Greetings, 0day kernel testing robot got the below dmesg and the first bad commit is https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master commit 8c96f1bc6fc49c724c4cdd22d3e99260263b7384 Author: He Zhe AuthorDate: Thu Jan 30 22:12:00 2020 -0800 Commit: Linus Torvalds CommitDate: Fri Jan 31 10:30:36 2020 -0800 mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t kmemleak_lock as a rwlock on RT can possibly be acquired in atomic context which does work. Since the kmemleak operation is performed in atomic context make it a raw_spinlock_t so it can also be acquired on RT. This is used for debugging and is not enabled by default in a production like environment (where performance/latency matters) so it makes sense to make it a raw_spinlock_t instead trying to get rid of the atomic context. Turn also the kmemleak_object->lock into raw_spinlock_t which is acquired (nested) while the kmemleak_lock is held. The time spent in "echo scan > kmemleak" slightly improved on 64core box with this patch applied after boot. [bigeasy@linutronix.de: redo the description, update comments. Merge the individual bits: He Zhe did the kmemleak_lock, Liu Haitao the ->lock and Yongxin Liu forwarded Liu's patch.] Link: http://lkml.kernel.org/r/20191219170834.4tah3prf2gdothz4@linutronix.de Link: https://lkml.kernel.org/r/20181218150744.GB20197@arrakis.emea.arm.com Link: https://lkml.kernel.org/r/1542877459-144382-1-git-send-email-zhe.he@windriver.com Link: https://lkml.kernel.org/r/20190927082230.34152-1-yongxin.liu@windriver.com Signed-off-by: He Zhe Signed-off-by: Liu Haitao Signed-off-by: Yongxin Liu Signed-off-by: Sebastian Andrzej Siewior Acked-by: Catalin Marinas Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds 90e9f6a66c mm/slub.c: avoid slub allocation while holding list_lock 8c96f1bc6f mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t 9847774063 Merge branch 'rcu/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu +-------------------------------------------------------+------------+------------+------------+ | | 90e9f6a66c | 8c96f1bc6f | 9847774063 | +-------------------------------------------------------+------------+------------+------------+ | boot_successes | 561 | 167 | 15 | | boot_failures | 28 | 31 | 2 | | INFO:rcu_sched_self-detected_stall_on_CPU | 4 | 3 | | | RIP:iov_iter_copy_from_user_atomic | 2 | 2 | | | BUG:kernel_timeout_in_test_stage | 9 | 7 | | | BUG:KASAN:user-memory-access_in_w | 2 | | | | RIP:__softirqentry_text_end | 1 | 1 | | | RIP:_raw_spin_unlock_irq | 2 | 1 | | | RIP:lock_is_held_type | 1 | | | | RIP:proc_bus_pci_write | 2 | 1 | | | BUG:kernel_hang_in_test_stage | 4 | | | | INFO:rcu_sched_detected_stalls_on_CPUs/tasks | 10 | 4 | | | RIP:clear_page_orig | 10 | 4 | | | RIP:lock_acquire | 1 | | | | BUG:kernel_hang_in_boot_stage | 3 | 2 | | | WARNING:possible_circular_locking_dependency_detected | 0 | 19 | 2 | | RIP:fixup_exception | 0 | 1 | | | RIP:lock_release | 0 | 1 | | | BUG:kernel_timeout_in_boot_stage | 0 | 1 | | +-------------------------------------------------------+------------+------------+------------+ If you fix the issue, kindly add following tag Reported-by: kernel test robot [main] 10834 iterations. [F:7342 S:3281 HI:418] [main] 31240 iterations. [F:22845 S:8228 HI:2808] [ 120.970911] init: tty4 main process (2665) terminated with status 1 [ 120.972478] init: tty4 main process ended, respawning [ 121.330574] init: tty2 main process (2671) terminated with status 1 [ 121.331736] init: tty2 main process ended, respawning [ 121.538278] init: tty3 main process (2677) terminated with status 1 [ 121.560620] init: tty3 main process ended, respawning [ 121.699194] init: tty6 main process (2679) terminated with status 1 [ 121.700360] init: tty6 main process ended, respawning [ 121.719779] init: tty5 main process (2667) terminated with status 1 [ 121.720956] init: tty5 main process ended, respawning [main] 21751 iterations. [F:15034 S:6457 HI:1537] [ 125.084999] synth uevent: /devices/virtual/tty/ptyte: unknown uevent action string [ 125.086107] tty ptyte: uevent: failed to send synthetic uevent [ 126.383851] synth uevent: /bus/i2c/drivers/rt9455-charger: unknown uevent action string [main] 41626 iterations. [F:30453 S:10982 HI:2808] [ 128.920528] futex_wake_op: trinity-c5 tries to shift op by -1; fix this program [ 130.123689] trinity-c5 (3023): attempted to duplicate a private mapping with mremap. This is not supported. [ 131.010080] futex_wake_op: trinity-c7 tries to shift op by -1; fix this program [ 131.116809] init: tty4 main process (2909) terminated with status 1 [ 131.117958] init: tty4 main process ended, respawning [ 131.304250] synth uevent: /bus/counter: unknown uevent action string [ 131.468711] init: tty2 main process (2916) terminated with status 1 [ 131.469854] init: tty2 main process ended, respawning [ 131.630939] init: tty3 main process (2922) terminated with status 1 [ 131.632218] init: tty3 main process ended, respawning [ 131.841143] init: tty6 main process (2938) terminated with status 1 [ 131.842353] init: tty6 main process ended, respawning [ 132.001974] init: tty5 main process (2941) terminated with status 1 [ 132.003159] init: tty5 main process ended, respawning [ 132.962272] synth uevent: /module/battery: unknown uevent action string [main] 32073 iterations. [F:22337 S:9433 HI:2580] [main] 51692 iterations. [F:37805 S:13652 HI:2808] [ 139.349761] Writes: Total: 4698569 Max/Min: 0/0 Fail: 0 [ 141.178563] init: tty4 main process (3216) terminated with status 1 [ 141.222698] init: tty4 main process ended, respawning [ 141.546921] init: tty2 main process (3230) terminated with status 1 [ 141.548063] init: tty2 main process ended, respawning [ 141.744605] init: tty3 main process (3234) terminated with status 1 [ 141.745758] init: tty3 main process ended, respawning [ 141.827792] sock: process `trinity-c2' is using obsolete setsockopt SO_BSDCOMPAT [ 141.906121] init: tty6 main process (3240) terminated with status 1 [ 141.912874] init: tty6 main process ended, respawning [ 142.086763] init: tty5 main process (3244) terminated with status 1 [ 142.087912] init: tty5 main process ended, respawning [main] 42190 iterations. [F:29401 S:12448 HI:2720] [main] 62248 iterations. [F:45672 S:16308 HI:3053] [ 148.172848] synth uevent: /module/altera_stapl: unknown uevent action string [ 151.311003] init: tty4 main process (3493) terminated with status 1 [ 151.314936] init: tty4 main process ended, respawning [ 151.661997] init: tty2 main process (3507) terminated with status 1 [ 151.663189] init: tty2 main process ended, respawning [ 151.760456] futex_wake_op: trinity-c7 tries to shift op by -129; fix this program [ 151.932375] init: tty3 main process (3515) terminated with status 1 [ 151.933552] init: tty3 main process ended, respawning [ 152.018370] init: tty6 main process (3523) terminated with status 1 [ 152.022265] init: tty6 main process ended, respawning [ 152.208466] init: tty5 main process (3526) terminated with status 1 [ 152.214637] init: tty5 main process ended, respawning [ 153.533785] futex_wake_op: trinity-c6 tries to shift op by 1544; fix this program [ 154.322208] kmemleak: Found object by alias at 0xffffc90000083000 [ 154.323706] CPU: 1 PID: 193 Comm: kmemleak Not tainted 5.5.0-05417-g8c96f1bc6fc49 #1 [ 154.324647] Call Trace: [ 154.324969] dump_stack+0xa1/0xea [ 154.325394] lookup_object.cold+0x14/0x24 [ 154.325897] scan_block+0x160/0x1f0 [ 154.326348] scan_gray_list+0x26e/0x480 [ 154.326833] kmemleak_scan+0xaa6/0x12d0 [ 154.327311] ? paint_ptr+0xe0/0xe0 [ 154.327742] kmemleak_scan_thread+0x95/0xc3 [ 154.328271] kthread+0x331/0x400 [ 154.328692] ? kmemleak_write.cold+0x28/0x28 [ 154.329229] ? kthread_create_worker_on_cpu+0xa0/0xa0 [ 154.329866] ret_from_fork+0x3a/0x50 [ 154.330343] kmemleak: Object 0xffffc90000081000 (size 12288): [ 154.331048] kmemleak: comm "init", pid 1, jiffies 4294952116 [ 154.331767] kmemleak: min_count = 2 [ 154.332231] kmemleak: count = 2 [ 154.332655] kmemleak: flags = 0x1 [ 154.333099] kmemleak: checksum = 0 [ 154.333553] kmemleak: backtrace: [ 154.333991] __vmalloc_node_range+0x372/0x740 [ 154.334583] vzalloc+0x66/0x80 [ 154.335015] n_tty_open+0x16/0x170 [ 154.335462] tty_ldisc_open+0x7b/0xc0 [ 154.336030] tty_ldisc_setup+0x46/0xe0 [ 154.336524] tty_init_dev+0x1c1/0x3d0 [ 154.337008] ptmx_open+0xd8/0x2f0 [ 154.337459] chrdev_open+0x1d2/0x520 [ 154.337948] do_dentry_open+0x415/0x1150 [ 154.338484] vfs_open+0x9a/0xc0 [ 154.338916] do_last+0xaca/0x2580 [ 154.339375] path_openat+0x14c/0x410 [ 154.339870] do_filp_open+0x169/0x220 [ 154.340366] do_sys_openat2+0x2cb/0x540 [ 154.340878] do_sys_open+0x7e/0xc0 [ 154.341339] __x64_sys_open+0x79/0xb0 [ 154.341832] [ 154.341835] ====================================================== [ 154.341837] WARNING: possible circular locking dependency detected [ 154.341839] 5.5.0-05417-g8c96f1bc6fc49 #1 Not tainted [ 154.341841] ------------------------------------------------------ [ 154.341842] kmemleak/193 is trying to acquire lock: [ 154.341844] ffffffff83ccd120 (console_owner){-.-.}, at: console_unlock+0x286/0xab0 [ 154.341850] [ 154.341851] but task is already holding lock: [ 154.341852] ffffffff83e3a4d8 (kmemleak_lock){-.-.}, at: scan_block+0x2c/0x1f0 [ 154.341858] [ 154.341860] which lock already depends on the new lock. [ 154.341861] [ 154.341862] [ 154.341864] the existing dependency chain (in reverse order) is: [ 154.341865] [ 154.341866] -> #3 (kmemleak_lock){-.-.}: [ 154.341871] __lock_acquire+0x837/0x1480 [ 154.341873] lock_acquire+0x143/0x350 [ 154.341875] _raw_spin_lock_irqsave+0x37/0x50 [ 154.341876] create_object+0x3be/0xb00 [ 154.341878] kmemleak_alloc+0x4a/0x80 [ 154.341879] kmem_cache_alloc_node+0x12c/0x360 [ 154.341881] cache_grow_begin+0x2db/0x400 [ 154.341883] cache_alloc_refill+0x2a1/0x360 [ 154.341884] __kmalloc+0x364/0x380 [ 154.341886] __tty_buffer_request_room+0x1b0/0x590 [ 154.341888] tty_insert_flip_string_fixed_flag+0x76/0x200 [ 154.341889] pty_write+0x103/0x1d0 [ 154.341890] n_tty_write+0x357/0x1030 [ 154.341892] tty_write+0x3db/0x720 [ 154.341894] __vfs_write+0x60/0x110 [ 154.341895] vfs_write+0x1ad/0x540 [ 154.341896] ksys_write+0xf9/0x1d0 [ 154.341898] __x64_sys_write+0x6e/0xb0 [ 154.341899] do_syscall_64+0x180/0xa0c [ 154.341901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.341902] [ 154.341903] -> #2 (&(&port->lock)->rlock){-.-.}: [ 154.341909] __lock_acquire+0x837/0x1480 [ 154.341910] lock_acquire+0x143/0x350 [ 154.341912] _raw_spin_lock_irqsave+0x37/0x50 [ 154.341914] tty_port_tty_get+0x1f/0xc0 [ 154.341916] tty_port_default_wakeup+0xb/0x30 [ 154.341917] tty_port_tty_wakeup+0x57/0x70 [ 154.341919] uart_write_wakeup+0x37/0x50 [ 154.341920] serial8250_tx_chars+0x3cd/0xb10 [ 154.341922] serial8250_handle_irq+0x1b2/0x210 [ 154.341924] serial8250_default_handle_irq+0x87/0xf0 [ 154.341926] serial8250_interrupt+0xe5/0x1b0 [ 154.341927] __handle_irq_event_percpu+0xea/0x6b0 [ 154.341929] handle_irq_event_percpu+0x5d/0x110 [ 154.341930] handle_irq_event+0xa2/0x12f [ 154.341932] handle_edge_irq+0x1fd/0x7a0 [ 154.341933] do_IRQ+0xa5/0x230 [ 154.341935] ret_from_intr+0x0/0x35 [ 154.341936] kmem_cache_free+0x6d/0x2a0 [ 154.341938] free_object_rcu+0x24e/0x390 [ 154.341939] rcu_do_batch+0x57d/0xcc0 [ 154.341941] rcu_core+0x3d8/0xbb0 [ 154.341942] rcu_core_si+0x9/0x10 [ 154.341944] __do_softirq+0x21c/0x922 [ 154.341945] run_ksoftirqd+0x24/0x50 [ 154.341947] smpboot_thread_fn+0x351/0x800 [ 154.341948] kthread+0x331/0x400 [ 154.341950] ret_from_fork+0x3a/0x50 [ 154.341951] [ 154.341952] -> #1 (&port_lock_key){-.-.}: [ 154.341958] __lock_acquire+0x837/0x1480 [ 154.341959] lock_acquire+0x143/0x350 [ 154.341961] _raw_spin_lock_irqsave+0x37/0x50 [ 154.341962] serial8250_console_write+0x12e/0x740 [ 154.341964] univ8250_console_write+0x4e/0x70 [ 154.341965] console_unlock+0x618/0xab0 [ 154.341967] vprintk_emit+0xe6/0x270 [ 154.341968] vprintk_default+0x1a/0x20 [ 154.341970] vprintk_func+0x48/0xd9 [ 154.341971] printk+0x91/0xad [ 154.341973] register_console+0x5c2/0x980 [ 154.341975] univ8250_console_init+0x1e/0x28 [ 154.341976] console_init+0x353/0x4dc [ 154.341978] start_kernel+0x413/0x652 [ 154.341979] x86_64_start_reservations+0x29/0x2b [ 154.341981] x86_64_start_kernel+0x77/0x7b [ 154.341983] secondary_startup_64+0xa4/0xb0 [ 154.341984] [ 154.341985] -> #0 (console_owner){-.-.}: [ 154.341990] check_prev_add+0x16a/0x1e00 [ 154.341992] validate_chain+0xdbf/0x1a00 [ 154.341994] __lock_acquire+0x837/0x1480 [ 154.341995] lock_acquire+0x143/0x350 [ 154.341997] console_unlock+0x2e3/0xab0 [ 154.341998] vprintk_emit+0xe6/0x270 [ 154.342000] vprintk_default+0x1a/0x20 [ 154.342001] vprintk_func+0x48/0xd9 [ 154.342003] printk+0x91/0xad [ 154.342004] lookup_object.cold+0xf/0x24 [ 154.342006] scan_block+0x160/0x1f0 [ 154.342007] scan_gray_list+0x26e/0x480 [ 154.342009] kmemleak_scan+0xaa6/0x12d0 [ 154.342010] kmemleak_scan_thread+0x95/0xc3 [ 154.342011] kthread+0x331/0x400 [ 154.342012] ret_from_fork+0x3a/0x50 [ 154.342013] [ 154.342015] other info that might help us debug this: [ 154.342016] [ 154.342017] Chain exists of: [ 154.342018] console_owner --> &(&port->lock)->rlock --> kmemleak_lock [ 154.342025] [ 154.342026] Possible unsafe locking scenario: [ 154.342028] [ 154.342029] CPU0 CPU1 [ 154.342031] ---- ---- [ 154.342032] lock(kmemleak_lock); [ 154.342035] lock(&(&port->lock)->rlock); [ 154.342039] lock(kmemleak_lock); [ 154.342043] lock(console_owner); [ 154.342046] [ 154.342047] *** DEADLOCK *** [ 154.342049] [ 154.342050] 4 locks held by kmemleak/193: [ 154.342051] #0: ffffffff83e3a380 (scan_mutex){+.+.}, at: kmemleak_scan_thread+0x90/0xc3 [ 154.342058] #1: ffff8881dea1b3a8 (&object->lock){-.-.}, at: scan_gray_list+0x14c/0x480 [ 154.342065] #2: ffffffff83e3a4d8 (kmemleak_lock){-.-.}, at: scan_block+0x2c/0x1f0 [ 154.342072] #3: ffffffff83ccd380 (console_lock){+.+.}, at: vprintk_emit+0xdd/0x270 [ 154.342078] [ 154.342080] stack backtrace: [ 154.342082] CPU: 1 PID: 193 Comm: kmemleak Not tainted 5.5.0-05417-g8c96f1bc6fc49 #1 [ 154.342083] Call Trace: [ 154.342084] dump_stack+0xa1/0xea [ 154.342086] print_circular_bug.cold+0x163/0x172 [ 154.342088] check_noncircular+0x30f/0x3c0 [ 154.342089] ? print_circular_bug+0x1f0/0x1f0 [ 154.342090] check_prev_add+0x16a/0x1e00 [ 154.342092] validate_chain+0xdbf/0x1a00 [ 154.342094] ? check_prev_add+0x1e00/0x1e00 [ 154.342095] __lock_acquire+0x837/0x1480 [ 154.342096] ? find_held_lock+0x35/0x130 [ 154.342098] lock_acquire+0x143/0x350 [ 154.342099] ? console_unlock+0x286/0xab0 [ 154.342100] console_unlock+0x2e3/0xab0 [ 154.342101] ? console_unlock+0x286/0xab0 [ 154.342103] ? vprintk_emit+0xdd/0x270 [ 154.342104] vprintk_emit+0xe6/0x270 [ 154.342105] vprintk_default+0x1a/0x20 [ 154.342107] vprintk_func+0x48/0xd9 [ 154.342108] printk+0x91/0xad [ 154.342110] ? kmsg_dump_rewind_nolock+0xdf/0xdf [ 154.342111] ? lock_downgrade+0x7f0/0x7f0 [ 154.342112] ? rwlock_bug+0x90/0x90 [ 154.342114] ? do_raw_spin_unlock+0x54/0x250 [ 154.342116] lookup_object.cold+0xf/0x24 [ 154.342117] scan_block+0x160/0x1f0 [ 154.342119] scan_gray_list+0x26e/0x480 [ 154.342120] kmemleak_scan+0xaa6/0x12d0 [ 154.342121] ? paint_ptr+0xe0/0xe0 [ 154.342123] kmemleak_scan_thread+0x95/0xc3 [ 154.342124] kthread+0x331/0x400 [ 154.342125] ? kmemleak_write.cold+0x28/0x28 [ 154.342126] ? kthread_create_worker_on_cpu+0xa0/0xa0 [ 154.342127] ret_from_fork+0x3a/0x50 [ 154.459259] kmemleak: Found object by alias at 0xffffc90000093000 [ 154.460091] CPU: 1 PID: 193 Comm: kmemleak Not tainted 5.5.0-05417-g8c96f1bc6fc49 #1 [ 154.460993] Call Trace: [ 154.461309] dump_stack+0xa1/0xea [ 154.461736] lookup_object.cold+0x14/0x24 [ 154.462235] scan_block+0x160/0x1f0 [ 154.462687] scan_gray_list+0x26e/0x480 [ 154.463171] kmemleak_scan+0xaa6/0x12d0 [ 154.463667] ? paint_ptr+0xe0/0xe0 [ 154.464103] kmemleak_scan_thread+0x95/0xc3 [ 154.464623] kthread+0x331/0x400 [ 154.465029] ? kmemleak_write.cold+0x28/0x28 [ 154.465556] ? kthread_create_worker_on_cpu+0xa0/0xa0 [ 154.466168] ret_from_fork+0x3a/0x50 [ 154.466648] kmemleak: Object 0xffffc90000091000 (size 12288): [ 154.467350] kmemleak: comm "init", pid 1, jiffies 4294952116 [ 154.468071] kmemleak: min_count = 2 [ 154.468526] kmemleak: count = 2 [ 154.468937] kmemleak: flags = 0x1 [ 154.469388] kmemleak: checksum = 0 [ 154.469835] kmemleak: backtrace: [ 154.470269] __vmalloc_node_range+0x372/0x740 [ 154.470873] vzalloc+0x66/0x80 [ 154.471301] n_tty_open+0x16/0x170 [ 154.471754] tty_ldisc_open+0x7b/0xc0 [ 154.472309] tty_ldisc_setup+0x7c/0xe0 [ 154.472824] tty_init_dev+0x1c1/0x3d0 [ 154.473327] ptmx_open+0xd8/0x2f0 [ 154.473791] chrdev_open+0x1d2/0x520 [ 154.474282] do_dentry_open+0x415/0x1150 [ 154.474820] vfs_open+0x9a/0xc0 [ 154.475257] do_last+0xaca/0x2580 [ 154.475716] path_openat+0x14c/0x410 [ 154.476217] do_filp_open+0x169/0x220 [ 154.476725] do_sys_openat2+0x2cb/0x540 [ 154.477248] do_sys_open+0x7e/0xc0 [ 154.477731] __x64_sys_open+0x79/0xb0 # HH:MM RESULT GOOD BAD GOOD_BUT_DIRTY DIRTY_NOT_BAD git bisect start v5.6 v5.5 -- git bisect bad 1d40890aae812378fdcf47e203abf49476f9c071 # 07:38 B 4 1 0 0 Merge tag 'gpio-v5.6-2' of git://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-gpio git bisect good ddaefe8947b48b638f726cf89730ecc1000ebcc3 # 09:53 G 190 0 14 14 Merge tag 'modules-for-v5.6' of git://git.kernel.org/pub/scm/linux/kernel/git/jeyu/linux git bisect bad e310396bb8d7db977a0e10ef7b5040e98b89c34c # 10:05 B 2 1 0 0 Merge tag 'trace-v5.6-2' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace git bisect bad a6d5f9dca42eab3526e2f73aa5b7df2a5fec2c9d # 10:33 B 10 1 0 0 Merge tag 'vfio-v5.6-rc1' of git://github.com/awilliam/linux-vfio git bisect bad 6404674acd596de41fd3ad5f267b4525494a891a # 10:54 B 1 1 0 0 vfs: fix do_last() regression git bisect bad 68b62e5d965a8cbcfa287ee7754cf06e9b3775ab # 11:13 B 1 1 0 0 Merge tag 'thermal-v5.6-rc1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/thermal/linux git bisect bad a62aa6f7f50a9a0af5e07d98774f8a7b439d390f # 11:48 B 13 1 0 0 Merge tag 'gfs2-for-5.6' of git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2 git bisect bad 7eec11d3a784a283f916590e5aa30b855c2ccfd7 # 12:31 B 9 1 1 1 Merge branch 'akpm' (patches from Andrew) git bisect bad 02634a44b8aba2d4f16ea09d3c17400d9320327e # 12:49 B 2 1 0 0 mm/memblock: define memblock_physmem_add() git bisect bad c4237f8b1f4f2857c3079c99f69d971f883dd69c # 13:21 B 7 1 0 0 mm: fix get_user_pages_remote()'s handling of FOLL_LONGTERM git bisect good d8f18750690367b6a636878e8725f78398fe0748 # 17:41 G 190 0 11 11 ocfs2/dlm: remove redundant assignment to ret git bisect bad ddf8f376d137ba41ca67347a0b80ba0c357a1018 # 17:56 B 1 1 0 0 mm/filemap.c: clean up filemap_write_and_wait() git bisect good 25b69918d9f16c729193cc7c6f48f0b8991813f9 # 22:01 G 192 0 17 17 ocfs2: use ocfs2_update_inode_fsync_trans() to access t_tid in handle->h_transaction git bisect bad 8c96f1bc6fc49c724c4cdd22d3e99260263b7384 # 22:31 B 3 1 0 0 mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t git bisect good 90e9f6a66c78fdf3c2e5884ffe97bfc2736863c2 # 02:34 G 190 0 6 6 mm/slub.c: avoid slub allocation while holding list_lock # first bad commit: [8c96f1bc6fc49c724c4cdd22d3e99260263b7384] mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t git bisect good 90e9f6a66c78fdf3c2e5884ffe97bfc2736863c2 # 06:38 G 570 0 26 32 mm/slub.c: avoid slub allocation while holding list_lock # extra tests with debug options git bisect bad 8c96f1bc6fc49c724c4cdd22d3e99260263b7384 # 07:11 B 4 1 1 1 mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t # extra tests on revert first bad commit git bisect good 25fd1ec9ee348307bc112d3a65fda35f156b8382 # 09:30 G 190 0 4 4 Revert "mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t" # good: [25fd1ec9ee348307bc112d3a65fda35f156b8382] Revert "mm/kmemleak: turn kmemleak_lock and object->lock to raw_spinlock_t" # extra tests on head commit of linus/master git bisect bad 98477740630f270aecf648f1d6a9dbc6027d4ff1 # 10:21 B 11 1 2 2 Merge branch 'rcu/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu # bad: [98477740630f270aecf648f1d6a9dbc6027d4ff1] Merge branch 'rcu/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu # extra tests on linus/master # duplicated: [98477740630f270aecf648f1d6a9dbc6027d4ff1] Merge branch 'rcu/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu # extra tests on linux-next/master # 119: [b10b8ad862118bf42c28a98b0f067619aadcfb23] Add linux-next specific files for 20200921 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/lkp@lists.01.org