From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751636AbbLaTgW (ORCPT ); Thu, 31 Dec 2015 14:36:22 -0500 Received: from arcturus.aphlor.org ([188.246.204.175]:35544 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750857AbbLaTgS (ORCPT ); Thu, 31 Dec 2015 14:36:18 -0500 Date: Thu, 31 Dec 2015 14:36:15 -0500 From: Dave Jones To: Linux Kernel Cc: Peter Zijlstra Subject: gpf in intel_pmu_lbr_enable_all Message-ID: <20151231193615.GA24551@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Linux Kernel , Peter Zijlstra MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-Spam-Score: -2.9 (--) X-Spam-Report: Spam detection software, running on the system "arcturus.aphlor.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN CPU: 1 PID: 15672 Comm: trinity-c5 Not tainted 4.4.0-rc7-gelk-debug+ #3 task: ffff8800a18fc100 ti: ffff88005b6a0000 task.ti: ffff88005b6a0000 RIP: 0010:[] [] intel_pmu_lbr_enable_all+0xb5/0x160 RSP: 0018:ffff88005b6a7a58 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c8 RDX: 0000000000000000 RSI: ffffffff9dd489e0 RDI: ffff8800a3f14c38 RBP: ffff88005b6a7a70 R08: 000000000000038d R09: ffffed00147e2841 R10: ffff8800a3f1420b R11: ffffed00147e2842 R12: 0000000000000001 R13: 0000000000000000 R14: ffff8800a3f13fe0 R15: 0000000000000000 FS: 00007f1ee689c700(0000) GS:ffff8800a3f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000063bac0 CR3: 0000000093f87000 CR4: 00000000000006e0 DR0: 00007f1a95485000 DR1: 00007fcb26c9a000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Stack: ffff8800a3f13fe0 0000000000000001 0000000000000000 ffff88005b6a7a98 ffffffff9d02c2a3 0000000000000003 00000000000000c1 0000000000000000 ffff88005b6a7aa8 ffffffff9d02c370 ffff88005b6a7b20 ffffffff9d0244df Call Trace: [] __intel_pmu_enable_all+0x43/0x100 [] intel_pmu_enable_all+0x10/0x20 [] x86_pmu_enable+0x1ef/0x540 [] perf_pmu_enable+0x53/0x60 [] __perf_install_in_context+0x213/0x310 [] ? perf_mux_hrtimer_handler+0x3d0/0x3d0 [] remote_function+0x86/0xa0 [] ? __perf_read_group_add.part.60+0x310/0x310 [] generic_exec_single+0x107/0x1a0 [] ? __perf_read_group_add.part.60+0x310/0x310 [] smp_call_function_single+0xf6/0x240 [] ? generic_exec_single+0x1a0/0x1a0 [] ? __mutex_init+0x77/0x80 [] task_function_call+0x97/0xc0 [] ? pmu_dev_release+0x10/0x10 [] [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN CPU: 1 PID: 15672 Comm: trinity-c5 Not tainted 4.4.0-rc7-gelk-debug+ #3 task: ffff8800a18fc100 ti: ffff88005b6a0000 task.ti: ffff88005b6a0000 RIP: 0010:[] [] intel_pmu_lbr_enable_all+0xb5/0x160 RSP: 0018:ffff88005b6a7a58 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c8 RDX: 0000000000000000 RSI: ffffffff9dd489e0 RDI: ffff8800a3f14c38 RBP: ffff88005b6a7a70 R08: 000000000000038d R09: ffffed00147e2841 R10: ffff8800a3f1420b R11: ffffed00147e2842 R12: 0000000000000001 R13: 0000000000000000 R14: ffff8800a3f13fe0 R15: 0000000000000000 FS: 00007f1ee689c700(0000) GS:ffff8800a3f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000063bac0 CR3: 0000000093f87000 CR4: 00000000000006e0 DR0: 00007f1a95485000 DR1: 00007fcb26c9a000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Stack: ffff8800a3f13fe0 0000000000000001 0000000000000000 ffff88005b6a7a98 ffffffff9d02c2a3 0000000000000003 00000000000000c1 0000000000000000 ffff88005b6a7aa8 ffffffff9d02c370 ffff88005b6a7b20 ffffffff9d0244df Call Trace: [] __intel_pmu_enable_all+0x43/0x100 [] intel_pmu_enable_all+0x10/0x20 [] x86_pmu_enable+0x1ef/0x540 [] perf_pmu_enable+0x53/0x60 [] __perf_install_in_context+0x213/0x310 [] ? perf_mux_hrtimer_handler+0x3d0/0x3d0 [] remote_function+0x86/0xa0 [] ? __perf_read_group_add.part.60+0x310/0x310 [] generic_exec_single+0x107/0x1a0 [] ? __perf_read_group_add.part.60+0x310/0x310 [] smp_call_function_single+0xf6/0x240 [] ? generic_exec_single+0x1a0/0x1a0 [] ? __mutex_init+0x77/0x80 [] task_function_call+0x97/0xc0 [] ? pmu_dev_release+0x10/0x10 [] ? preempt_count_sub+0xc1/0x120 [] ? perf_mux_hrtimer_handler+0x3d0/0x3d0 [] ? anon_inode_getfile+0x19f/0x220 [] perf_install_in_context+0x115/0x1a0 [] ? cpu_clock_event_start+0x50/0x50 [] ? __perf_event_header_size.isra.24+0x6d/0x80 [] ? perf_event__header_size+0xbc/0xd0 [] SYSC_perf_event_open+0xd2b/0x1090 [] ? perf_event_set_output+0x1b0/0x1b0 [] ? syscall_exit_register+0x310/0x310 [] SyS_perf_event_open+0x9/0x10 [] tracesys_phase2+0x84/0x89 Code: 27 00 48 8b 9b 58 0c 00 00 48 85 db 0f 84 b2 00 00 00 48 8d 7b 18 e8 cb 3a 27 00 48 8b 43 18 48 89 c2 b9 c8 01 00 00 48 c1 ea 20 <0f> 30 25 00 02 00 00 48 89 c6 b9 d9 01 00 00 0f 32 48 c1 e2 20