From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758705Ab2BJANM (ORCPT ); Thu, 9 Feb 2012 19:13:12 -0500 Received: from mail-pw0-f46.google.com ([209.85.160.46]:64094 "EHLO mail-pw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755400Ab2BJANK (ORCPT ); Thu, 9 Feb 2012 19:13:10 -0500 Message-ID: <4F346111.1040506@gmail.com> Date: Thu, 09 Feb 2012 17:13:05 -0700 From: David Ahern User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20120131 Thunderbird/10.0 MIME-Version: 1.0 To: Linus Torvalds CC: Ingo Molnar , Peter Zijlstra , Arnaldo Carvalho de Melo , Thomas Gleixner , "H. Peter Anvin" , Linux Kernel Mailing List , x86@kernel.org Subject: Re: Hmm.. WARN_ON_ONCE(cpuc->enabled) References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/09/2012 04:46 PM, Linus Torvalds wrote: > Ok, so I get the appended on my Core i5 when I did a "perf record -f > -e cycles:pp make -j" on the kernel build. > > What's up, guys? I haven't tried that particular perf run in a while, > so it might have been going on for quite some time. Perhaps already fixed by https://lkml.org/lkml/2012/2/4/42 It's not in your tree; but in tip/urgent. David > > Linus > > --- > > WARNING: at arch/x86/kernel/cpu/perf_event_intel_ds.c:442 > intel_pmu_pebs_enable+0x89/0xa0() > Hardware name: System Product Name > Pid: 12994, comm: perf Not tainted 3.3.0-rc3-00001-g690d137f448d #34 > Call Trace: > [] warn_slowpath_common+0x75/0xb0 > [] ? load_balance+0xc4/0x860 > [] warn_slowpath_null+0x15/0x20 > [] intel_pmu_pebs_enable+0x89/0xa0 > [] intel_pmu_enable_event+0xf4/0x190 > [] x86_pmu_start+0x83/0x110 > [] perf_adjust_freq_unthr_context+0x106/0x170 > [] perf_event_task_tick+0x200/0x2c0 > [] ? tick_nohz_handler+0xf0/0xf0 > [] scheduler_tick+0xc6/0x100 > [] update_process_times+0x69/0x80 > [] tick_sched_timer+0x5f/0xb0 > [] __run_hrtimer.clone.31+0x55/0x110 > [] hrtimer_interrupt+0xdf/0x210 > [] smp_apic_timer_interrupt+0x64/0xa0 > [] apic_timer_interrupt+0x6b/0x70 > [] ? find_get_page+0x6f/0xc0 > [] ? avtab_search_node+0x74/0x90 > [] ? mark_page_accessed+0x43/0x50 > [] cond_compute_av+0x2d/0xd0 > [] context_struct_compute_av+0x1f2/0x420 > [] ? __getblk+0x1f/0x280 > [] security_compute_av+0xf5/0x2c0 > [] avc_has_perm_noaudit+0xfc/0x3a0 > [] ? ll_rw_block+0x2c/0xb0 > [] avc_has_perm_flags+0x46/0xa0 > [] inode_has_perm.clone.39+0x21/0x30 > [] selinux_inode_permission+0xaa/0x100 > [] security_inode_permission+0x17/0x20 > [] inode_permission+0x40/0xd0 > [] link_path_walk+0x6f/0x8f0 > [] path_openat+0xb7/0x430 > [] do_filp_open+0x44/0xa0 > [] ? kmemdup+0x3e/0x50 > [] ? selinux_cred_prepare+0x1a/0x40 > [] open_exec+0x2d/0xf0 > [] do_execve_common.clone.36+0x1f1/0x430 > [] do_execve+0x16/0x20 > [] sys_execve+0x45/0x70 > [] stub_execve+0x6c/0xc0 > ---[ end trace 55816fcc72df1997 ]--- > ------------[ cut here ]------------ > WARNING: at arch/x86/kernel/cpu/perf_event_intel_lbr.c:75 > intel_pmu_lbr_enable+0x92/0xa0() > Hardware name: System Product Name > Pid: 12994, comm: perf Tainted: G W 3.3.0-rc3-00001-g690d137f448d #34 > Call Trace: > [] warn_slowpath_common+0x75/0xb0 > [] warn_slowpath_null+0x15/0x20 > [] intel_pmu_lbr_enable+0x92/0xa0 > [] intel_pmu_pebs_enable+0x68/0xa0 > [] intel_pmu_enable_event+0xf4/0x190 > [] x86_pmu_start+0x83/0x110 > [] perf_adjust_freq_unthr_context+0x106/0x170 > [] perf_event_task_tick+0x200/0x2c0 > [] ? tick_nohz_handler+0xf0/0xf0 > [] scheduler_tick+0xc6/0x100 > [] update_process_times+0x69/0x80 > [] tick_sched_timer+0x5f/0xb0 > [] __run_hrtimer.clone.31+0x55/0x110 > [] hrtimer_interrupt+0xdf/0x210 > [] smp_apic_timer_interrupt+0x64/0xa0 > [] apic_timer_interrupt+0x6b/0x70 > [] ? find_get_page+0x6f/0xc0 > [] ? avtab_search_node+0x74/0x90 > [] ? mark_page_accessed+0x43/0x50 > [] cond_compute_av+0x2d/0xd0 > [] context_struct_compute_av+0x1f2/0x420 > [] ? __getblk+0x1f/0x280 > [] security_compute_av+0xf5/0x2c0 > [] avc_has_perm_noaudit+0xfc/0x3a0 > [] ? ll_rw_block+0x2c/0xb0 > [] avc_has_perm_flags+0x46/0xa0 > [] inode_has_perm.clone.39+0x21/0x30 > [] selinux_inode_permission+0xaa/0x100 > [] security_inode_permission+0x17/0x20 > [] inode_permission+0x40/0xd0 > [] link_path_walk+0x6f/0x8f0 > [] path_openat+0xb7/0x430 > [] do_filp_open+0x44/0xa0 > [] ? kmemdup+0x3e/0x50 > [] ? selinux_cred_prepare+0x1a/0x40 > [] open_exec+0x2d/0xf0 > [] do_execve_common.clone.36+0x1f1/0x430 > [] do_execve+0x16/0x20 > [] sys_execve+0x45/0x70 > [] stub_execve+0x6c/0xc0 > ---[ end trace 55816fcc72df1998 ]--- > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/