lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 31 Dec 2015 14:36:15 -0500
From:	Dave Jones <davej@...emonkey.org.uk>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Cc:	Peter Zijlstra <peterz@...radead.org>
Subject: gpf in intel_pmu_lbr_enable_all

general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN
CPU: 1 PID: 15672 Comm: trinity-c5 Not tainted 4.4.0-rc7-gelk-debug+ #3
task: ffff8800a18fc100 ti: ffff88005b6a0000 task.ti: ffff88005b6a0000
RIP: 0010:[<ffffffff9d027f45>]  [<ffffffff9d027f45>] intel_pmu_lbr_enable_all+0xb5/0x160
RSP: 0018:ffff88005b6a7a58  EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c8
RDX: 0000000000000000 RSI: ffffffff9dd489e0 RDI: ffff8800a3f14c38
RBP: ffff88005b6a7a70 R08: 000000000000038d R09: ffffed00147e2841
R10: ffff8800a3f1420b R11: ffffed00147e2842 R12: 0000000000000001
R13: 0000000000000000 R14: ffff8800a3f13fe0 R15: 0000000000000000
FS:  00007f1ee689c700(0000) GS:ffff8800a3f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000063bac0 CR3: 0000000093f87000 CR4: 00000000000006e0
DR0: 00007f1a95485000 DR1: 00007fcb26c9a000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Stack:
 ffff8800a3f13fe0 0000000000000001 0000000000000000 ffff88005b6a7a98
 ffffffff9d02c2a3 0000000000000003 00000000000000c1 0000000000000000
 ffff88005b6a7aa8 ffffffff9d02c370 ffff88005b6a7b20 ffffffff9d0244df
Call Trace:
 [<ffffffff9d02c2a3>] __intel_pmu_enable_all+0x43/0x100
 [<ffffffff9d02c370>] intel_pmu_enable_all+0x10/0x20
 [<ffffffff9d0244df>] x86_pmu_enable+0x1ef/0x540
 [<ffffffff9d20d1e3>] perf_pmu_enable+0x53/0x60
 [<ffffffff9d2101f3>] __perf_install_in_context+0x213/0x310
 [<ffffffff9d20ffe0>] ? perf_mux_hrtimer_handler+0x3d0/0x3d0
 [<ffffffff9d2076b6>] remote_function+0x86/0xa0
 [<ffffffff9d207630>] ? __perf_read_group_add.part.60+0x310/0x310
 [<ffffffff9d165a47>] generic_exec_single+0x107/0x1a0
 [<ffffffff9d207630>] ? __perf_read_group_add.part.60+0x310/0x310
 [<ffffffff9d165bd6>] smp_call_function_single+0xf6/0x240
 [<ffffffff9d165ae0>] ? generic_exec_single+0x1a0/0x1a0
 [<ffffffff9d1141e7>] ? __mutex_init+0x77/0x80
 [<ffffffff9d204d67>] task_function_call+0x97/0xc0
 [<ffffffff9d204cd0>] ? pmu_dev_release+0x10/0x10
 [<ffffffff9d0deff1>] ? preempt_count_sub+0xc1/0x120
 [<ffffffff9d20ffe0>] ? perf_mux_hrtimer_handler+0x3d0/0x3d0
 [<ffffffff9d31e4af>] ? anon_inode_getfile+0x19f/0x220
 [<ffffffff9d207aa5>] perf_install_in_context+0x115/0x1a0
 [<ffffffff9d207990>] ? cpu_clock_event_start+0x50/0x50
 [<ffffffff9d2064ed>] ? __perf_event_header_size.isra.24+0x6d/0x80
 [<ffffffff9d2065bc>] ? perf_event__header_size+0xbc/0xd0
 [<ffffffff9d21463b>] SYSC_perf_event_open+0xd2b/0x1090
 [<ffffffff9d213910>] ? perf_event_set_output+0x1b0/0x1b0
 [<ffffffff9d1e2f20>] ? syscall_exit_register+0x310/0x310
 [<ffffffff9d218159>] SyS_perf_event_open+0x9/0x10
 [<ffffffff9dae1ef9>] tracesys_phase2+0x84/0x89
Code: 27 00 48 8b 9b 58 0c 00 00 48 85 db 0f 84 b2 00 00 00 48 8d 7b 18 e8 cb 3a 27 00 48 8b 43 18 48 89 c2 b9 c8 01 00 00 48 c1 ea 20 <0f> 30 25 00 02 00 00 48 89 c6 b9 d9 01 00 00 0f 32 48 c1 e2 20 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ