012] [] register_kprobe+0x330/0x490 [ 0.996012] [] init_test_probes+0x4e/0x489 [ 0.996012] [] init_kprobes+0x17b/0x189 [ 0.996012] [] do_one_initcall+0x9f/0x135 [ 0.996012] [] kernel_init_freeable+0x103/0x194 [ 0.996012] [] kernel_init+0x9/0xd5 [ 0.996012] [] ret_from_fork+0x7c/0xb0 [ 0.996012] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 0.996012] [] __lock_acquire+0x907/0x9fb [ 0.996012] [] lock_acquire+0xa4/0xc4 [ 0.996012] [] mutex_lock_nested+0x65/0x34a [ 0.996012] [] __get_insn_slot+0x1c/0x165 [ 0.996012] [] arch_prepare_kprobe+0x36/0xb7 [ 0.996012] [] register_kprobe+0x330/0x490 [ 0.996012] [] init_test_probes+0x4e/0x489 [ 0.996012] [] init_kprobes+0x17b/0x189 [ 0.996012] [] do_one_initcall+0x9f/0x135 [ 0.996012] [] kernel_init_freeable+0x103/0x194 [ 0.996012] [] kernel_init+0x9/0xd5 [ 0.996012] [] ret_from_fork+0x7c/0xb0 [ 0.996012] -> #0 (text_mutex){+.+.+.}: [ 0.996012] [] validate_chain.isra.20+0x8cf/0xf2e [ 0.996012] [] __lock_acquire+0x907/0x9fb [ 0.996012] [] lock_acquire+0xa4/0xc4 [ 0.996012] [] mutex_lock_nested+0x65/0x34a [ 0.996012] [] kprobe_optimizer+0x121/0x23c [ 0.996012] [] process_one_work+0x237/0x3db [ 0.996012] [] worker_thread+0x1cb/0x2c4 [ 0.996012] [] kthread+0xf1/0xf9 [ 0.996012] [] ret_from_fork+0x7c/0xb0 [ 0.996012] [ 0.996012] other info that might help us debug this: [ 0.996012] [ 0.996012] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 0.996012] Possible unsafe locking scenario: [ 0.996012] [ 0.996012] CPU0 CPU1 [ 0.996012] ---- ---- [ 0.996012] lock(module_mutex); [ 0.996012] lock(kprobe_insn_slots.mutex); [ 0.996012] lock(module_mutex); [ 0.996012] lock(text_mutex); [ 0.996012] [ 0.996012] *** DEADLOCK *** [ 0.996012] [ 0.996012] 4 locks held by kworker/0:1/24: [ 0.996012] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 0.996012] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 0.996012] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 0.996012] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 0.996012] [ 0.996012] stack backtrace: [ 0.996012] CPU: 0 PID: 24 Comm: kworker/0:1 Not tainted 3.14.0-rc5-00321-g1a1985d #1 [ 0.996012] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 0.996012] Workqueue: events kprobe_optimizer [ 0.996012] 0000000000000000 ffff8800123a5b60 ffffffff869a8c13 ffffffff874630d0 [ 0.996012] ffff8800123a5ba0 ffffffff869a59d6 ffff8800123a0610 ffff8800123a12b0 [ 0.996012] ffff8800123a0610 ffff8800123a12b0 0000000000000004 ffff8800123a1288 [ 0.996012] Call Trace: [ 0.996012] [] dump_stack+0x4d/0x66 [ 0.996012] [] print_circular_bug+0x2b4/0x2c2 [ 0.996012] [] validate_chain.isra.20+0x8cf/0xf2e [ 0.996012] [] __lock_acquire+0x907/0x9fb [ 0.996012] [] lock_acquire+0xa4/0xc4 [ 0.996012] [] ? kprobe_optimizer+0x121/0x23c [ 0.996012] [] mutex_lock_nested+0x65/0x34a [ 0.996012] [] ? kprobe_optimizer+0x121/0x23c [ 0.996012] [] ? trace_hardirqs_on+0xd/0xf [ 0.996012] [] kprobe_optimizer+0x121/0x23c [ 0.996012] [] process_one_work+0x237/0x3db [ 0.996012] [] ? process_one_work+0x1d1/0x3db [ 0.996012] [] worker_thread+0x1cb/0x2c4 [ 0.996012] [] ? rescuer_thread+0x29b/0x29b [ 0.996012] [] kthread+0xf1/0xf9 [ 0.996012] [] ? kthread_stop+0x5a/0x5a [ 0.996012] [] ret_from_fork+0x7c/0xb0 [ 0.996012] [] ? kthread_stop+0x5a/0x5a [ 1.096031] Kprobe smoke test passed successfully [ 1.097228] bounce pool size: 64 pages [ 1.097891] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/1a1985d4555edb30b8d807046c7c6f3ca9221217/dmesg-quantal-ivytown2-6:20140309214129:x86_64-randconfig-r5-03091328:3.14.0-rc5-00321-g1a1985d:1 0:1:1 all_good:bad:all_bad boots Bisecting: 6 revisions left to test after this (roughly 3 steps) [957d31ef264d0c8012dcb4a47543987bbdf2c184] Merge branch 'x86/cpu' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:957d31ef264d0c8012dcb4a47543987bbdf2c184:bisect-usb 2014-03-09-21:41:53 957d31ef264d0c8012dcb4a47543987bbdf2c184 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-957d31ef264d0c8012dcb4a47543987bbdf2c184 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/957d31ef264d0c8012dcb4a47543987bbdf2c184 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-957d31ef264d0c8012dcb4a47543987bbdf2c184 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-957d31ef264d0c8012dcb4a47543987bbdf2c184 kernel: /kernel/x86_64-randconfig-r5-03091328/957d31ef264d0c8012dcb4a47543987bbdf2c184/vmlinuz-3.14.0-rc5-00314-g957d31e 2014-03-09-21:46:53 detecting boot state .. 7 20. 24 25 SUCCESS Bisecting: 3 revisions left to test after this (roughly 2 steps) [ea4b5c80da79debb2d29e8c27a19a7579d2867c3] Merge branch 'x86/cpufeature' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:ea4b5c80da79debb2d29e8c27a19a7579d2867c3:bisect-usb 2014-03-09-21:50:24 ea4b5c80da79debb2d29e8c27a19a7579d2867c3 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-ea4b5c80da79debb2d29e8c27a19a7579d2867c3 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/ea4b5c80da79debb2d29e8c27a19a7579d2867c3 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-ea4b5c80da79debb2d29e8c27a19a7579d2867c3 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-ea4b5c80da79debb2d29e8c27a19a7579d2867c3 kernel: /kernel/x86_64-randconfig-r5-03091328/ea4b5c80da79debb2d29e8c27a19a7579d2867c3/vmlinuz-3.14.0-rc5-00317-gea4b5c8 2014-03-09-22:02:24 detecting boot state .. 2 3. 7 13 18 20 22.. 23. 25 SUCCESS Bisecting: 1 revision left to test after this (roughly 1 step) [d6e451515a6167b63e79612c7c107d0916d7f2b2] Merge branch 'x86/kaslr' running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:d6e451515a6167b63e79612c7c107d0916d7f2b2:bisect-usb 2014-03-09-22:09:56 d6e451515a6167b63e79612c7c107d0916d7f2b2 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d6e451515a6167b63e79612c7c107d0916d7f2b2 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/d6e451515a6167b63e79612c7c107d0916d7f2b2 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-d6e451515a6167b63e79612c7c107d0916d7f2b2 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-d6e451515a6167b63e79612c7c107d0916d7f2b2 kernel: /kernel/x86_64-randconfig-r5-03091328/d6e451515a6167b63e79612c7c107d0916d7f2b2/vmlinuz-3.14.0-rc5-00319-gd6e4515 2014-03-09-22:16:56 detecting boot state .. 1 TEST FAILURE [ 1.008058] Kprobe smoke test started [ 1.032979] [ 1.033603] ====================================================== [ 1.033910] [ INFO: possible circular locking dependency detected ] [ 1.035778] 3.14.0-rc5-00319-gd6e4515 #1 Not tainted [ 1.035778] ------------------------------------------------------- [ 1.035778] kworker/1:1/25 is trying to acquire lock: [ 1.035778] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.035778] [ 1.035778] but task is already holding lock: [ 1.035778] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.035778] [ 1.035778] which lock already depends on the new lock. [ 1.035778] [ 1.035778] [ 1.035778] the existing dependency chain (in reverse order) is: [ 1.035778] -> #2 (module_mutex){+.+...}: [ 1.035778] [] __lock_acquire+0x907/0x9fb [ 1.035778] [] lock_acquire+0xa4/0xc4 [ 1.035778] [] mutex_lock_nested+0x65/0x34a [ 1.035778] [] module_alloc+0x42/0xb5 [ 1.035778] [] alloc_insn_page+0xe/0x10 [ 1.035778] [] __get_insn_slot+0xe0/0x165 [ 1.035778] [] arch_prepare_kprobe+0x36/0xb7 [ 1.035778] [] register_kprobe+0x330/0x490 [ 1.035778] [] init_test_probes+0x4e/0x489 [ 1.035778] [] init_kprobes+0x17b/0x189 [ 1.035778] [] do_one_initcall+0x9f/0x135 [ 1.035778] [] kernel_init_freeable+0x103/0x194 [ 1.035778] [] kernel_init+0x9/0xd5 [ 1.035778] [] ret_from_fork+0x7c/0xb0 [ 1.035778] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.035778] [] __lock_acquire+0x907/0x9fb [ 1.035778] [] lock_acquire+0xa4/0xc4 [ 1.035778] [] mutex_lock_nested+0x65/0x34a [ 1.035778] [] __get_insn_slot+0x1c/0x165 [ 1.035778] [] arch_prepare_kprobe+0x36/0xb7 [ 1.035778] [] register_kprobe+0x330/0x490 [ 1.035778] [] init_test_probes+0x4e/0x489 [ 1.035778] [] init_kprobes+0x17b/0x189 [ 1.035778] [] do_one_initcall+0x9f/0x135 [ 1.035778] [] kernel_init_freeable+0x103/0x194 [ 1.035778] [] kernel_init+0x9/0xd5 [ 1.035778] [] ret_from_fork+0x7c/0xb0 [ 1.035778] -> #0 (text_mutex){+.+.+.}: [ 1.035778] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.035778] [] __lock_acquire+0x907/0x9fb [ 1.035778] [] lock_acquire+0xa4/0xc4 [ 1.035778] [] mutex_lock_nested+0x65/0x34a [ 1.035778] [] kprobe_optimizer+0x121/0x23c [ 1.035778] [] process_one_work+0x237/0x3db [ 1.035778] [] worker_thread+0x1cb/0x2c4 [ 1.035778] [] kthread+0xf1/0xf9 [ 1.035778] [] ret_from_fork+0x7c/0xb0 [ 1.035778] [ 1.035778] other info that might help us debug this: [ 1.035778] [ 1.035778] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.035778] Possible unsafe locking scenario: [ 1.035778] [ 1.035778] CPU0 CPU1 [ 1.035778] ---- ---- [ 1.035778] lock(module_mutex); [ 1.035778] lock(kprobe_insn_slots.mutex); [ 1.035778] lock(module_mutex); [ 1.035778] lock(text_mutex); [ 1.035778] [ 1.035778] *** DEADLOCK *** [ 1.035778] [ 1.035778] 4 locks held by kworker/1:1/25: [ 1.035778] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.035778] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.035778] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.035778] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.035778] [ 1.035778] stack backtrace: [ 1.035778] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 3.14.0-rc5-00319-gd6e4515 #1 [ 1.035778] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.035778] Workqueue: events kprobe_optimizer [ 1.035778] 0000000000000000 ffff88000c52fb60 ffffffff8ada8c13 ffffffff8b8630d0 [ 1.035778] ffff88000c52fba0 ffffffff8ada59d6 ffff88000c530650 ffff88000c5312f0 [ 1.035778] ffff88000c530650 ffff88000c5312f0 0000000000000004 ffff88000c5312c8 [ 1.035778] Call Trace: [ 1.035778] [] dump_stack+0x4d/0x66 [ 1.035778] [] print_circular_bug+0x2b4/0x2c2 [ 1.035778] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.035778] [] __lock_acquire+0x907/0x9fb [ 1.035778] [] lock_acquire+0xa4/0xc4 [ 1.035778] [] ? kprobe_optimizer+0x121/0x23c [ 1.035778] [] mutex_lock_nested+0x65/0x34a [ 1.035778] [] ? kprobe_optimizer+0x121/0x23c [ 1.035778] [] ? trace_hardirqs_on+0xd/0xf [ 1.035778] [] kprobe_optimizer+0x121/0x23c [ 1.035778] [] process_one_work+0x237/0x3db [ 1.035778] [] ? process_one_work+0x1d1/0x3db [ 1.035778] [] worker_thread+0x1cb/0x2c4 [ 1.035778] [] ? rescuer_thread+0x29b/0x29b [ 1.035778] [] kthread+0xf1/0xf9 [ 1.035778] [] ? kthread_stop+0x5a/0x5a [ 1.035778] [] ret_from_fork+0x7c/0xb0 [ 1.035778] [] ? kthread_stop+0x5a/0x5a [ 1.145924] Kprobe smoke test passed successfully [ 1.147265] bounce pool size: 64 pages [ 1.147936] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/d6e451515a6167b63e79612c7c107d0916d7f2b2/dmesg-quantal-ivytown2-4:20140309221805:x86_64-randconfig-r5-03091328:3.14.0-rc5-00319-gd6e4515:1 1:1:1 all_good:bad:all_bad boots 2014-03-09 22:18:27 REPEAT COUNT: 30 # /cc/wfg/usb-bisect/.repeat Bisecting: 0 revisions left to test after this (roughly 0 steps) [e2b32e6785138d92d2a40e0d0473575c8c7310a2] x86, kaslr: randomize module base load address running /c/kernel-tests/bisect-test-boot-failure.sh /home/wfg/usb/obj-bisect ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:e2b32e6785138d92d2a40e0d0473575c8c7310a2:bisect-usb 2014-03-09-22:18:28 e2b32e6785138d92d2a40e0d0473575c8c7310a2 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-e2b32e6785138d92d2a40e0d0473575c8c7310a2 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-e2b32e6785138d92d2a40e0d0473575c8c7310a2 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-e2b32e6785138d92d2a40e0d0473575c8c7310a2 kernel: /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2/vmlinuz-3.14.0-rc4-00001-ge2b32e6 2014-03-09-22:23:29 detecting boot state .... 1 TEST FAILURE [ 2.701512] Kprobe smoke test started [ 2.726822] [ 2.727526] ====================================================== [ 2.727774] [ INFO: possible circular locking dependency detected ] [ 2.727774] 3.14.0-rc4-00001-ge2b32e6 #1 Not tainted [ 2.727774] ------------------------------------------------------- [ 2.727774] kworker/1:1/25 is trying to acquire lock: [ 2.727774] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 2.727774] [ 2.727774] but task is already holding lock: [ 2.727774] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 2.727774] [ 2.727774] which lock already depends on the new lock. [ 2.727774] [ 2.727774] [ 2.727774] the existing dependency chain (in reverse order) is: [ 2.727774] -> #2 (module_mutex){+.+...}: [ 2.727774] [] lock_acquire+0xa4/0xc4 [ 2.727774] [] mutex_lock_nested+0x65/0x34a [ 2.727774] [] module_alloc+0x42/0xb5 [ 2.727774] [] alloc_insn_page+0xe/0x10 [ 2.727774] [] __get_insn_slot+0xe0/0x165 [ 2.727774] [] arch_prepare_kprobe+0x36/0xb7 [ 2.727774] [] register_kprobe+0x330/0x490 [ 2.727774] [] init_test_probes+0x4e/0x489 [ 2.727774] [] init_kprobes+0x17b/0x189 [ 2.727774] [] do_one_initcall+0x9f/0x135 [ 2.727774] [] kernel_init_freeable+0x103/0x194 [ 2.727774] [] kernel_init+0x9/0xd5 [ 2.727774] [] ret_from_fork+0x7c/0xb0 [ 2.727774] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 2.727774] [] lock_acquire+0xa4/0xc4 [ 2.727774] [] mutex_lock_nested+0x65/0x34a [ 2.727774] [] __get_insn_slot+0x1c/0x165 [ 2.727774] [] arch_prepare_kprobe+0x36/0xb7 [ 2.727774] [] register_kprobe+0x330/0x490 [ 2.727774] [] init_test_probes+0x4e/0x489 [ 2.727774] [] init_kprobes+0x17b/0x189 [ 2.727774] [] do_one_initcall+0x9f/0x135 [ 2.727774] [] kernel_init_freeable+0x103/0x194 [ 2.727774] [] kernel_init+0x9/0xd5 [ 2.727774] [] ret_from_fork+0x7c/0xb0 [ 2.727774] -> #0 (text_mutex){+.+.+.}: [ 2.727774] [] __lock_acquire+0x1197/0x1914 [ 2.727774] [] lock_acquire+0xa4/0xc4 [ 2.727774] [] mutex_lock_nested+0x65/0x34a [ 2.727774] [] kprobe_optimizer+0x121/0x23c [ 2.727774] [] process_one_work+0x237/0x3db [ 2.727774] [] worker_thread+0x1cb/0x2c4 [ 2.727774] [] kthread+0xf1/0xf9 [ 2.727774] [] ret_from_fork+0x7c/0xb0 [ 2.727774] [ 2.727774] other info that might help us debug this: [ 2.727774] [ 2.727774] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 2.727774] Possible unsafe locking scenario: [ 2.727774] [ 2.727774] CPU0 CPU1 [ 2.727774] ---- ---- [ 2.727774] lock(module_mutex); [ 2.727774] lock(kprobe_insn_slots.mutex); [ 2.727774] lock(module_mutex); [ 2.727774] lock(text_mutex); [ 2.727774] [ 2.727774] *** DEADLOCK *** [ 2.727774] [ 2.727774] 4 locks held by kworker/1:1/25: [ 2.727774] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 2.727774] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 2.727774] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 2.727774] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 2.727774] [ 2.727774] stack backtrace: [ 2.727774] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 3.14.0-rc4-00001-ge2b32e6 #1 [ 2.727774] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 2.727774] Workqueue: events kprobe_optimizer [ 2.727774] 0000000000000000 ffff88000d825bb0 ffffffff899a815c ffffffff8a4600d0 [ 2.727774] ffff88000d825bf0 ffffffff899a4f19 ffff88000d820650 ffff88000d8212f0 [ 2.727774] 0000000000000004 ffff88000d8212f0 ffff88000d820650 ffff88000d8212c8 [ 2.727774] Call Trace: [ 2.727774] [] dump_stack+0x4d/0x66 [ 2.727774] [] print_circular_bug+0x2b4/0x2c2 [ 2.727774] [] __lock_acquire+0x1197/0x1914 [ 2.727774] [] ? _raw_spin_unlock_irq+0x27/0x39 [ 2.727774] [] lock_acquire+0xa4/0xc4 [ 2.727774] [] ? kprobe_optimizer+0x121/0x23c [ 2.727774] [] mutex_lock_nested+0x65/0x34a [ 2.727774] [] ? kprobe_optimizer+0x121/0x23c [ 2.727774] [] ? trace_hardirqs_on+0xd/0xf [ 2.727774] [] kprobe_optimizer+0x121/0x23c [ 2.727774] [] process_one_work+0x237/0x3db [ 2.727774] [] ? process_one_work+0x1d1/0x3db [ 2.727774] [] worker_thread+0x1cb/0x2c4 [ 2.727774] [] ? rescuer_thread+0x29b/0x29b [ 2.727774] [] kthread+0xf1/0xf9 [ 2.727774] [] ? kthread_stop+0x5a/0x5a [ 2.727774] [] ret_from_fork+0x7c/0xb0 [ 2.727774] [] ? kthread_stop+0x5a/0x5a [ 2.896795] Kprobe smoke test passed successfully [ 2.930851] bounce pool size: 64 pages [ 2.939282] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2/dmesg-quantal-xgwo-4:20140309222533:x86_64-randconfig-r5-03091328:3.14.0-rc4-00001-ge2b32e6:1 /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2/dmesg-yocto-bens-5:20140309222528:x86_64-randconfig-r5-03091328:3.14.0-rc4-00001-ge2b32e6:1 /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2/dmesg-quantal-xps-7:20140309222540:x86_64-randconfig-r5-03091328:3.14.0-rc4-00001-ge2b32e6:1 /kernel/x86_64-randconfig-r5-03091328/e2b32e6785138d92d2a40e0d0473575c8c7310a2/dmesg-yocto-ivytown2-7:20140309222542:x86_64-randconfig-r5-03091328:3.14.0-rc4-00001-ge2b32e6:1 1:4:4 all_good:bad:all_bad boots e2b32e6785138d92d2a40e0d0473575c8c7310a2 is the first bad commit commit e2b32e6785138d92d2a40e0d0473575c8c7310a2 Author: Kees Cook Date: Tue Feb 25 16:59:17 2014 -0800 x86, kaslr: randomize module base load address Randomize the load address of modules in the kernel to make kASLR effective for modules. Modules can only be loaded within a particular range of virtual address space. This patch adds 10 bits of entropy to the load address by adding 1-1024 * PAGE_SIZE to the beginning range where modules are loaded. The single base offset was chosen because randomizing each module load ends up wasting/fragmenting memory too much. Prior approaches to minimizing fragmentation while doing randomization tend to result in worse entropy than just doing a single base address offset. Example kASLR boot without this change, with a single module loaded: ---[ Modules ]--- 0xffffffffc0000000-0xffffffffc0001000 4K ro GLB x pte 0xffffffffc0001000-0xffffffffc0002000 4K ro GLB NX pte 0xffffffffc0002000-0xffffffffc0004000 8K RW GLB NX pte 0xffffffffc0004000-0xffffffffc0200000 2032K pte 0xffffffffc0200000-0xffffffffff000000 1006M pmd ---[ End Modules ]--- Example kASLR boot after this change, same module loaded: ---[ Modules ]--- 0xffffffffc0000000-0xffffffffc0200000 2M pmd 0xffffffffc0200000-0xffffffffc03bf000 1788K pte 0xffffffffc03bf000-0xffffffffc03c0000 4K ro GLB x pte 0xffffffffc03c0000-0xffffffffc03c1000 4K ro GLB NX pte 0xffffffffc03c1000-0xffffffffc03c3000 8K RW GLB NX pte 0xffffffffc03c3000-0xffffffffc0400000 244K pte 0xffffffffc0400000-0xffffffffff000000 1004M pmd ---[ End Modules ]--- Signed-off-by: Andy Honig Link: http://lkml.kernel.org/r/20140226005916.GA27083@www.outflux.net Signed-off-by: Kees Cook Signed-off-by: H. Peter Anvin :040000 040000 98944d430f08498d4cac869ef41f93d16c69ebeb 9afe78a3624e435eeed00cbe7abdf939eedb7862 M Documentation :040000 040000 552e97ed2cac64e3ef3938d4d5a715f17a6f09f7 bde56d648f6c391f688ab1b07dc3a09f3e4cd6a0 M arch bisect run success ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:cfbf8d4857c26a8a307fb7cd258074c9dcd8c691:bisect-usb 2014-03-09-22:26:02 cfbf8d4857c26a8a307fb7cd258074c9dcd8c691 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-cfbf8d4857c26a8a307fb7cd258074c9dcd8c691 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/cfbf8d4857c26a8a307fb7cd258074c9dcd8c691 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-cfbf8d4857c26a8a307fb7cd258074c9dcd8c691 waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-cfbf8d4857c26a8a307fb7cd258074c9dcd8c691 kernel: /kernel/x86_64-randconfig-r5-03091328/cfbf8d4857c26a8a307fb7cd258074c9dcd8c691/vmlinuz-3.14.0-rc4 2014-03-09-22:29:02 detecting boot state . 1 7 10 12 13 14.. 18 21 27 30 33 38 46 48. 51 53 54 55... 57 59 64 65 66 67 68 75 80 82 86 89.............. 90 SUCCESS ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:1b0a7e3263168a06d3858798e48c5a21d1c78d3c:bisect-usb TEST FAILURE [ 1.698116] Kprobe smoke test started [ 1.726835] [ 1.727599] ====================================================== [ 1.727633] [ INFO: possible circular locking dependency detected ] [ 1.727633] 3.14.0-rc5-next-20140307-07129-g1b0a7e3 #1 Not tainted [ 1.727633] ------------------------------------------------------- [ 1.727633] kworker/0:0/4 is trying to acquire lock: [ 1.727633] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.727633] [ 1.727633] but task is already holding lock: [ 1.727633] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.727633] [ 1.727633] which lock already depends on the new lock. [ 1.727633] [ 1.727633] [ 1.727633] the existing dependency chain (in reverse order) is: [ 1.727633] -> #2 (module_mutex){+.+...}: [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] module_alloc+0x42/0xb5 [ 1.727633] [] alloc_insn_page+0xe/0x10 [ 1.727633] [] __get_insn_slot+0xe0/0x165 [ 1.727633] [] arch_prepare_kprobe+0x36/0xb7 [ 1.727633] [] register_kprobe+0x330/0x490 [ 1.727633] [] init_test_probes+0x4e/0x489 [ 1.727633] [] init_kprobes+0x17b/0x189 [ 1.727633] [] do_one_initcall+0x9f/0x135 [ 1.727633] [] kernel_init_freeable+0x104/0x196 [ 1.727633] [] kernel_init+0x9/0xd5 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] __get_insn_slot+0x1c/0x165 [ 1.727633] [] arch_prepare_kprobe+0x36/0xb7 [ 1.727633] [] register_kprobe+0x330/0x490 [ 1.727633] [] init_test_probes+0x4e/0x489 [ 1.727633] [] init_kprobes+0x17b/0x189 [ 1.727633] [] do_one_initcall+0x9f/0x135 [ 1.727633] [] kernel_init_freeable+0x104/0x196 [ 1.727633] [] kernel_init+0x9/0xd5 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] -> #0 (text_mutex){+.+.+.}: [ 1.727633] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] kprobe_optimizer+0x121/0x23c [ 1.727633] [] process_one_work+0x237/0x3db [ 1.727633] [] worker_thread+0x1cb/0x2c4 [ 1.727633] [] kthread+0xf1/0xf9 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] [ 1.727633] other info that might help us debug this: [ 1.727633] [ 1.727633] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.727633] Possible unsafe locking scenario: [ 1.727633] [ 1.727633] CPU0 CPU1 [ 1.727633] ---- ---- [ 1.727633] lock(module_mutex); [ 1.727633] lock(kprobe_insn_slots.mutex); [ 1.727633] lock(module_mutex); [ 1.727633] lock(text_mutex); [ 1.727633] [ 1.727633] *** DEADLOCK *** [ 1.727633] [ 1.727633] 4 locks held by kworker/0:0/4: [ 1.727633] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.727633] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.727633] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.727633] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.727633] [ 1.727633] stack backtrace: [ 1.727633] CPU: 0 PID: 4 Comm: kworker/0:0 Not tainted 3.14.0-rc5-next-20140307-07129-g1b0a7e3 #1 [ 1.727633] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.727633] Workqueue: events kprobe_optimizer [ 1.727633] 0000000000000000 ffff88000c8e7b60 ffffffff8d1b5b1d ffffffff8dc69110 [ 1.727633] ffff88000c8e7ba0 ffffffff8d1b2850 ffff88000c8e80d0 ffff88000c8e8d98 [ 1.727633] ffff88000c8e80d0 ffff88000c8e8d98 0000000000000004 ffff88000c8e8d70 [ 1.727633] Call Trace: [ 1.727633] [] dump_stack+0x4d/0x66 [ 1.727633] [] print_circular_bug+0x2b4/0x2c2 [ 1.727633] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] ? kprobe_optimizer+0x121/0x23c [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] ? kprobe_optimizer+0x121/0x23c [ 1.727633] [] ? trace_hardirqs_on+0xd/0xf [ 1.727633] [] kprobe_optimizer+0x121/0x23c [ 1.727633] [] process_one_work+0x237/0x3db [ 1.727633] [] ? process_one_work+0x1d1/0x3db [ 1.727633] [] ? __mutex_unlock_slowpath+0xa1/0x148 [ 1.727633] [] worker_thread+0x1cb/0x2c4 [ 1.727633] [] ? rescuer_thread+0x29b/0x29b [ 1.727633] [] kthread+0xf1/0xf9 [ 1.727633] [] ? kthread_stop+0x5a/0x5a [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] [] ? kthread_stop+0x5a/0x5a [ 1.914644] Kprobe smoke test passed successfully [ 1.916870] bounce pool size: 64 pages [ 1.918122] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-24:20140309134424:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-ivytown2-11:20140309134424:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-nhm4-2:20140309175203:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-12:20140309175259:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-snb-36:20140309175306:x86_64-randconfig-r5-03091328:: /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-2:20140309175134:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-30:20140309134411:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-xgwo-3:20140309134401:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-ivytown2-16:20140309134357:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-athens-37:20140309175145:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-xgwo-4:20140309134411:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-stoakley-4:20140309175138:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-3:20140309134413:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 5:13:14 all_good:bad:all_bad boots [detached HEAD 8610105] Revert "x86, kaslr: randomize module base load address" 2 files changed, 5 insertions(+), 42 deletions(-) ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:8610105af3f78a6e86eaee110230606080561af9:bisect-usb 2014-03-09-22:55:13 8610105af3f78a6e86eaee110230606080561af9 compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-8610105af3f78a6e86eaee110230606080561af9 Check for kernel in /kernel/x86_64-randconfig-r5-03091328/8610105af3f78a6e86eaee110230606080561af9 waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-8610105af3f78a6e86eaee110230606080561af9 kernel: /kernel/x86_64-randconfig-r5-03092242/9ddedc0d5dc3b1d5953e48572f4d5fa5b8456ae0/vmlinuz-3.14.0-rc5-wl-ath-02274-g9ddedc0 status: FAIL: no commit 8610105af3f78a6e86eaee110230606080561af9 for build task x86_64-randconfig-r5-03091328-8610105af3f78a6e86eaee110230606080561af9 2014-03-09-22:59:13 8610105af3f78a6e86eaee110230606080561af9 SKIP BROKEN BUILD No kernel in /kernel/x86_64-randconfig-r5-03091328/8610105af3f78a6e86eaee110230606080561af9 ========= upstream ========= Warning: you are leaving 1 commit behind, not connected to any of your branches: 8610105 Revert "x86, kaslr: randomize module base load address" If you want to keep them by creating a new branch, this may be a good time to do so with: git branch new_branch_name 8610105 HEAD is now at ca62eec... Merge branch 'for-3.14-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:ca62eec4e524591b82d9edf7a18e3ae6b691517d:bisect-usb 2014-03-09-22:59:16 ca62eec4e524591b82d9edf7a18e3ae6b691517d compiling Queued build task to /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-ca62eec4e524591b82d9edf7a18e3ae6b691517d Check for kernel in /kernel/x86_64-randconfig-r5-03091328/ca62eec4e524591b82d9edf7a18e3ae6b691517d waiting for completion of /kernel-tests/build-queue/x86_64-randconfig-r5-03091328-ca62eec4e524591b82d9edf7a18e3ae6b691517d waiting for completion of /kernel-tests/build-queue/.x86_64-randconfig-r5-03091328-ca62eec4e524591b82d9edf7a18e3ae6b691517d kernel: /kernel/x86_64-randconfig-r5-03091328/ca62eec4e524591b82d9edf7a18e3ae6b691517d/vmlinuz-3.14.0-rc5-00287-gca62eec 2014-03-09-23:05:16 detecting boot state ... 4 7 8 9 13 14.. 16 17.. 21 23.. 24 31 37 43 44 46 47. 49.. 50 53 61 66 67. 69.... 70. 72 74 77... 78 79... 82 83..... 85. 86 87. 88 89 90 SUCCESS ========= linux-next ========= Previous HEAD position was ca62eec... Merge branch 'for-3.14-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup HEAD is now at 1b0a7e3... Add linux-next specific files for 20140307 ls -a /kernel-tests/run-queue/kvm/x86_64-randconfig-r5-03091328/next:master:1b0a7e3263168a06d3858798e48c5a21d1c78d3c:bisect-usb TEST FAILURE [ 1.698116] Kprobe smoke test started [ 1.726835] [ 1.727599] ====================================================== [ 1.727633] [ INFO: possible circular locking dependency detected ] [ 1.727633] 3.14.0-rc5-next-20140307-07129-g1b0a7e3 #1 Not tainted [ 1.727633] ------------------------------------------------------- [ 1.727633] kworker/0:0/4 is trying to acquire lock: [ 1.727633] (text_mutex){+.+.+.}, at: [] kprobe_optimizer+0x121/0x23c [ 1.727633] [ 1.727633] but task is already holding lock: [ 1.727633] (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.727633] [ 1.727633] which lock already depends on the new lock. [ 1.727633] [ 1.727633] [ 1.727633] the existing dependency chain (in reverse order) is: [ 1.727633] -> #2 (module_mutex){+.+...}: [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] module_alloc+0x42/0xb5 [ 1.727633] [] alloc_insn_page+0xe/0x10 [ 1.727633] [] __get_insn_slot+0xe0/0x165 [ 1.727633] [] arch_prepare_kprobe+0x36/0xb7 [ 1.727633] [] register_kprobe+0x330/0x490 [ 1.727633] [] init_test_probes+0x4e/0x489 [ 1.727633] [] init_kprobes+0x17b/0x189 [ 1.727633] [] do_one_initcall+0x9f/0x135 [ 1.727633] [] kernel_init_freeable+0x104/0x196 [ 1.727633] [] kernel_init+0x9/0xd5 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] -> #1 (kprobe_insn_slots.mutex){+.+.+.}: [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] __get_insn_slot+0x1c/0x165 [ 1.727633] [] arch_prepare_kprobe+0x36/0xb7 [ 1.727633] [] register_kprobe+0x330/0x490 [ 1.727633] [] init_test_probes+0x4e/0x489 [ 1.727633] [] init_kprobes+0x17b/0x189 [ 1.727633] [] do_one_initcall+0x9f/0x135 [ 1.727633] [] kernel_init_freeable+0x104/0x196 [ 1.727633] [] kernel_init+0x9/0xd5 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] -> #0 (text_mutex){+.+.+.}: [ 1.727633] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] kprobe_optimizer+0x121/0x23c [ 1.727633] [] process_one_work+0x237/0x3db [ 1.727633] [] worker_thread+0x1cb/0x2c4 [ 1.727633] [] kthread+0xf1/0xf9 [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] [ 1.727633] other info that might help us debug this: [ 1.727633] [ 1.727633] Chain exists of: text_mutex --> kprobe_insn_slots.mutex --> module_mutex [ 1.727633] Possible unsafe locking scenario: [ 1.727633] [ 1.727633] CPU0 CPU1 [ 1.727633] ---- ---- [ 1.727633] lock(module_mutex); [ 1.727633] lock(kprobe_insn_slots.mutex); [ 1.727633] lock(module_mutex); [ 1.727633] lock(text_mutex); [ 1.727633] [ 1.727633] *** DEADLOCK *** [ 1.727633] [ 1.727633] 4 locks held by kworker/0:0/4: [ 1.727633] #0: ("events"){.+.+..}, at: [] process_one_work+0x1d1/0x3db [ 1.727633] #1: ((optimizing_work).work){+.+...}, at: [] process_one_work+0x1d1/0x3db [ 1.727633] #2: (kprobe_mutex){+.+.+.}, at: [] kprobe_optimizer+0x17/0x23c [ 1.727633] #3: (module_mutex){+.+...}, at: [] kprobe_optimizer+0x25/0x23c [ 1.727633] [ 1.727633] stack backtrace: [ 1.727633] CPU: 0 PID: 4 Comm: kworker/0:0 Not tainted 3.14.0-rc5-next-20140307-07129-g1b0a7e3 #1 [ 1.727633] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1.727633] Workqueue: events kprobe_optimizer [ 1.727633] 0000000000000000 ffff88000c8e7b60 ffffffff8d1b5b1d ffffffff8dc69110 [ 1.727633] ffff88000c8e7ba0 ffffffff8d1b2850 ffff88000c8e80d0 ffff88000c8e8d98 [ 1.727633] ffff88000c8e80d0 ffff88000c8e8d98 0000000000000004 ffff88000c8e8d70 [ 1.727633] Call Trace: [ 1.727633] [] dump_stack+0x4d/0x66 [ 1.727633] [] print_circular_bug+0x2b4/0x2c2 [ 1.727633] [] validate_chain.isra.20+0x8cf/0xf2e [ 1.727633] [] __lock_acquire+0x910/0xa03 [ 1.727633] [] lock_acquire+0xa4/0xc4 [ 1.727633] [] ? kprobe_optimizer+0x121/0x23c [ 1.727633] [] mutex_lock_nested+0x65/0x34a [ 1.727633] [] ? kprobe_optimizer+0x121/0x23c [ 1.727633] [] ? trace_hardirqs_on+0xd/0xf [ 1.727633] [] kprobe_optimizer+0x121/0x23c [ 1.727633] [] process_one_work+0x237/0x3db [ 1.727633] [] ? process_one_work+0x1d1/0x3db [ 1.727633] [] ? __mutex_unlock_slowpath+0xa1/0x148 [ 1.727633] [] worker_thread+0x1cb/0x2c4 [ 1.727633] [] ? rescuer_thread+0x29b/0x29b [ 1.727633] [] kthread+0xf1/0xf9 [ 1.727633] [] ? kthread_stop+0x5a/0x5a [ 1.727633] [] ret_from_fork+0x7c/0xb0 [ 1.727633] [] ? kthread_stop+0x5a/0x5a [ 1.914644] Kprobe smoke test passed successfully [ 1.916870] bounce pool size: 64 pages [ 1.918122] HugeTLB registered 2 MB page size, pre-allocated 0 pages /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-24:20140309134424:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-ivytown2-11:20140309134424:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-nhm4-2:20140309175203:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-12:20140309175259:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-snb-36:20140309175306:x86_64-randconfig-r5-03091328:: /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-2:20140309175134:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-30:20140309134411:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-xgwo-3:20140309134401:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-ivytown2-16:20140309134357:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-athens-37:20140309175145:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-xgwo-4:20140309134411:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-quantal-stoakley-4:20140309175138:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 /kernel/x86_64-randconfig-r5-03091328/1b0a7e3263168a06d3858798e48c5a21d1c78d3c/dmesg-yocto-ivytown2-3:20140309134413:x86_64-randconfig-r5-03091328:3.14.0-rc5-next-20140307-07129-g1b0a7e3:1 5:13:14 all_good:bad:all_bad boots