lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 17 Feb 2016 15:44:56 +0100
From:	Jiri Olsa <jolsa@...hat.com>
To:	Peter Zijlstra <peterz@...radead.org>
Cc:	Oleg Nesterov <oleg@...hat.com>,
	Pratyush Anand <panand@...hat.com>,
	Jeff Bastian <jbastian@...hat.com>,
	Michael Petlan <mpetlan@...hat.com>,
	linux-kernel@...r.kernel.org, arm-devel@...hat.com
Subject: Re: perf: wrong event->count report (Was: perf basic-test-aarch64
 failures)

On Wed, Feb 17, 2016 at 11:25:55AM +0100, Peter Zijlstra wrote:

SNIP

> 
> ---
> 
> So prior to 3e349507d12d ("perf: Fix perf_enable_on_exec() event
> scheduling") we used to call task_ctx_sched_out() before
> event_enable_on_exec().
> 
> ctx_sched_out() will call update_context_time(), therefore
> __perf_event_mark_enabled() would have an up-to-date ctx->time.
> 
> Now, not so much. So explicitly update the ctx time before calling
> event_enable_on_exec().
> 
> ctx_resched() will again call update_context_time(), resulting in a
> slight difference the other way (running > enabled), which doesn't make
> any sense either, but that we can (and should) clip.
> 
> 
> --- a/kernel/events/core.c
> +++ b/kernel/events/core.c
> @@ -3173,6 +3173,10 @@ static void perf_event_enable_on_exec(in
>  
>  	cpuctx = __get_cpu_context(ctx);
>  	perf_ctx_lock(cpuctx, ctx);
> +
> +	update_context_time(ctx);
> +	update_cgrp_time_from_cpuctx(cpuctx);
> +
>  	list_for_each_entry(event, &ctx->event_list, event_entry)
>  		enabled |= event_enable_on_exec(event, ctx);
>  

that gives me attached fault

jirka


---
ibm-x3650m4-01 login: [  670.771477] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
[  670.779831] BUG: unable to handle kernel paging request at ffff88047fad6e30
[  670.787618] IP: [<ffff88047fad6e30>] 0xffff88047fad6e30
[  670.793455] PGD 2033067 PUD 275e8f063 PMD 800000047fa001e3
[  670.799699] Oops: 0011 [#1] SMP
[  670.803312] Modules linked in: intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ipmi_ssif ablk_helper iTCO_wdt cryptd cdc_ether ipmi_devintf usbnet sb_edac iTCO_vendor_support edac_core ipmi_si mii shpchp lpc_ich pcspkr sg ipmi_msghandler wmi ioatdma nfsd mfd_core i2c_i801 auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod sr_mod cdrom mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm igb drm ptp ahci libahci pps_core libata crc32c_intel dca megaraid_sas i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod
[  670.870508] CPU: 13 PID: 11185 Comm: exact_counts Not tainted 4.5.0-rc2peterz+ #12
[  670.878955] Hardware name: IBM System x3650 M4 : -[7915E2G]-/00Y7683, BIOS -[VVE124AUS-1.30]- 11/21/2012
[  670.889535] task: ffff8802750795c0 ti: ffff88003532c000 task.ti: ffff88003532c000
[  670.897884] RIP: 0010:[<ffff88047fad6e30>]  [<ffff88047fad6e30>] 0xffff88047fad6e30
[  670.906437] RSP: 0000:ffff88003532fd90  EFLAGS: 00010286
[  670.912362] RAX: ffff880474e009e8 RBX: ffff88003532fe58 RCX: ffff88047fad6e30
[  670.920323] RDX: ffff88003532fdb0 RSI: ffff88047148e180 RDI: ffff880474e009e8
[  670.928284] RBP: ffff88003532fd98 R08: 0000000000000000 R09: ffff88003532fe58
[  670.936245] R10: 00003fffffe00000 R11: 00003ffffffff000 R12: ffff880272dfd540
[  670.944206] R13: 0000000000000002 R14: ffff8800350f0ff8 R15: ffff88047148e180
[  670.952168] FS:  00007fe8e4e57740(0000) GS:ffff880277bc0000(0000) knlGS:0000000000000000
[  670.961197] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  670.967608] CR2: ffff88047fad6e30 CR3: 0000000035527000 CR4: 00000000000406e0
[  670.975569] Stack:
[  670.977811]  ffffffff811bf1a1 ffff88003532fdf8 ffffffff811b65ed ffffea0000d3ab40
[  670.986096]  024000c000000054 0000000000000000 00007fffffffe000 0000000000000000
[  670.994383]  0000000000000000 00007fffffffe080 ffff880272dfd540 000000006be5d191
[  671.002671] Call Trace:
[  671.005403]  [<ffffffff811bf1a1>] ? special_mapping_fault+0x31/0x90
[  671.012396]  [<ffffffff811b65ed>] __do_fault+0x6d/0xe0
[  671.018127]  [<ffffffff811bb076>] handle_mm_fault+0xd96/0x1ab0
[  671.024637]  [<ffffffff81182e40>] ? uprobe_notify_resume+0x700/0xa10
[  671.031729]  [<ffffffff81211a53>] ? __fput+0x193/0x220
[  671.037462]  [<ffffffff8106908b>] __do_page_fault+0x18b/0x400
[  671.043872]  [<ffffffff81069330>] do_page_fault+0x30/0x80
[  671.049898]  [<ffffffff816ab608>] page_fault+0x28/0x30
[  671.055628] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 6e ad 7f 04 88 ff ff 20 6e ad 7f 04 88 ff ff <00> 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 40 6e ad 7f 04
[  671.077296] RIP  [<ffff88047fad6e30>] 0xffff88047fad6e30
[  671.083231]  RSP <ffff88003532fd90>
[  671.087119] CR2: ffff88047fad6e30
[  671.094220] ---[ end trace 17a74a9c13f887c1 ]---
[  671.099369] Kernel panic - not syncing: Fatal exception
[  671.105249] Kernel Offset: disabled
[  671.109138] ---[ end Kernel panic - not syncing: Fatal exception
[  671.115850] ------------[ cut here ]------------
[  671.121004] WARNING: CPU: 13 PID: 11185 at arch/x86/kernel/smp.c:125 native_smp_send_reschedule+0x3e/0x40()
[  671.131874] Modules linked in: intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ipmi_ssif ablk_helper iTCO_wdt cryptd cdc_ether ipmi_devintf usbnet sb_edac iTCO_vendor_support edac_core ipmi_si mii shpchp lpc_ich pcspkr sg ipmi_msghandler wmi ioatdma nfsd mfd_core i2c_i801 auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod sr_mod cdrom mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm igb drm ptp ahci libahci pps_core libata crc32c_intel dca megaraid_sas i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod
[  671.199064] CPU: 13 PID: 11185 Comm: exact_counts Tainted: G      D         4.5.0-rc2peterz+ #12
[  671.208869] Hardware name: IBM System x3650 M4 : -[7915E2G]-/00Y7683, BIOS -[VVE124AUS-1.30]- 11/21/2012
[  671.219448]  0000000000000000 000000006be5d191 ffff880277bc3da8 ffffffff81338380
[  671.227737]  0000000000000000 ffff880277bc3de0 ffffffff810869b6 0000000000000000
[  671.236027]  ffff880277a16c80 000000000000000d 000000000000000d 000000000000de68
[  671.244317] Call Trace:
[  671.247042]  <IRQ>  [<ffffffff81338380>] dump_stack+0x44/0x64
[  671.253467]  [<ffffffff810869b6>] warn_slowpath_common+0x86/0xc0
[  671.260168]  [<ffffffff81086afa>] warn_slowpath_null+0x1a/0x20
[  671.266675]  [<ffffffff8104fb2e>] native_smp_send_reschedule+0x3e/0x40
[  671.273959]  [<ffffffff810c3d85>] trigger_load_balance+0x145/0x1f0
[  671.280855]  [<ffffffff810b2d76>] scheduler_tick+0xa6/0xe0
[  671.286976]  [<ffffffff810ffc70>] ? tick_sched_do_timer+0x50/0x50
[  671.293775]  [<ffffffff810f0871>] update_process_times+0x51/0x60
[  671.300476]  [<ffffffff810ffa25>] tick_sched_handle.isra.17+0x25/0x60
[  671.307661]  [<ffffffff810ffcad>] tick_sched_timer+0x3d/0x70
[  671.313975]  [<ffffffff810f13d3>] __hrtimer_run_queues+0xf3/0x220
[  671.320773]  [<ffffffff810f1838>] hrtimer_interrupt+0xa8/0x1a0
[  671.327281]  [<ffffffff810522e5>] local_apic_timer_interrupt+0x35/0x60
[  671.334566]  [<ffffffff816abf1d>] smp_apic_timer_interrupt+0x3d/0x60
[  671.341655]  [<ffffffff816aa05c>] apic_timer_interrupt+0x8c/0xa0
[  671.348354]  <EOI>  [<ffffffff811859d4>] ? panic+0x1e5/0x229
[  671.354681]  [<ffffffff8101a9e0>] oops_end+0xc0/0xd0
[  671.360218]  [<ffffffff81068579>] no_context+0x139/0x390
[  671.366142]  [<ffffffff810688d9>] __bad_area_nosemaphore+0x109/0x210
[  671.373231]  [<ffffffff810689f3>] bad_area_nosemaphore+0x13/0x20
[  671.379931]  [<ffffffff81068f84>] __do_page_fault+0x84/0x400
[  671.386244]  [<ffffffff81069330>] do_page_fault+0x30/0x80
[  671.392267]  [<ffffffff816ab608>] page_fault+0x28/0x30
[  671.398001]  [<ffffffff811bf1a1>] ? special_mapping_fault+0x31/0x90
[  671.404992]  [<ffffffff811b65ed>] __do_fault+0x6d/0xe0
[  671.410724]  [<ffffffff811bb076>] handle_mm_fault+0xd96/0x1ab0
[  671.417232]  [<ffffffff81182e40>] ? uprobe_notify_resume+0x700/0xa10
[  671.424322]  [<ffffffff81211a53>] ? __fput+0x193/0x220
[  671.430054]  [<ffffffff8106908b>] __do_page_fault+0x18b/0x400
[  671.436464]  [<ffffffff81069330>] do_page_fault+0x30/0x80
[  671.442486]  [<ffffffff816ab608>] page_fault+0x28/0x30
[  671.448217] ---[ end trace 17a74a9c13f887c2 ]---

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ