Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753035AbbLDSX5 (ORCPT ); Fri, 4 Dec 2015 13:23:57 -0500 Received: from arcturus.aphlor.org ([188.246.204.175]:44148 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752413AbbLDSXl (ORCPT ); Fri, 4 Dec 2015 13:23:41 -0500 Date: Fri, 4 Dec 2015 13:23:33 -0500 From: Dave Jones To: Linux Kernel Cc: Alexei Starovoitov Subject: bpf/asan related lockup Message-ID: <20151204182333.GB29406@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Linux Kernel , Alexei Starovoitov MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-Spam-Score: -2.9 (--) X-Spam-Report: Spam report generated by SpamAssassin on "arcturus.aphlor.org" Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3600 Lines: 67 Trinity had aparently created a bpf program that upset things greatly. I guess I need to find a way to make it record those somewhere for replaying later. Alexei, any ideas ? Dave NMI watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:991] irq event stamp: 153214 hardirqs last enabled at (153213): [] _raw_spin_unlock_irq+0x2c/0x50 hardirqs last disabled at (153214): [] _raw_spin_lock_irq+0x19/0x80 softirqs last enabled at (153108): [] __do_softirq+0x2b8/0x590 softirqs last disabled at (153103): [] irq_exit+0xf5/0x100 CPU: 0 PID: 991 Comm: kworker/0:1 Tainted: G D W 4.4.0-rc3-think+ #5 Workqueue: events bpf_prog_free_deferred task: ffff880464dab700 ti: ffff8803041d8000 task.ti: ffff8803041d8000 RIP: 0010:[] [] __asan_load4+0x0/0x70 RSP: 0018:ffff8803041dfa08 EFLAGS: 00000202 RAX: 0000000000000003 RBX: ffff880468be39a8 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff880468be39c0 RBP: ffff8803041dfa70 R08: 0000000000000000 R09: 0000000000000001 R10: ffff8803041dfb8f R11: 0000000000000000 R12: ffff880468be39c0 R13: 0000000000000001 R14: ffff8804689dff00 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff880468800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007faeedb04000 CR3: 0000000452548000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Stack: ffffffffa018f2ce 00000000001dfec0 01ff880300000001 ffff8803041dfaf8 ffffffffa0076610 ffffffffa18895d8 ffff8804689dff08 0000000000000004 ffffffffa0076610 ffff8803041dfaf8 0000000000000001 ffffc90000171000 Call Trace: [] ? smp_call_function_many+0x32e/0x410 [] ? rbt_memtype_copy_nth_element+0xd0/0xd0 [] ? rbt_memtype_copy_nth_element+0xd0/0xd0 [] smp_call_function+0x47/0x80 [] ? rbt_memtype_copy_nth_element+0xd0/0xd0 [] on_each_cpu+0x2f/0x90 [] flush_tlb_kernel_range+0xc0/0xd0 [] ? flush_tlb_all+0x20/0x20 [] remove_vm_area+0xaf/0x100 [] __vunmap+0x36/0x180 [] vfree+0x35/0xa0 [] __bpf_prog_free+0x27/0x30 [] bpf_jit_free+0x69/0x6e [] bpf_prog_free_deferred+0x1f/0x30 [] process_one_work+0x3fa/0xa10 [] ? process_one_work+0x334/0xa10 [] ? pwq_dec_nr_in_flight+0x110/0x110 [] worker_thread+0x88/0x6c0 [] ? __schedule+0x645/0xf80 [] ? process_one_work+0xa10/0xa10 [] kthread+0x199/0x1c0 [] ? kthread_create_on_node+0x330/0x330 [] ? preempt_count_sub+0xc1/0x120 [] ? kthread_create_on_node+0x330/0x330 [] ret_from_fork+0x3f/0x70 [] ? kthread_create_on_node+0x330/0x330 Code: 75 e6 80 38 00 74 e1 48 8b 4d 08 ba 01 00 00 00 be 02 00 00 00 e8 31 16 00 00 5d c3 89 ce 83 e6 07 40 38 f2 7e e1 eb d5 0f 1f 00 <48> b8 ff ff ff ff ff 7f ff ff 55 48 39 c7 48 89 e5 76 3d 48 ba -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/