Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935353AbeAKSUO (ORCPT + 1 other); Thu, 11 Jan 2018 13:20:14 -0500 Received: from mail-it0-f48.google.com ([209.85.214.48]:41463 "EHLO mail-it0-f48.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934462AbeAKSUN (ORCPT ); Thu, 11 Jan 2018 13:20:13 -0500 X-Google-Smtp-Source: ACJfBos/xrao23698HjLnKrfPaG8Dk3rI9i3ZHjBuu9hC10tlXu/64ThMu4Y15RV+nlq8t2Lce93jg== From: Vince Weaver X-Google-Original-From: Vince Weaver Date: Thu, 11 Jan 2018 13:20:10 -0500 (EST) X-X-Sender: vince@macbook-air To: Vince Weaver cc: Peter Zijlstra , Ingo Molnar , linux-kernel@vger.kernel.org, Ingo Molnar , Arnaldo Carvalho de Melo , Thomas Gleixner Subject: Re: perf: perf_fuzzer quickly locks up on 4.15-rc7 In-Reply-To: Message-ID: References: <20180108173005.lkglqrixb2ota6g2@gmail.com> <20180109102507.GG6176@hirez.programming.kicks-ass.net> <20180109132602.GA2369@hirez.programming.kicks-ass.net> <20180111091353.GW6176@hirez.programming.kicks-ass.net> <20180111153845.GD6176@hirez.programming.kicks-ass.net> <20180111170347.GG6176@hirez.programming.kicks-ass.net> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Thu, 11 Jan 2018, Vince Weaver wrote: > on the same core2 machine I got this which didn't crash the machine (but > the perf_fuzzer process is stuck) also got this one: Cannot open /sys/kernel/tracing/kprobe_events [ 408.159243] watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [perf_fuzzer:22326] [ 408.193102] CPU: 1 PID: 22326 Comm: perf_fuzzer Tainted: G D 4.15.0-rc7+ #211 [ 408.201507] Hardware name: AOpen DE7000/nMCP7ALPx-DE R1.06 Oct.19.2012, BIOS 080015 10/19/2012 [ 408.210436] RIP: 0010:smp_call_function_single+0xac/0xc3 [ 408.215797] RSP: 0018:ffffc90008307de0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff11 [ 408.223421] RAX: 0000000000000000 RBX: ffffc90008307de0 RCX: 0000000000000000 [ 408.230602] RDX: 0000000000000001 RSI: 00000000000008fb RDI: 0000000000000300 [ 408.237777] RBP: ffffc90008307e30 R08: fffffffc3146e801 R09: 0000000000000003 [ 408.244957] R10: 0000000000000000 R11: ffff88011a98af80 R12: 0000000000000001 [ 408.252137] R13: 0000000000000000 R14: 00007f05bdefb104 R15: 000000000000001f [ 408.259318] FS: 00007f05be10d700(0000) GS:ffff88011fc80000(0000) knlGS:0000000000000000 [ 408.267462] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 408.273258] CR2: 0000000000735980 CR3: 000000011a31a000 CR4: 00000000000407e0 [ 408.280439] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 408.287620] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 408.294798] Call Trace: [ 408.297300] ? perf_event_sysfs_show+0x1d/0x1d [ 408.301792] ? ctx_resched+0x84/0x84 [ 408.305418] ? task_function_call+0x35/0x48 [ 408.309649] task_function_call+0x35/0x48 [ 408.313706] ? perf_ctx_lock+0x1e/0x1e [ 408.317506] event_function_call+0x60/0xa5 [ 408.321652] ? ctx_resched+0x84/0x84 [ 408.325278] ? _perf_event_disable+0x3e/0x3e [ 408.329598] perf_event_for_each_child+0x4d/0x6b [ 408.334267] perf_event_task_enable+0x66/0x9a [ 408.338673] SyS_prctl+0x152/0x3ca [ 408.342126] ? SyS_write+0x69/0x78 [ 408.345581] entry_SYSCALL_64_fastpath+0x17/0x70 [ 408.350248] RIP: 0033:0x7f05bdc3ee7a [ 408.353872] RSP: 002b:00007ffc80e425c8 EFLAGS: 00000202 [ 408.353874] Code: 01 74 04 f3 90 eb f4 83 48 18 01 48 89 d1 44 89 d7 48 89 f2 48 89 de e8 c9 fe ff ff 45 85 e4 74 12 8b 53 18 80 e2 01 74 04 f3 90 f4 eb 04 0f ff eb ad 48 83 c4 38 5b 41 5a 41 5c 5d 49 8d 62