lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 2 Jul 2015 17:02:08 -0400 (EDT)
From:	Vince Weaver <vincent.weaver@...ne.edu>
To:	linux-kernel@...r.kernel.org
cc:	Peter Zijlstra <peterz@...radead.org>,
	Ingo Molnar <mingo@...hat.com>,
	Arnaldo Carvalho de Melo <acme@...nel.org>,
	Stephane Eranian <eranian@...il.com>
Subject: perf: fuzzer triggered CPU lockup


The fuzzer just turned this up.  This is the first part; a huge amount of 
CPU lockup messages, rcu stalls, and spinlock lockup suspected messages 
followed beyond what I've posted here but eventually the machine recovered (?)

[20601.976374] WARNING: CPU: 1 PID: 28966 at kernel/watchdog.c:311 watchdog_overflow_callback+0x84/0xa0()
[20601.986660] Watchdog detected hard LOCKUP on cpu 1
[20601.991597] Modules linked in:
[20601.995219]  fuse x86_pkg_temp_thermal intel_powerclamp intel_rapl iosf_mbi coretemp kvm_intel kvm snd_hda_codec_hdmi crct10dif_pclmul crc32_pclmul ghash_clmulni_intel hmac drbg i915 ansi_cprng snd_hda_codec_realtek snd_hda_codec_generic iTCO_wdt ppdev snd_hda_intel snd_hda_codec aesni_intel aes_x86_64 snd_hda_core lrw evdev snd_hwdep drm_kms_helper drm psmouse iTCO_vendor_support snd_pcm gf128mul glue_helper ablk_helper serio_raw pcspkr cryptd snd_timer i2c_i801 processor battery video snd mei_me parport_pc i2c_algo_bit button soundcore lpc_ich mfd_core tpm_tis mei parport tpm wmi sg sr_mod sd_mod cdrom ehci_pci ehci_hcd ahci libahci libata xhci_pci xhci_hcd e1000e ptp usbcore crc32c_intel fan scsi_mod pps_core usb_common thermal thermal_sys
[20602.068491] CPU: 1 PID: 28966 Comm: perf_fuzzer Tainted: G        W       4.1.0+ #160
[20602.077305] Hardware name: LENOVO 10AM000AUS/SHARKBAY, BIOS FBKT72AUS 01/26/2014
[20602.085645]  ffffffff81a27b82 ffff88011ea45af0 ffffffff8169e763 0000000000000000
[20602.094061]  ffff88011ea45b40 ffff88011ea45b30 ffffffff8106ecba ffff88011ea45c40
[20602.102496]  ffff8801197c7800 0000000000000000 ffff88011ea45c40 ffff88011ea45ef8
[20602.110909] Call Trace:
[20602.113982]  <NMI>  [<ffffffff8169e763>] dump_stack+0x45/0x57
[20602.120616]  [<ffffffff8106ecba>] warn_slowpath_common+0x8a/0xc0
[20602.127520]  [<ffffffff8106ed36>] warn_slowpath_fmt+0x46/0x50
[20602.134103]  [<ffffffff8102f676>] ? intel_pmu_drain_pebs_nhm+0x176/0x2e0
[20602.141753]  [<ffffffff8111b694>] watchdog_overflow_callback+0x84/0xa0
[20602.149189]  [<ffffffff8115ae7c>] __perf_event_overflow+0x8c/0x1b0
[20602.156300]  [<ffffffff8115b9d4>] perf_event_overflow+0x14/0x20
[20602.163092]  [<ffffffff81032174>] intel_pmu_handle_irq+0x1d4/0x440
[20602.170206]  [<ffffffff81195ca5>] ? copy_page_range+0x515/0x960
[20602.177014]  [<ffffffff8105182b>] ? native_apic_msr_write+0x2b/0x30
[20602.184197]  [<ffffffff8105169d>] ? x2apic_send_IPI_self+0x1d/0x20
[20602.191284]  [<ffffffff81019155>] ? arch_irq_work_raise+0x35/0x40
[20602.198282]  [<ffffffff8114b0b6>] ? irq_work_queue+0x66/0x80
[20602.204830]  [<ffffffff81028e76>] perf_event_nmi_handler+0x26/0x40
[20602.211928]  [<ffffffff810181ad>] nmi_handle+0x9d/0x140
[20602.217999]  [<ffffffff81018115>] ? nmi_handle+0x5/0x140
[20602.224206]  [<ffffffff8101843a>] default_do_nmi+0x4a/0x120
[20602.230651]  [<ffffffff8101859d>] do_nmi+0x8d/0xc0
[20602.236280]  [<ffffffff816a86df>] end_repeat_nmi+0x1e/0x2e
[20602.242650]  [<ffffffff8101cd16>] ? native_read_tsc+0x6/0x20
[20602.249194]  [<ffffffff8101cd16>] ? native_read_tsc+0x6/0x20
[20602.255733]  [<ffffffff8101cd16>] ? native_read_tsc+0x6/0x20
[20602.262282]  <<EOE>>  [<ffffffff813f7e9d>] delay_tsc+0x2d/0x70
[20602.269008]  [<ffffffff813f7daf>] __delay+0xf/0x20
[20602.274617]  [<ffffffff810bc2ac>] do_raw_spin_lock+0x8c/0x120
[20602.281273]  [<ffffffff816a62bc>] _raw_spin_lock_irqsave+0x4c/0x60
[20602.288346]  [<ffffffff81153aca>] ? perf_event_read+0x6a/0x130
[20602.295064]  [<ffffffff81153aca>] perf_event_read+0x6a/0x130
[20602.301605]  [<ffffffff81153c18>] perf_event_read_value+0x88/0xd0
[20602.308563]  [<ffffffff81154125>] ? perf_event_ctx_lock_nested+0x15/0xf0
[20602.316160]  [<ffffffff8115453f>] perf_read+0x1cf/0x300
[20602.322203]  [<ffffffff811973cf>] ? handle_mm_fault+0xdbf/0x1750
[20602.329079]  [<ffffffff811dd2a8>] __vfs_read+0x28/0xd0
[20602.335008]  [<ffffffff8136b073>] ? security_file_permission+0xa3/0xc0
[20602.342452]  [<ffffffff811dd7f3>] ? rw_verify_area+0x53/0xf0
[20602.348934]  [<ffffffff811dd91a>] vfs_read+0x8a/0x130
[20602.354769]  [<ffffffff811de739>] SyS_read+0x49/0xa0
[20602.360484]  [<ffffffff816a64b2>] entry_SYSCALL_64_fastpath+0x16/0x7a
[20602.367734] ---[ end trace e3d880444bf5705f ]---
[20609.247053] ------------[ cut here ]------------
[20609.252343] WARNING: CPU: 2 PID: 29626 at kernel/watchdog.c:311 watchdog_overflow_callback+0x84/0xa0()
[20609.262667] Watchdog detected hard LOCKUP on cpu 2
[20609.387068] Call Trace:
[20609.390155]  <NMI>  [<ffffffff8169e763>] dump_stack+0x45/0x57
[20609.396774]  [<ffffffff8106ecba>] warn_slowpath_common+0x8a/0xc0
[20609.403676]  [<ffffffff8106ed36>] warn_slowpath_fmt+0x46/0x50
[20609.410245]  [<ffffffff8102f676>] ? intel_pmu_drain_pebs_nhm+0x176/0x2e0
[20609.417849]  [<ffffffff8111b694>] watchdog_overflow_callback+0x84/0xa0
[20609.425247]  [<ffffffff8115ae7c>] __perf_event_overflow+0x8c/0x1b0
[20609.432324]  [<ffffffff8115b9d4>] perf_event_overflow+0x14/0x20
[20609.439100]  [<ffffffff81032174>] intel_pmu_handle_irq+0x1d4/0x440
[20609.446153]  [<ffffffff8108f4f7>] ? __atomic_notifier_call_chain+0x77/0x90
[20609.453984]  [<ffffffff8108f485>] ? __atomic_notifier_call_chain+0x5/0x90
[20609.461717]  [<ffffffff810b8d4d>] ? lock_acquire+0xbd/0x120
[20609.468152]  [<ffffffff8105182b>] ? native_apic_msr_write+0x2b/0x30
[20609.475296]  [<ffffffff8105169d>] ? x2apic_send_IPI_self+0x1d/0x20
[20609.482383]  [<ffffffff81019155>] ? arch_irq_work_raise+0x35/0x40
[20609.489362]  [<ffffffff8114b0b6>] ? irq_work_queue+0x66/0x80
[20609.495880]  [<ffffffff81028e76>] perf_event_nmi_handler+0x26/0x40
[20609.502970]  [<ffffffff810181ad>] nmi_handle+0x9d/0x140
[20609.509066]  [<ffffffff81018115>] ? nmi_handle+0x5/0x140
[20609.515184]  [<ffffffff810184b9>] default_do_nmi+0xc9/0x120
[20609.521617]  [<ffffffff8101859d>] do_nmi+0x8d/0xc0
[20609.527217]  [<ffffffff816a86df>] end_repeat_nmi+0x1e/0x2e
[20609.533566]  [<ffffffff81058bdd>] ? native_write_msr_safe+0xd/0x10
[20609.540658]  [<ffffffff81058bdd>] ? native_write_msr_safe+0xd/0x10
[20609.547728]  [<ffffffff81058bdd>] ? native_write_msr_safe+0xd/0x10
[20609.554770]  <<EOE>>  [<ffffffff8103097a>] ? __intel_pmu_enable_all+0x5a/0xc0
[20609.562888]  [<ffffffff810309f0>] intel_pmu_enable_all+0x10/0x20
[20609.569768]  [<ffffffff8102a95c>] x86_pmu_enable+0x25c/0x2e0
[20609.576271]  [<ffffffff81156112>] perf_pmu_enable+0x22/0x30
[20609.582693]  [<ffffffff811578d4>] perf_event_context_sched_in+0x94/0x150
[20609.590305]  [<ffffffff81157e07>] __perf_event_task_sched_in+0x97/0xa0
[20609.597710]  [<ffffffff81096517>] finish_task_switch+0x197/0x1f0
[20609.604580]  [<ffffffff816a0860>] ? __schedule+0x280/0xa50
[20609.610866]  [<ffffffff816a08c8>] __schedule+0x2e8/0xa50
[20609.616966]  [<ffffffff811590f2>] ? put_event+0x92/0x150
[20609.623071]  [<ffffffff816a1067>] schedule+0x37/0x80
[20609.628788]  [<ffffffff816a135e>] schedule_preempt_disabled+0xe/0x10
[20609.636002]  [<ffffffff816a2ce0>] mutex_lock_nested+0x120/0x320
[20609.642717]  [<ffffffff811590f2>] ? put_event+0x92/0x150
[20609.648789]  [<ffffffff811590f2>] put_event+0x92/0x150
[20609.654651]  [<ffffffff8115908b>] ? put_event+0x2b/0x150
[20609.660680]  [<ffffffff811591d0>] perf_release+0x10/0x20
[20609.666685]  [<ffffffff811df34c>] __fput+0xdc/0x1e0
[20609.672243]  [<ffffffff811df49e>] ____fput+0xe/0x10
[20609.677768]  [<ffffffff8108c295>] task_work_run+0x85/0xb0
[20609.683882]  [<ffffffff81071645>] do_exit+0x3a5/0xa90
[20609.689605]  [<ffffffff8107d1b2>] ? get_signal+0xe2/0x720
[20609.695712]  [<ffffffff81071dd4>] do_group_exit+0x54/0xe0
[20609.701802]  [<ffffffff8107d350>] get_signal+0x280/0x720
[20609.707790]  [<ffffffff81013478>] do_signal+0x28/0xb50
[20609.713579]  [<ffffffff810b7806>] ? __lock_acquire.isra.31+0x3a6/0xf90
[20609.720874]  [<ffffffff816a0653>] ? __schedule+0x73/0xa50
[20609.726927]  [<ffffffff816a0bcc>] ? __schedule+0x5ec/0xa50
[20609.733093]  [<ffffffff816a0bcc>] ? __schedule+0x5ec/0xa50
[20609.739262]  [<ffffffff810815d5>] ? sys_getppid+0x5/0x80
[20609.745244]  [<ffffffff81014002>] do_notify_resume+0x62/0x70
[20609.751546]  [<ffffffff816a719e>] retint_signal+0x44/0x86
[20609.757629] ---[ end trace e3d880444bf57060 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ