[Kernel-packages] [Bug 1763352] Re: kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

2018-04-17 Thread Seth Forshee
*** This bug is a duplicate of bug 1763454 ***
https://bugs.launchpad.net/bugs/1763454

** This bug has been marked a duplicate of bug 1763454
   bpf_map_lookup_elem: BUG: unable to handle kernel paging request

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763352

Title:
  kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Triaged

Bug description:
  Using Ubuntu 16.04 LTS with 4.4.0 kernel on x86_64
  After kernel update from 4.4.0-116 to 4.4.0-119 running an eBPF tool to log 
slow ext4 I/O (bcc-tool ext4slower) causes a kernel panic in 
bpf_map_update_elem.

  Steps to reproduce:

  * install bcc-tools 0.5.0-1 (https://github.com/iovisor/bcc), packages: 
bcc-tools, libbcc, python-bcc, libbcc-examples; from repo.iovisor.org
  * install kernel 4.4.0-119 (linux-image-4.4.0-119-generic 
linux-image-extra-4.4.0-119 linux-headers-4.4.0-119 
linux-headers-4.4.0-119-generic)
  * reboot
  * run ext4slower (sudo /usr/share/bcc/tools/ext4slower)
  * system crashes

  With kernel 4.4.0-116 ext4slower runs fine.

  uname -a:
  Linux  4.4.0-119-generic #143-Ubuntu SMP Mon Apr 2 16:08:24 UTC 
2018 x86_64 x86_64 x86_64 GNU/Linux

  BCC tools version: 0.5.0-1

  Log of the kernel panic including backtrace:

  [   59.635900] BUG: unable to handle kernel paging request at b98aa6a8
  [   59.642345] IP: [] bpf_map_update_elem+0x6/0x20
  [   59.645782] PGD 0
  [   59.647150] Oops:  [#1] SMP
  [   59.649808] Modules linked in: crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel ppdev aesni_intel aes_x86_64 lrw gf128mul glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 8250_fintek parport_pc 
parport mac_hid autofs4 hid_generic usbhid hid ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops psmouse drm pata_acpi floppy
  [   59.672373] CPU: 0 PID: 1 Comm: systemd Not tainted 4.4.0-119-generic 
#143-Ubuntu
  [   59.676407] Hardware name: OpenStack Foundation OpenStack Nova, BIOS 
1.10.2-2 04/01/2014
  [   59.680079] task: 88013a49 ti: 88013a48c000 task.ti: 
88013a48c000
  [   59.684124] RIP: 0010:[]  [] 
bpf_map_update_elem+0x6/0x20
  [   59.689097] RSP: 0018:88013a48f980  EFLAGS: 00010086
  [   59.691618] RAX: 8117cd90 RBX: c9818170 RCX: 

  [   59.695739] RDX: 88013a48fbd0 RSI: 88013a48fbe8 RDI: 
b98aa680
  [   59.699444] RBP: 88013a48fc08 R08: 880138d6b180 R09: 
0800
  [   59.703264] R10: 88013a49 R11: 0246 R12: 

  [   59.707164] R13: 8800ba0f4400 R14: 88013fc10020 R15: 
88013a48fd58
  [   59.72] FS:  7f4039da58c0() GS:88013fc0() 
knlGS:
  [   59.715861] CS:  0010 DS:  ES:  CR0: 80050033
  [   59.719025] CR2: b98aa6a8 CR3: bb65e000 CR4: 
00160670
  [   59.722937] DR0:  DR1:  DR2: 

  [   59.727210] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   59.731074] Stack:
  [   59.732149]  88013a48fc08 81177411 88013fc20500 

  [   59.735760]  b98aa680 88013a48fbe8 88013a48fbd0 

  [   59.740058]  880138d6b180 88013a48fe58 8800bb5ab000 

  [   59.744100] Call Trace:
  [   59.745434]  [] ? __bpf_prog_run+0x7a1/0x1360
  [   59.748289]  [] ? update_curr+0x79/0x170
  [   59.751044]  [] ? vp_notify+0x16/0x20
  [   59.753601]  [] ? dequeue_entity+0x41b/0xa80
  [   59.756354]  [] ? update_load_avg+0x219/0x7d0
  [   59.759171]  [] ? set_next_entity+0x9c/0xb0
  [   59.761890]  [] ? __switch_to+0x1dc/0x5c0
  [   59.764667]  [] ? __schedule+0x341/0x7f0
  [   59.767155]  [] ? blk_mq_flush_plug_list+0x128/0x150
  [   59.770253]  [] ? bit_wait+0x60/0x60
  [   59.772782]  [] trace_call_bpf+0x37/0x50
  [   59.775336]  [] kprobe_perf_func+0x37/0x250
  [   59.778264]  [] ? ktime_get+0x3e/0xb0
  [   59.780724]  [] ? delayacct_end+0x56/0x60
  [   59.783589]  [] kprobe_dispatcher+0x31/0x50
  [   59.786490]  [] aggr_pre_handler+0x45/0x80
  [   59.789534]  [] ? generic_file_read_iter+0x1/0x690
  [   59.792407]  [] kprobe_ftrace_handler+0xb6/0x120
  [   59.795329]  [] ? generic_file_read_iter+0x5/0x690
  [   59.798453]  [] ftrace_ops_recurs_func+0x58/0xb0
  [   59.801948]  [] 0xc00180d5
  [   59.804357]  [] ? filemap_write_and_wait_range+0x70/0x70
  [   59.808022]  [] ? generic_file_read_iter+0x1/0x690
  [   59.811225]  [] generic_file_read_iter+0x5/0x690
  [   59.814332]  [] new_sync_read+0x9e/0xe0
  [   59.817079]  [] ? generic_file_read_iter+0x5/0x690
  [   59.820120]  [] ? kretprobe_trampoline_holder+0x9/0x9
  [   59.825007]  [] __vfs_read+0x29/0x40
  [   59.827528]  [] vfs_read+0x86/0x130
  [   59.829931]  [] 

[Kernel-packages] [Bug 1763352] Re: kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

2018-04-17 Thread s11-cloudstackers
The same issue was reported in LP#1763454
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763454

Seth Forshee provided a patch there that solves the issue here as well.
His patch has been sent to the mailing list already.

>From my point of view we could treat this ticket here as a duplicate of
LP#1763454

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763352

Title:
  kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Triaged

Bug description:
  Using Ubuntu 16.04 LTS with 4.4.0 kernel on x86_64
  After kernel update from 4.4.0-116 to 4.4.0-119 running an eBPF tool to log 
slow ext4 I/O (bcc-tool ext4slower) causes a kernel panic in 
bpf_map_update_elem.

  Steps to reproduce:

  * install bcc-tools 0.5.0-1 (https://github.com/iovisor/bcc), packages: 
bcc-tools, libbcc, python-bcc, libbcc-examples; from repo.iovisor.org
  * install kernel 4.4.0-119 (linux-image-4.4.0-119-generic 
linux-image-extra-4.4.0-119 linux-headers-4.4.0-119 
linux-headers-4.4.0-119-generic)
  * reboot
  * run ext4slower (sudo /usr/share/bcc/tools/ext4slower)
  * system crashes

  With kernel 4.4.0-116 ext4slower runs fine.

  uname -a:
  Linux  4.4.0-119-generic #143-Ubuntu SMP Mon Apr 2 16:08:24 UTC 
2018 x86_64 x86_64 x86_64 GNU/Linux

  BCC tools version: 0.5.0-1

  Log of the kernel panic including backtrace:

  [   59.635900] BUG: unable to handle kernel paging request at b98aa6a8
  [   59.642345] IP: [] bpf_map_update_elem+0x6/0x20
  [   59.645782] PGD 0
  [   59.647150] Oops:  [#1] SMP
  [   59.649808] Modules linked in: crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel ppdev aesni_intel aes_x86_64 lrw gf128mul glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 8250_fintek parport_pc 
parport mac_hid autofs4 hid_generic usbhid hid ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops psmouse drm pata_acpi floppy
  [   59.672373] CPU: 0 PID: 1 Comm: systemd Not tainted 4.4.0-119-generic 
#143-Ubuntu
  [   59.676407] Hardware name: OpenStack Foundation OpenStack Nova, BIOS 
1.10.2-2 04/01/2014
  [   59.680079] task: 88013a49 ti: 88013a48c000 task.ti: 
88013a48c000
  [   59.684124] RIP: 0010:[]  [] 
bpf_map_update_elem+0x6/0x20
  [   59.689097] RSP: 0018:88013a48f980  EFLAGS: 00010086
  [   59.691618] RAX: 8117cd90 RBX: c9818170 RCX: 

  [   59.695739] RDX: 88013a48fbd0 RSI: 88013a48fbe8 RDI: 
b98aa680
  [   59.699444] RBP: 88013a48fc08 R08: 880138d6b180 R09: 
0800
  [   59.703264] R10: 88013a49 R11: 0246 R12: 

  [   59.707164] R13: 8800ba0f4400 R14: 88013fc10020 R15: 
88013a48fd58
  [   59.72] FS:  7f4039da58c0() GS:88013fc0() 
knlGS:
  [   59.715861] CS:  0010 DS:  ES:  CR0: 80050033
  [   59.719025] CR2: b98aa6a8 CR3: bb65e000 CR4: 
00160670
  [   59.722937] DR0:  DR1:  DR2: 

  [   59.727210] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   59.731074] Stack:
  [   59.732149]  88013a48fc08 81177411 88013fc20500 

  [   59.735760]  b98aa680 88013a48fbe8 88013a48fbd0 

  [   59.740058]  880138d6b180 88013a48fe58 8800bb5ab000 

  [   59.744100] Call Trace:
  [   59.745434]  [] ? __bpf_prog_run+0x7a1/0x1360
  [   59.748289]  [] ? update_curr+0x79/0x170
  [   59.751044]  [] ? vp_notify+0x16/0x20
  [   59.753601]  [] ? dequeue_entity+0x41b/0xa80
  [   59.756354]  [] ? update_load_avg+0x219/0x7d0
  [   59.759171]  [] ? set_next_entity+0x9c/0xb0
  [   59.761890]  [] ? __switch_to+0x1dc/0x5c0
  [   59.764667]  [] ? __schedule+0x341/0x7f0
  [   59.767155]  [] ? blk_mq_flush_plug_list+0x128/0x150
  [   59.770253]  [] ? bit_wait+0x60/0x60
  [   59.772782]  [] trace_call_bpf+0x37/0x50
  [   59.775336]  [] kprobe_perf_func+0x37/0x250
  [   59.778264]  [] ? ktime_get+0x3e/0xb0
  [   59.780724]  [] ? delayacct_end+0x56/0x60
  [   59.783589]  [] kprobe_dispatcher+0x31/0x50
  [   59.786490]  [] aggr_pre_handler+0x45/0x80
  [   59.789534]  [] ? generic_file_read_iter+0x1/0x690
  [   59.792407]  [] kprobe_ftrace_handler+0xb6/0x120
  [   59.795329]  [] ? generic_file_read_iter+0x5/0x690
  [   59.798453]  [] ftrace_ops_recurs_func+0x58/0xb0
  [   59.801948]  [] 0xc00180d5
  [   59.804357]  [] ? filemap_write_and_wait_range+0x70/0x70
  [   59.808022]  [] ? generic_file_read_iter+0x1/0x690
  [   59.811225]  [] generic_file_read_iter+0x5/0x690
  [   59.814332]  [] new_sync_read+0x9e/0xe0
  [   59.817079]  [] ? generic_file_read_iter+0x5/0x690
  [   59.820120]  [] ? kretprobe_trampoline_holder+0x9/0x9
  [   

[Kernel-packages] [Bug 1763352] Re: kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

2018-04-16 Thread Joseph Salisbury
You may want to submit your patch to the Ubuntu kernel team mailing list for 
review:
kernel-t...@lists.ubuntu.com

** Package changed: linux-meta-lts-xenial (Ubuntu) => linux (Ubuntu)

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Incomplete

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

** Changed in: linux (Ubuntu Xenial)
   Status: Incomplete => Triaged

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

** Tags added: kernel-da-key xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763352

Title:
  kernel panic in bpf_map_update_elem (with bcc tool ext4slower)

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Triaged

Bug description:
  Using Ubuntu 16.04 LTS with 4.4.0 kernel on x86_64
  After kernel update from 4.4.0-116 to 4.4.0-119 running an eBPF tool to log 
slow ext4 I/O (bcc-tool ext4slower) causes a kernel panic in 
bpf_map_update_elem.

  Steps to reproduce:

  * install bcc-tools 0.5.0-1 (https://github.com/iovisor/bcc), packages: 
bcc-tools, libbcc, python-bcc, libbcc-examples; from repo.iovisor.org
  * install kernel 4.4.0-119 (linux-image-4.4.0-119-generic 
linux-image-extra-4.4.0-119 linux-headers-4.4.0-119 
linux-headers-4.4.0-119-generic)
  * reboot
  * run ext4slower (sudo /usr/share/bcc/tools/ext4slower)
  * system crashes

  With kernel 4.4.0-116 ext4slower runs fine.

  uname -a:
  Linux  4.4.0-119-generic #143-Ubuntu SMP Mon Apr 2 16:08:24 UTC 
2018 x86_64 x86_64 x86_64 GNU/Linux

  BCC tools version: 0.5.0-1

  Log of the kernel panic including backtrace:

  [   59.635900] BUG: unable to handle kernel paging request at b98aa6a8
  [   59.642345] IP: [] bpf_map_update_elem+0x6/0x20
  [   59.645782] PGD 0
  [   59.647150] Oops:  [#1] SMP
  [   59.649808] Modules linked in: crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel ppdev aesni_intel aes_x86_64 lrw gf128mul glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 8250_fintek parport_pc 
parport mac_hid autofs4 hid_generic usbhid hid ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops psmouse drm pata_acpi floppy
  [   59.672373] CPU: 0 PID: 1 Comm: systemd Not tainted 4.4.0-119-generic 
#143-Ubuntu
  [   59.676407] Hardware name: OpenStack Foundation OpenStack Nova, BIOS 
1.10.2-2 04/01/2014
  [   59.680079] task: 88013a49 ti: 88013a48c000 task.ti: 
88013a48c000
  [   59.684124] RIP: 0010:[]  [] 
bpf_map_update_elem+0x6/0x20
  [   59.689097] RSP: 0018:88013a48f980  EFLAGS: 00010086
  [   59.691618] RAX: 8117cd90 RBX: c9818170 RCX: 

  [   59.695739] RDX: 88013a48fbd0 RSI: 88013a48fbe8 RDI: 
b98aa680
  [   59.699444] RBP: 88013a48fc08 R08: 880138d6b180 R09: 
0800
  [   59.703264] R10: 88013a49 R11: 0246 R12: 

  [   59.707164] R13: 8800ba0f4400 R14: 88013fc10020 R15: 
88013a48fd58
  [   59.72] FS:  7f4039da58c0() GS:88013fc0() 
knlGS:
  [   59.715861] CS:  0010 DS:  ES:  CR0: 80050033
  [   59.719025] CR2: b98aa6a8 CR3: bb65e000 CR4: 
00160670
  [   59.722937] DR0:  DR1:  DR2: 

  [   59.727210] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   59.731074] Stack:
  [   59.732149]  88013a48fc08 81177411 88013fc20500 

  [   59.735760]  b98aa680 88013a48fbe8 88013a48fbd0 

  [   59.740058]  880138d6b180 88013a48fe58 8800bb5ab000 

  [   59.744100] Call Trace:
  [   59.745434]  [] ? __bpf_prog_run+0x7a1/0x1360
  [   59.748289]  [] ? update_curr+0x79/0x170
  [   59.751044]  [] ? vp_notify+0x16/0x20
  [   59.753601]  [] ? dequeue_entity+0x41b/0xa80
  [   59.756354]  [] ? update_load_avg+0x219/0x7d0
  [   59.759171]  [] ? set_next_entity+0x9c/0xb0
  [   59.761890]  [] ? __switch_to+0x1dc/0x5c0
  [   59.764667]  [] ? __schedule+0x341/0x7f0
  [   59.767155]  [] ? blk_mq_flush_plug_list+0x128/0x150
  [   59.770253]  [] ? bit_wait+0x60/0x60
  [   59.772782]  [] trace_call_bpf+0x37/0x50
  [   59.775336]  [] kprobe_perf_func+0x37/0x250
  [   59.778264]  [] ? ktime_get+0x3e/0xb0
  [   59.780724]  [] ? delayacct_end+0x56/0x60
  [   59.783589]  [] kprobe_dispatcher+0x31/0x50
  [   59.786490]  [] aggr_pre_handler+0x45/0x80
  [   59.789534]  [] ? generic_file_read_iter+0x1/0x690
  [   59.792407]  [] kprobe_ftrace_handler+0xb6/0x120
  [   59.795329]  [] ? generic_file_read_iter+0x5/0x690
  [   59.798453]  []