May or may not be related to the BUG I just reported - the first hit on that one was right after this in the log....
[ 2.740391] =============================== [ 2.740433] suspicious RCU usage. ] [ 2.740463] 4.9.0-rc7-next-20161129-dirty #361 Not tainted [ 2.740464] ------------------------------- [ 2.740499] kernel/sched/core.c:7747 Illegal context switch in RCU-bh read-side critical section! [ 2.740567] other info that might help us debug this: [ 2.740628] rcu_scheduler_active = 1, debug_locks = 1 [ 2.740679] 3 locks held by systemd/1: [ 2.740680] #0: [ 2.740681] ( [ 2.740682] rtnl_mutex [ 2.740683] ){+.+.+.} [ 2.740684] , at: [ 2.740689] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40 [ 2.740690] #1: [ 2.740691] ( [ 2.740692] rcu_read_lock_bh [ 2.740693] ){......} [ 2.740694] , at: [ 2.740698] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0 [ 2.740699] #2: [ 2.740700] ( [ 2.740701] addrconf_hash_lock [ 2.740702] ){+.....} [ 2.740702] , at: [ 2.740705] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0 [ 2.740706] stack backtrace: [ 2.740708] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361 [ 2.740709] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015 [ 2.740711] Call Trace: [ 2.740716] dump_stack+0x7b/0xd1 [ 2.740719] lockdep_rcu_suspicious+0xc5/0x100 [ 2.740722] ___might_sleep+0x240/0x300 [ 2.740725] __alloc_pages_nodemask+0x13f/0x730 [ 2.740729] cache_alloc_refill+0x184/0x12e0 [ 2.740732] kmem_cache_alloc+0xef/0x4f0 [ 2.740734] dst_alloc+0x5f/0xf0 [ 2.740739] __ip6_dst_alloc+0x36/0xd0 [ 2.740744] ip6_dst_alloc+0x19/0x150 [ 2.740748] addrconf_dst_alloc+0x78/0x1c0 [ 2.740753] ipv6_add_addr+0x2d9/0xab0 [ 2.740757] ? ipv6_add_addr+0x9f/0xab0 [ 2.740762] ? trace_hardirqs_on_caller+0x1ab/0x2c0 [ 2.740767] add_addr+0x36/0x110 [ 2.740772] addrconf_notify+0x8c4/0x1230 [ 2.740776] ? fib_add_ifaddr+0x110/0x1b0 [ 2.740780] raw_notifier_call_chain+0x66/0xd0 [ 2.740784] call_netdevice_notifiers_info+0x73/0x90 [ 2.740787] __dev_notify_flags+0x8f/0xf0 [ 2.740790] ? __dev_change_flags+0xc3/0x1b0 [ 2.740792] dev_change_flags+0x62/0x90 [ 2.740795] do_setlink+0x3b5/0x1860 [ 2.740799] ? avc_has_perm_noaudit+0x1d9/0x330 [ 2.740801] ? preempt_count_sub+0x4a/0x90 [ 2.740805] ? avc_has_perm_noaudit+0x59/0x330 [ 2.740808] ? nla_parse+0x143/0x1c0 [ 2.740811] rtnl_setlink+0x118/0x1a0 [ 2.740816] ? do_setlink+0x1860/0x1860 [ 2.740819] rtnetlink_rcv_msg+0xfa/0x630 [ 2.740822] ? mutex_lock_nested+0x109/0x9f0 [ 2.740824] ? rtnetlink_rcv+0x1b/0x40 [ 2.740827] ? netlink_deliver_tap+0x5/0x4e0 [ 2.740830] ? rtnl_newlink+0xbe0/0xbe0 [ 2.740832] netlink_rcv_skb+0x87/0xc0 [ 2.740834] rtnetlink_rcv+0x2a/0x40 [ 2.740836] netlink_unicast+0x1e7/0x300 [ 2.740839] netlink_sendmsg+0x402/0x670 [ 2.740842] sock_sendmsg+0x5b/0xd0 [ 2.740845] SYSC_sendto+0x156/0x1f0 [ 2.740848] ? netlink_getsockopt+0x2f9/0x3d0 [ 2.740850] ? entry_SYSCALL_64_fastpath+0x5/0xad [ 2.740853] ? trace_hardirqs_on_caller+0x1ab/0x2c0 [ 2.740856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2.740859] SyS_sendto+0xe/0x10 [ 2.740864] entry_SYSCALL_64_fastpath+0x18/0xad [ 2.740866] RIP: 0033:0x7fc497fffa73 [ 2.740985] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2.740987] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73 [ 2.740989] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004 [ 2.740990] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010 [ 2.740992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8 [ 2.740993] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3 [ 2.740996] BUG: sleeping function called from invalid context at mm/page_alloc.c:3775 [ 2.741062] in_atomic(): 1, irqs_disabled(): 1, pid: 1, name: systemd [ 2.741112] 3 locks held by systemd/1: [ 2.741113] #0: [ 2.741114] ( [ 2.741115] rtnl_mutex [ 2.741116] ){+.+.+.} [ 2.741117] , at: [ 2.741119] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40 [ 2.741120] #1: [ 2.741121] ( [ 2.741122] rcu_read_lock_bh [ 2.741123] ){......} [ 2.741123] , at: [ 2.741126] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0 [ 2.741127] #2: [ 2.741128] ( [ 2.741129] addrconf_hash_lock [ 2.741130] ){+.....} [ 2.741131] , at: [ 2.741133] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0 [ 2.741134] irq event stamp: 1862459 [ 2.741135] hardirqs last enabled at (1862458): [ 2.741137] [<ffffffffa939ec13>] kmem_cache_alloc_trace+0x2d3/0x4f0 [ 2.741138] hardirqs last disabled at (1862459): [ 2.741140] [<ffffffffa939e4dc>] kmem_cache_alloc+0x8c/0x4f0 [ 2.741141] softirqs last enabled at (1862454): [ 2.741144] [<ffffffffa9ee667b>] ipv6_mc_up+0x5b/0x80 [ 2.741145] softirqs last disabled at (1862456): [ 2.741147] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0 [ 2.741149] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361 [ 2.741150] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015 [ 2.741151] Call Trace: [ 2.741154] dump_stack+0x7b/0xd1 [ 2.741157] ___might_sleep+0x194/0x300 [ 2.741159] __alloc_pages_nodemask+0x13f/0x730 [ 2.741162] cache_alloc_refill+0x184/0x12e0 [ 2.741165] kmem_cache_alloc+0xef/0x4f0 [ 2.741168] dst_alloc+0x5f/0xf0 [ 2.741171] __ip6_dst_alloc+0x36/0xd0 [ 2.741174] ip6_dst_alloc+0x19/0x150 [ 2.741176] addrconf_dst_alloc+0x78/0x1c0 [ 2.741179] ipv6_add_addr+0x2d9/0xab0 [ 2.741181] ? ipv6_add_addr+0x9f/0xab0 [ 2.741183] ? trace_hardirqs_on_caller+0x1ab/0x2c0 [ 2.741187] add_addr+0x36/0x110 [ 2.741190] addrconf_notify+0x8c4/0x1230 [ 2.741192] ? fib_add_ifaddr+0x110/0x1b0 [ 2.741195] raw_notifier_call_chain+0x66/0xd0 [ 2.741199] call_netdevice_notifiers_info+0x73/0x90 [ 2.741201] __dev_notify_flags+0x8f/0xf0 [ 2.741204] ? __dev_change_flags+0xc3/0x1b0 [ 2.741207] dev_change_flags+0x62/0x90 [ 2.741209] do_setlink+0x3b5/0x1860 [ 2.741212] ? avc_has_perm_noaudit+0x1d9/0x330 [ 2.741214] ? preempt_count_sub+0x4a/0x90 [ 2.741217] ? avc_has_perm_noaudit+0x59/0x330 [ 2.741221] ? nla_parse+0x143/0x1c0 [ 2.741223] rtnl_setlink+0x118/0x1a0 [ 2.741228] ? do_setlink+0x1860/0x1860 [ 2.741231] rtnetlink_rcv_msg+0xfa/0x630 [ 2.741233] ? mutex_lock_nested+0x109/0x9f0 [ 2.741235] ? rtnetlink_rcv+0x1b/0x40 [ 2.741237] ? netlink_deliver_tap+0x5/0x4e0 [ 2.741240] ? rtnl_newlink+0xbe0/0xbe0 [ 2.741242] netlink_rcv_skb+0x87/0xc0 [ 2.741245] rtnetlink_rcv+0x2a/0x40 [ 2.741247] netlink_unicast+0x1e7/0x300 [ 2.741249] netlink_sendmsg+0x402/0x670 [ 2.741252] sock_sendmsg+0x5b/0xd0 [ 2.741255] SYSC_sendto+0x156/0x1f0 [ 2.741257] ? netlink_getsockopt+0x2f9/0x3d0 [ 2.741260] ? entry_SYSCALL_64_fastpath+0x5/0xad [ 2.741262] ? trace_hardirqs_on_caller+0x1ab/0x2c0 [ 2.741264] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2.741267] SyS_sendto+0xe/0x10 [ 2.741269] entry_SYSCALL_64_fastpath+0x18/0xad [ 2.741271] RIP: 0033:0x7fc497fffa73 [ 2.741273] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2.741275] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73 [ 2.741277] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004 [ 2.741278] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010 [ 2.741279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8 [ 2.741281] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3
pgpzs1R0suFIi.pgp
Description: PGP signature