[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20151231193615.GA24551@codemonkey.org.uk>
Date: Thu, 31 Dec 2015 14:36:15 -0500
From: Dave Jones <davej@...emonkey.org.uk>
To: Linux Kernel <linux-kernel@...r.kernel.org>
Cc: Peter Zijlstra <peterz@...radead.org>
Subject: gpf in intel_pmu_lbr_enable_all
general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN
CPU: 1 PID: 15672 Comm: trinity-c5 Not tainted 4.4.0-rc7-gelk-debug+ #3
task: ffff8800a18fc100 ti: ffff88005b6a0000 task.ti: ffff88005b6a0000
RIP: 0010:[<ffffffff9d027f45>] [<ffffffff9d027f45>] intel_pmu_lbr_enable_all+0xb5/0x160
RSP: 0018:ffff88005b6a7a58 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c8
RDX: 0000000000000000 RSI: ffffffff9dd489e0 RDI: ffff8800a3f14c38
RBP: ffff88005b6a7a70 R08: 000000000000038d R09: ffffed00147e2841
R10: ffff8800a3f1420b R11: ffffed00147e2842 R12: 0000000000000001
R13: 0000000000000000 R14: ffff8800a3f13fe0 R15: 0000000000000000
FS: 00007f1ee689c700(0000) GS:ffff8800a3f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000063bac0 CR3: 0000000093f87000 CR4: 00000000000006e0
DR0: 00007f1a95485000 DR1: 00007fcb26c9a000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Stack:
ffff8800a3f13fe0 0000000000000001 0000000000000000 ffff88005b6a7a98
ffffffff9d02c2a3 0000000000000003 00000000000000c1 0000000000000000
ffff88005b6a7aa8 ffffffff9d02c370 ffff88005b6a7b20 ffffffff9d0244df
Call Trace:
[<ffffffff9d02c2a3>] __intel_pmu_enable_all+0x43/0x100
[<ffffffff9d02c370>] intel_pmu_enable_all+0x10/0x20
[<ffffffff9d0244df>] x86_pmu_enable+0x1ef/0x540
[<ffffffff9d20d1e3>] perf_pmu_enable+0x53/0x60
[<ffffffff9d2101f3>] __perf_install_in_context+0x213/0x310
[<ffffffff9d20ffe0>] ? perf_mux_hrtimer_handler+0x3d0/0x3d0
[<ffffffff9d2076b6>] remote_function+0x86/0xa0
[<ffffffff9d207630>] ? __perf_read_group_add.part.60+0x310/0x310
[<ffffffff9d165a47>] generic_exec_single+0x107/0x1a0
[<ffffffff9d207630>] ? __perf_read_group_add.part.60+0x310/0x310
[<ffffffff9d165bd6>] smp_call_function_single+0xf6/0x240
[<ffffffff9d165ae0>] ? generic_exec_single+0x1a0/0x1a0
[<ffffffff9d1141e7>] ? __mutex_init+0x77/0x80
[<ffffffff9d204d67>] task_function_call+0x97/0xc0
[<ffffffff9d204cd0>] ? pmu_dev_release+0x10/0x10
[<ffffffff9d0deff1>] ? preempt_count_sub+0xc1/0x120
[<ffffffff9d20ffe0>] ? perf_mux_hrtimer_handler+0x3d0/0x3d0
[<ffffffff9d31e4af>] ? anon_inode_getfile+0x19f/0x220
[<ffffffff9d207aa5>] perf_install_in_context+0x115/0x1a0
[<ffffffff9d207990>] ? cpu_clock_event_start+0x50/0x50
[<ffffffff9d2064ed>] ? __perf_event_header_size.isra.24+0x6d/0x80
[<ffffffff9d2065bc>] ? perf_event__header_size+0xbc/0xd0
[<ffffffff9d21463b>] SYSC_perf_event_open+0xd2b/0x1090
[<ffffffff9d213910>] ? perf_event_set_output+0x1b0/0x1b0
[<ffffffff9d1e2f20>] ? syscall_exit_register+0x310/0x310
[<ffffffff9d218159>] SyS_perf_event_open+0x9/0x10
[<ffffffff9dae1ef9>] tracesys_phase2+0x84/0x89
Code: 27 00 48 8b 9b 58 0c 00 00 48 85 db 0f 84 b2 00 00 00 48 8d 7b 18 e8 cb 3a 27 00 48 8b 43 18 48 89 c2 b9 c8 01 00 00 48 c1 ea 20 <0f> 30 25 00 02 00 00 48 89 c6 b9 d9 01 00 00 0f 32 48 c1 e2 20
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists