Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp4180892pxb; Mon, 30 Aug 2021 21:48:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxE6Un1ollpsJBDef+M7xe1JnW1upuKovxknIPjSID16zpj+jHwS3tThECZGyArMqj1EY8r X-Received: by 2002:a17:906:39d8:: with SMTP id i24mr20687616eje.49.1630385316159; Mon, 30 Aug 2021 21:48:36 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z1si394529eji.631.2021.08.30.21.48.11; Mon, 30 Aug 2021 21:48:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=Y1m8mNK9; arc=fail (body hash mismatch); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234011AbhHaEqu (ORCPT + 99 others); Tue, 31 Aug 2021 00:46:50 -0400 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:6664 "EHLO mx0b-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233580AbhHaEqs (ORCPT ); Tue, 31 Aug 2021 00:46:48 -0400 Received: from pps.filterd (m0109331.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 17V4cT1E012213; Mon, 30 Aug 2021 21:45:53 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : mime-version; s=facebook; bh=6a19a7vBpaK6UD//2GZudHy/oF9yqncxizEIWUIb1t0=; b=Y1m8mNK9hgVA/gT3XpCsZVpRsspBC7vH5UvQMN39EsgDfw4ZBXCvEFRJiDUo3ByLtmMy qSnxmdqTUpSUOek5qI7AsjEHLDIe72yzCBjDKRew5VlZ3lytaXDGf2cWOzpNWd4bUXam 24tU/30M1KxYj1SpcKmqDW7+pKH3BbRvSfk= Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com with ESMTP id 3artudy5md-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Mon, 30 Aug 2021 21:45:53 -0700 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (100.104.31.183) by o365-in.thefacebook.com (100.104.35.172) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Mon, 30 Aug 2021 21:45:51 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d4FKdRirUJckWLJ3Gj4Od9UKHyyLBbTAv7D1bYab80sURp0BU+iMarV9YTmGN7+mZA0DPjOmshYdusZKkwGxabz7P9yH1fmJNlMXv52BGT9fiWE9lky3ausF5A6l1ppxyNw1B1cK0Tjk5hVsyxP24sNR2H3p79cZHFk45G4zVWlNobb/HBjn+Fc6dn57gX7h0oTG/YSyMFnACQc2OvkGIbFo+ZQApnaW7F187woK/n2ZfbTH09mFPFEaLL2xBjybmw94q1jtgS/K4QcHDk+fJyap7a7qVZjAHKwEcHNzbtuunKO1cqAkp3f/YgtLyJY7SPJoPNN1i8wr/AjRk7N7Nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XBFLBff0mSpuUbrqgYyQRX1bnoxHhApsezz1GWtVg44=; b=CebkhNW6RwHd/nchpbv3FcGWjZM+obZoJwlepH/2tR6xvKN2y3PHopByqYafhGEBEKHCxKMlf0B4MIV6yo2VMwPUGAYRIFKFeRNGwH/yIye38tD1PPPwdLCuB4YQplVCbj6H6icLmMbYDJVh13yP/XLsDHieqldPoCYtIGkHuNARd8dZpCn5rk3JZg0OMIyYx4NiZUxrOBLjEbqdKMlZwmpiQg9dAuSTdqoOqdy4rs35lCJMwQ3IOZwP5zO12urqMT60Ym2yopK7w27OLvQgVFmXhYzng9eHO+tY+6yGktVz7XBVO/ohHTndH+qrRltR5nJcF8i6O0YOv9gymp5BLQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=fb.com; dmarc=pass action=none header.from=fb.com; dkim=pass header.d=fb.com; arc=none Received: from SA1PR15MB5109.namprd15.prod.outlook.com (2603:10b6:806:1dc::10) by SA1PR15MB5080.namprd15.prod.outlook.com (2603:10b6:806:1df::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20; Tue, 31 Aug 2021 04:45:49 +0000 Received: from SA1PR15MB5109.namprd15.prod.outlook.com ([fe80::7d66:9b36:b482:af0f]) by SA1PR15MB5109.namprd15.prod.outlook.com ([fe80::7d66:9b36:b482:af0f%6]) with mapi id 15.20.4457.024; Tue, 31 Aug 2021 04:45:49 +0000 From: Song Liu To: kernel test robot CC: 0day robot , LKML , LKP , "open list:BPF (Safe dynamic programs and tools)" , Arnaldo Carvalho de Melo , "Peter Zijlstra" , Ingo Molnar , Kernel Team Subject: Re: [selftests/bpf] 8dff2c1958: BUG:using_smp_processor_id()in_preemptible Thread-Topic: [selftests/bpf] 8dff2c1958: BUG:using_smp_processor_id()in_preemptible Thread-Index: AQHXngVqrRiXo8BxXUa5aUQ+Ts9oTquNChiA Date: Tue, 31 Aug 2021 04:45:49 +0000 Message-ID: <59223446-251F-41A4-87ED-A37A181262CC@fb.com> References: <20210831013015.GA4286@xsang-OptiPlex-9020> In-Reply-To: <20210831013015.GA4286@xsang-OptiPlex-9020> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3654.120.0.1.13) authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=fb.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: cdb7ec98-d4ee-420d-695f-08d96c3a34d2 x-ms-traffictypediagnostic: SA1PR15MB5080: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-fb-source: Internal x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR15MB5109.namprd15.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(366004)(966005)(71200400001)(53546011)(8936002)(6506007)(2906002)(2616005)(66446008)(4326008)(64756008)(30864003)(316002)(122000001)(508600001)(36756003)(6916009)(6486002)(5660300002)(33656002)(186003)(38070700005)(76116006)(91956017)(86362001)(83380400001)(66556008)(54906003)(66476007)(38100700002)(8676002)(66946007)(6512007)(45980500001)(579004)(559001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?gLB/jBdhx0Ag3RFJCJb1bBmMTMffC22CV5A+EFz/D7cw3jP38rypeFM71ZDG?= =?us-ascii?Q?g+dNHrlFhs0dWCSNy4Au4YfHlW9SGWEmTquk2/ukiZdDWTL/iO9sKbOwPq4d?= =?us-ascii?Q?DIRU7gU89euq/AtehO7iZR5tu7fTbFQzZxWASw++GijF0X1ot707uS3gTcvy?= =?us-ascii?Q?CKldz04tz+iNEzLvNw4CAAobHq0soNAIZh22DfITBG/6q9GZ8JPo0mTmH6OP?= =?us-ascii?Q?ICXJ8byYqjbQiMDzYsTDH+GtxMQ6wbQBv/bmr3aOyo1vuM0u2dK37dJ8jxvP?= =?us-ascii?Q?m8SWxLnG3YTzLd5/CV3GeypqFc4HChyJuPJw9NvY+IdfpgoeJMr0w1+Kq/MF?= =?us-ascii?Q?uo/gnBqxL4yJpJwy/Jt2YMZ15jEqvHlFbqTzHW0GPLQdJAFUVBupm5sDHpbn?= =?us-ascii?Q?Hyo9nlZfvfq2yyyi1Lq22Fqcfq46XBYCu/uETekwOR/52bOiTt0HOslptboi?= =?us-ascii?Q?bp3m4yfb26Abjm2b61AYyAB68fQzHrRm/g9bN5GTHc9ORRcXqOKDrWjykgG3?= =?us-ascii?Q?5XwKVtvOU5lfnE7R6nCCinzDponPAkQWvCqEVmBgsEpGaBShaZ1Df1sJjc2t?= =?us-ascii?Q?MmEhoLLuYA+s1K+xj2toEOyRqnMomGWySv3bxBRCPJfyNVkbbgM3Lr6FiNnd?= =?us-ascii?Q?Kdgj4gerdJxnLspaI+3zg09vpUpUv7i8bhuF1X/R2P+xbgWGsC0I3jzmpSZs?= =?us-ascii?Q?caY9d0NWPFEJfEXah/H2Lzhk4UKeGa+w8dREfFh2MxaneX1JyXE5Oq+Z6ceP?= =?us-ascii?Q?WLhHiO0c5Y4T5pzy0BsBPYfnt7qNtu2qMWqGvJGFwhGvr8DJxxHtmzIGwj0j?= =?us-ascii?Q?Yua3WpN6NhGVSzAfLgFM4z8zcAPktyhIwC1ql3Kqz4IGGqqPRt+mQJ6j9OeQ?= =?us-ascii?Q?OafrzlDe6o58BFMbZGXLi5SljLsgni27yu3uPHKqYQ1EswFiOgGcX1pwISQv?= =?us-ascii?Q?o8/Xt0XS20hvv255UiqXP6gOf75fXId/gGRPFv31iTNn1+ocXaJ5KQ1F5bM6?= =?us-ascii?Q?p41hvL4dFhGEDH1DV3rh/AM0HsAxxWiJCensjZTUXiTWtRWH0sNMhUmgK1zF?= =?us-ascii?Q?0pUTRnOjtCHVn9nhZIie8fOC9DDFtQpj+UmWS6Rp/fY8J2n/9PHKl9kpzKlP?= =?us-ascii?Q?nhfOic8Ev5Rsosa2bnL86RIV1+RadOUQlvCo4rp3RgKRHlloLfLG86bOQJkJ?= =?us-ascii?Q?Cw5ZDE8mM/VgDQUQvOXsO+/JyjlHG+bNoMhNwGWVh/b16NwF4LpweHdh+zUM?= =?us-ascii?Q?mB4KTbZAnzL0ZgcuXefhMGF1BV+G32BG+Zbiadovr/apo1oxEAk5Q965KgbS?= =?us-ascii?Q?bbpIpfiWxWM/0g8tb9g5ukv13TML6yYLT/BCjIsOFMfSPNoFdjJi8lTuVYLZ?= =?us-ascii?Q?ENIY9LA=3D?= Content-Type: text/plain; charset="us-ascii" Content-ID: X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SA1PR15MB5109.namprd15.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: cdb7ec98-d4ee-420d-695f-08d96c3a34d2 X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Aug 2021 04:45:49.8638 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0KM1k7kf5nfVgYxRuGN+JtzwivYZQY8xQehU2DkwwIshZrcnFfOuXAbSFNZcBb+vWoedeYgNv+vRDpznrD+LwA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR15MB5080 X-OriginatorOrg: fb.com X-Proofpoint-GUID: OlqCjxjCazifn0X5jg4PevTs3odqtx5f X-Proofpoint-ORIG-GUID: OlqCjxjCazifn0X5jg4PevTs3odqtx5f X-Proofpoint-UnRewURL: 1 URL was un-rewritten MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391,18.0.790 definitions=2021-08-30_06:2021-08-30,2021-08-30 signatures=0 X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 suspectscore=0 mlxscore=0 spamscore=0 mlxlogscore=999 adultscore=0 phishscore=0 malwarescore=0 clxscore=1015 lowpriorityscore=0 bulkscore=0 impostorscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2107140000 definitions=main-2108310025 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Aug 30, 2021, at 6:30 PM, kernel test robot wrote: > > > > Greeting, > > FYI, we noticed the following commit (built with gcc-9): > > commit: 8dff2c1958c234e90dff289a2034217b293985e4 ("[PATCH bpf-next 3/3] selftests/bpf: add test for bpf_get_branch_trace") > url: https://github.com/0day-ci/linux/commits/Song-Liu/bpf-introduce-bpf_get_branch_trace/20210824-140315 > base: https://git.kernel.org/cgit/linux/kernel/git/bpf/bpf-next.git master > > in testcase: kernel-selftests > version: kernel-selftests-x86_64-ebaa603b-1_20210825 > with following parameters: > > group: bpf > ucode: 0xde > > test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel. > test-url: https://www.kernel.org/doc/Documentation/kselftest.txt > > > on test machine: 4 threads 1 sockets Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz with 32G memory > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): > > > > If you fix the issue, kindly add following tag > Reported-by: kernel test robot > > > kern :err : [ 136.592584] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 hmm... I guess we need to move the call to after migrate_disable(). > kern :warn : [ 136.593280] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1868) > kern :warn : [ 136.593811] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.594609] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.595501] Call Trace: > kern :warn : [ 136.595776] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.596136] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.596565] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1868) > kern :warn : [ 136.597024] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.597434] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.597968] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.598331] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.598832] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.599172] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.599575] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.599962] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.600293] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.600711] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.601122] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.601481] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.601880] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.602239] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.602639] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.603034] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.603403] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.603740] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.604111] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.604560] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.605018] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.605455] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.605903] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.606268] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.607706] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.608350] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.609058] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.609656] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.610260] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.610920] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.611581] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.612259] caller is intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:780) > kern :warn : [ 136.612817] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.613653] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.614642] Call Trace: > kern :warn : [ 136.614904] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.615293] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.615759] intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:780) > kern :warn : [ 136.616221] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1871) > kern :warn : [ 136.616705] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.617068] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.617528] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.617923] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.618367] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.618692] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.619054] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.619418] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.619819] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.620237] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.620581] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.620976] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.621354] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.621695] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.622150] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.622491] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.622849] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.623262] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.623605] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.624072] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.624531] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.624930] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.625417] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.625835] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.627326] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.628018] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.628623] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.629262] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.629847] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.630469] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.631171] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.631873] caller is intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:782 arch/x86/events/intel/lbr.c:778) > kern :warn : [ 136.632412] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.633255] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.634100] Call Trace: > kern :warn : [ 136.634348] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.634741] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.635190] intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:782 arch/x86/events/intel/lbr.c:778) > kern :warn : [ 136.635611] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1871) > kern :warn : [ 136.636065] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.636466] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.636981] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.637347] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.637863] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.638206] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.638582] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.638944] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.639273] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.639656] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.640054] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.640412] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.640810] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.641169] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.641568] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.641963] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.642343] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.642718] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.643075] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.643575] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.644033] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.644437] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.644884] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.645231] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.646685] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.647304] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.647966] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.648588] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.649246] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.649869] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.650512] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.651226] caller is intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:1003) > kern :warn : [ 136.651691] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.652530] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.653440] Call Trace: > kern :warn : [ 136.653762] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.654133] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.654603] intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:1003) > kern :warn : [ 136.654966] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1873) > kern :warn : [ 136.655408] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.655754] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.656180] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.656562] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.656992] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.657332] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.657695] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.658040] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.658422] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.658856] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.659272] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.659613] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.660049] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.660406] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.660805] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.661220] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.661560] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.661919] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.662298] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.662746] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.663205] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.663605] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.664051] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.664383] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.665964] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.666650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.667271] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.667893] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.668517] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.669104] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.669728] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.670431] caller is intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:1011) > kern :warn : [ 136.670867] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.671765] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.672649] Call Trace: > kern :warn : [ 136.672912] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.673301] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.673765] intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:1011) > kern :warn : [ 136.674149] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1873) > kern :warn : [ 136.674604] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.674968] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.675448] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.675865] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.676331] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.676672] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.677067] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.677413] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.677799] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.678234] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.678597] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.678991] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.679388] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.679747] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.680146] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.680505] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.680863] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.681240] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.681582] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.682043] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.682503] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.682903] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.683388] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.683771] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.685257] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.685878] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.686512] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.687152] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.687739] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.688399] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.689060] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.689760] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1872) > kern :warn : [ 136.690329] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.691130] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.691976] Call Trace: > kern :warn : [ 136.692257] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.692645] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.693130] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1872) > kern :warn : [ 136.693629] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.694029] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.694472] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.694889] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.695319] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.695693] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.696090] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.696436] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.696782] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.697181] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.697543] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.697937] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.698368] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.698762] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.699161] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.699556] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.699914] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.700291] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.700667] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.701133] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.701629] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.702029] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.702478] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.702824] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.704386] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.705038] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.705625] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.706267] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.706836] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.707496] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.708104] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.708822] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1875) > kern :warn : [ 136.709398] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.710237] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.711142] Call Trace: > kern :warn : [ 136.711429] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.711838] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.712273] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1875) > kern :warn : [ 136.712764] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.713127] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.713572] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.713953] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.714418] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.714794] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.715214] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.715539] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.715887] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.716307] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.716651] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.717008] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.717407] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.717766] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.718179] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.718549] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.718906] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.719264] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.719623] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.720089] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.720585] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.721058] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.721489] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.721854] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.723348] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.724036] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.724625] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.725212] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.725798] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.726457] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.727118] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.727822] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:772) > kern :warn : [ 136.728317] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.729158] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.730037] Call Trace: > kern :warn : [ 136.730301] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.730671] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.731121] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:772) > kern :warn : [ 136.731586] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.731987] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.732467] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.732884] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.733335] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.733656] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.734076] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.734401] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.734750] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.735204] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.735549] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.735906] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.736306] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.736665] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.737077] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.737416] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.737847] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.738204] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.738581] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.739031] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.739490] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.739921] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.740400] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.740784] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.742236] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.742870] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.743514] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.744099] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.744723] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.745328] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.746006] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.746743] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:774 arch/x86/events/intel/lbr.c:770) > kern :warn : [ 136.747218] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.748040] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.749026] Call Trace: > kern :warn : [ 136.749274] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.749627] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.750131] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:774 arch/x86/events/intel/lbr.c:770) > kern :warn : [ 136.750538] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.750938] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.751416] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.751797] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.752281] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.752604] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.752966] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.753311] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.753658] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.754091] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.754453] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.754846] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.755245] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.755589] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.756007] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.756349] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.756795] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.757153] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.757511] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.758011] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.758471] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.758871] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.759319] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.759666] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.761174] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.761776] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.762436] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.763021] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.763680] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.764266] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :err : [ 136.764875] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262 > kern :warn : [ 136.765626] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:190 arch/x86/events/intel/lbr.c:775 arch/x86/events/intel/lbr.c:770) > kern :warn : [ 136.766173] CPU: 1 PID: 5262 Comm: test_progs Tainted: G W OE 5.14.0-rc5-01207-g8dff2c1958c2 #1 > kern :warn : [ 136.767068] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018 > kern :warn : [ 136.767986] Call Trace: > kern :warn : [ 136.768248] dump_stack_lvl (lib/dump_stack.c:106) > kern :warn : [ 136.768620] check_preemption_disabled (lib/smp_processor_id.c:49) > kern :warn : [ 136.769141] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:190 arch/x86/events/intel/lbr.c:775 arch/x86/events/intel/lbr.c:770) > kern :warn : [ 136.769570] __bpf_prog_enter (kernel/bpf/trampoline.c:577) > kern :warn : [ 136.769933] bpf_trampoline_6442562768_0+0x3b/0x1000 > kern :warn : [ 136.770407] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) > kern :warn : [ 136.770790] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) > kern :warn : [ 136.771237] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) > kern :warn : [ 136.771594] ? __sys_bpf (kernel/bpf/syscall.c:4629) > kern :warn : [ 136.771957] __x64_sys_bpf (kernel/bpf/syscall.c:4689) > kern :warn : [ 136.772322] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) > kern :warn : [ 136.772688] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.773087] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.773463] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.773803] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.774202] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.774563] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.774961] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.775320] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.775678] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.776035] ? do_syscall_64 (arch/x86/entry/common.c:87) > kern :warn : [ 136.776424] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.776962] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) > kern :warn : [ 136.777458] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) > kern :warn : [ 136.777858] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) > kern :warn : [ 136.778327] RIP: 0033:0x7f0fcbd69f59 > kern :warn : [ 136.778655] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48 > All code > ======== > 0: 00 c3 add %al,%bl > 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) > 9: 00 00 00 > c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 11: 48 89 f8 mov %rdi,%rax > 14: 48 89 f7 mov %rsi,%rdi > 17: 48 89 d6 mov %rdx,%rsi > 1a: 48 89 ca mov %rcx,%rdx > 1d: 4d 89 c2 mov %r8,%r10 > 20: 4d 89 c8 mov %r9,%r8 > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 28: 0f 05 syscall > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > 30: 73 01 jae 0x33 > 32: c3 retq > 33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41 > 3a: f7 d8 neg %eax > 3c: 64 89 01 mov %eax,%fs:(%rcx) > 3f: 48 rex.W > > Code starting with the faulting instruction > =========================================== > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > 6: 73 01 jae 0x9 > 8: c3 retq > 9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17 > 10: f7 d8 neg %eax > 12: 64 89 01 mov %eax,%fs:(%rcx) > 15: 48 rex.W > kern :warn : [ 136.780125] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141 > kern :warn : [ 136.780727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59 > kern :warn : [ 136.781313] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a > kern :warn : [ 136.781899] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700 > kern :warn : [ 136.782535] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0 > kern :warn : [ 136.783177] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000 > kern :info : [ 138.164543] perf: interrupt took too long (3153 > 3143), lowering kernel.perf_event_max_sample_rate to 63000 > kern :info : [ 138.165345] perf: interrupt took too long (3153 > 3143), lowering kernel.perf_event_max_sample_rate to 63000 > kern :info : [ 138.166457] perf: interrupt took too long (3945 > 3941), lowering kernel.perf_event_max_sample_rate to 50000 > kern :info : [ 138.168213] perf: interrupt took too long (4932 > 4931), lowering kernel.perf_event_max_sample_rate to 40000 > user :notice: [ 139.355105] # run_tests_skb_less:FAIL:ipv6-frag nhoff=0/14 thoff=0/62 addr_proto=0x0/0x86dd is_frag=0/1 is_first_frag=0/1 is_encap=0/0 ip_proto=0x0/0x6 n_proto=0x0/0xdd86 flow_label=0x0/0x0 sport=0/80 dport=0/8080 > > user :notice: [ 139.359537] # run_tests_skb_less:FAIL:ipv6-frag bpf_map_delete_elem -2 > > user :notice: [ 139.362850] # test_skb_less_link_create:PASS:bpf_link__destroy 0 nsec > > user :notice: [ 139.364974] # #46 flow_dissector:FAIL > > user :notice: [ 139.367223] # #47 flow_dissector_load_bytes:OK > > user :notice: [ 139.370893] # #48/1 flow_dissector_reattach/flow dissector prog attach, prog attach (init_net):OK > > user :notice: [ 139.375234] # #48/2 flow_dissector_reattach/flow dissector link create, link create (init_net):OK > > user :notice: [ 139.379842] # #48/3 flow_dissector_reattach/flow dissector prog attach, link create (init_net):OK > > user :notice: [ 139.382497] # #48/4 flow_dissector_reattach/flow dissector link create, prog attach (init_net):OK > > user :notice: [ 139.385061] # #48/5 flow_dissector_reattach/flow dissector link create, prog detach (init_net):OK > > user :notice: [ 139.387717] # #48/6 flow_dissector_reattach/flow dissector prog attach, detach, query (init_net):OK > > user :notice: [ 139.390353] # #48/7 flow_dissector_reattach/flow dissector link create, close, query (init_net):OK > > user :notice: [ 139.392961] # #48/8 flow_dissector_reattach/flow dissector link update no old prog (init_net):OK > > user :notice: [ 139.395690] # #48/9 flow_dissector_reattach/flow dissector link update with replace old prog (init_net):OK > > user :notice: [ 139.398424] # #48/10 flow_dissector_reattach/flow dissector link update with same prog (init_net):OK > > user :notice: [ 139.401090] # #48/11 flow_dissector_reattach/flow dissector link update invalid opts (init_net):OK > > user :notice: [ 139.403722] # #48/12 flow_dissector_reattach/flow dissector link update invalid prog (init_net):OK > > user :notice: [ 139.406231] # #48/13 flow_dissector_reattach/flow dissector link update netns gone (init_net):OK > > user :notice: [ 139.408610] # #48/14 flow_dissector_reattach/flow dissector link get info (init_net):OK > > user :notice: [ 139.411035] # #48/15 flow_dissector_reattach/flow dissector prog attach, prog attach:OK > > user :notice: [ 139.413359] # #48/16 flow_dissector_reattach/flow dissector link create, link create:OK > > user :notice: [ 139.415751] # #48/17 flow_dissector_reattach/flow dissector prog attach, link create:OK > > user :notice: [ 139.417999] # #48/18 flow_dissector_reattach/flow dissector link create, prog attach:OK > > user :notice: [ 139.420432] # #48/19 flow_dissector_reattach/flow dissector link create, prog detach:OK > > user :notice: [ 139.422821] # #48/20 flow_dissector_reattach/flow dissector prog attach, detach, query:OK > > user :notice: [ 139.425174] # #48/21 flow_dissector_reattach/flow dissector link create, close, query:OK > > user :notice: [ 139.427447] # #48/22 flow_dissector_reattach/flow dissector link update no old prog:OK > > user :notice: [ 139.430055] # #48/23 flow_dissector_reattach/flow dissector link update with replace old prog:OK > > user :notice: [ 139.432549] # #48/24 flow_dissector_reattach/flow dissector link update with same prog:OK > > user :notice: [ 139.434965] # #48/25 flow_dissector_reattach/flow dissector link update invalid opts:OK > > user :notice: [ 139.437261] # #48/26 flow_dissector_reattach/flow dissector link update invalid prog:OK > > user :notice: [ 139.439471] # #48/27 flow_dissector_reattach/flow dissector link update netns gone:OK > > user :notice: [ 139.441628] # #48/28 flow_dissector_reattach/flow dissector link get info:OK > > user :notice: [ 139.443097] # #48 flow_dissector_reattach:OK > > user :notice: [ 139.444238] # #49/1 for_each/hash_map:OK > > user :notice: [ 139.445375] # #49/2 for_each/array_map:OK > > user :notice: [ 139.446309] # #49 for_each:OK > > user :notice: [ 139.448091] # test_get_branch_trace:PASS:get_branch_trace__open_and_load 0 nsec > > user :notice: [ 139.449839] # test_get_branch_trace:PASS:kallsyms_find 0 nsec > > > > To reproduce: > > git clone https://github.com/intel/lkp-tests.git > cd lkp-tests > bin/lkp install job.yaml # job file is attached in this email > bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run > bin/lkp run generated-yaml-file > > > > --- > 0DAY/LKP+ Test Infrastructure Open Source Technology Center > https://lists.01.org/hyperkitty/list/lkp@lists.01.org Intel Corporation > > Thanks, > Oliver Sang > >