I tested with linux-headers-4.4.0-040400 / linux-
headers-4.4.0-040400-generic / linux-image-4.4.0-040400-generic
4.4.0-040400.201601101930. The kernel lockups did *not* reproduce.

Two caveats:

(1) I did get this kernel warning in the log:
Jan 21 18:00:08 e104462 kernel: [  171.577000] ------------[ cut here 
]------------
Jan 21 18:00:08 e104462 kernel: [  171.577005] WARNING: CPU: 6 PID: 14136 at 
/home/kernel/COD/linux/kernel/signal.c:2072 get_signal+0x597/0x600()
Jan 21 18:00:08 e104462 kernel: [  171.577006] Modules linked in: rfcomm bnep 
bluetooth nfsd auth_rpcgss nfs_acl nfs binfmt_misc lockd grace sunrpc fscache 
drbg ansi_cprng snd_hda_codec_hdmi intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel kvm dm_crypt irqbypass crct10dif_pclmul 
crc32_pclmul aesni_intel aes_x86_64 lrw snd_hda_codec_realtek 
snd_hda_codec_generic gf128mul glue_helper ablk_helper snd_hda_intel cryptd 
snd_hda_codec snd_hda_core snd_hwdep input_leds pl2303 snd_pcm usbserial 
snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer 
snd 8250_fintek soundcore mei_me mei shpchp ie31200_edac lpc_ich ppdev 
edac_core serio_raw mac_hid parport_pc lp parport hid_generic usbhid hid uas 
usb_storage nouveau mxm_wmi i2c_algo_bit ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops e1000e drm ahci psmouse libahci ptp pps_core 
wmi fjes video
Jan 21 18:00:08 e104462 kernel: [  171.577037] CPU: 6 PID: 14136 Comm: 
block-z8iSdZiRK Not tainted 4.4.0-040400-generic #201601101930
Jan 21 18:00:08 e104462 kernel: [  171.577038] Hardware name: LENOVO 
32281S1/MAHOBAY, BIOS 9SKT71AUS 07/02/2013
Jan 21 18:00:08 e104462 kernel: [  171.577039]  0000000000000000 
00000000a495bf0f ffff88040afdbd20 ffffffff813c8d94
Jan 21 18:00:08 e104462 kernel: [  171.577040]  0000000000000000 
ffff88040afdbd58 ffffffff8107dba2 0000000000000000
Jan 21 18:00:08 e104462 kernel: [  171.577042]  ffff88040afdbe38 
0000000000008000 ffff88040afdbf58 ffff880405d58000
Jan 21 18:00:08 e104462 kernel: [  171.577043] Call Trace:
Jan 21 18:00:08 e104462 kernel: [  171.577046]  [<ffffffff813c8d94>] 
dump_stack+0x44/0x60
Jan 21 18:00:08 e104462 kernel: [  171.577049]  [<ffffffff8107dba2>] 
warn_slowpath_common+0x82/0xc0
Jan 21 18:00:08 e104462 kernel: [  171.577050]  [<ffffffff8107dcea>] 
warn_slowpath_null+0x1a/0x20
Jan 21 18:00:08 e104462 kernel: [  171.577051]  [<ffffffff8108d0e7>] 
get_signal+0x597/0x600
Jan 21 18:00:08 e104462 kernel: [  171.577053]  [<ffffffff81016517>] 
do_signal+0x37/0x6f0
Jan 21 18:00:08 e104462 kernel: [  171.577055]  [<ffffffff817f9925>] ? 
schedule+0x35/0x80
Jan 21 18:00:08 e104462 kernel: [  171.577057]  [<ffffffff81080b96>] ? 
do_exit+0x736/0xab0
Jan 21 18:00:08 e104462 kernel: [  171.577058]  [<ffffffff81021272>] ? 
__switch_to_xtra+0xe2/0x1b0
Jan 21 18:00:08 e104462 kernel: [  171.577061]  [<ffffffff8100320c>] 
exit_to_usermode_loop+0x8c/0xd0
Jan 21 18:00:08 e104462 kernel: [  171.577062]  [<ffffffff81003c2e>] 
syscall_return_slowpath+0x4e/0x60
Jan 21 18:00:08 e104462 kernel: [  171.577064]  [<ffffffff817fdb18>] 
int_ret_from_sys_call+0x25/0x8f
Jan 21 18:00:08 e104462 kernel: [  171.577065] ---[ end trace 1c1af43c0c2249f3 
]---

but it seems to be a completely different thing from the lockup back
traces seen with the 3.13 kernel.

(2) rr complains:
1134: [FATAL 
/home/petmay01/src/rr/src/Monkeypatcher.cc:660:patch_after_exec_arch<rr::X86Arch>()
 errno: 0 'Success'] 
1134:  -> Failed to monkeypatch vdso: your __kernel_vsyscall() wasn't 
recognized.
1134:     Syscall buffering is now effectively disabled.  If you're OK with
1134:     running rr without syscallbuf, then run the recorder passing the
1134:     --no-syscall-buffer arg.
1134:     If you're *not* OK with that, file an issue.

which indicates that it's not happy with running under a 4.4 kernel in
some way, and the code being run won't be the same as it was under the
3.13 kernel. (I filed https://github.com/mozilla/rr/issues/1627 against
rr about that.)


** Tags added: kernel-fixed-upstream

** Changed in: linux (Ubuntu)
       Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1535307

Title:
  running 'rr' make check causes kernel "hard LOCKUP"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1535307/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to