lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.1.10.0812030655360.29045@gandalf.stny.rr.com>
Date:	Wed, 3 Dec 2008 06:59:42 -0500 (EST)
From:	Steven Rostedt <rostedt@...dmis.org>
To:	Ingo Molnar <mingo@...e.hu>
cc:	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	Frederic Weisbecker <fweisbec@...il.com>,
	Steven Rostedt <srostedt@...hat.com>
Subject: Re: [PATCH 4/5] ftrace: function graph return for function entry


On Wed, 3 Dec 2008, Ingo Molnar wrote:

> 
> Steve,
> 
> after your stream of ftrace patches i'm now getting easy crashes in the 
> function-graph tracer - these crashes didnt occur before. See below an 
> example. Config attached, kernel is tip/master.

Hmm, I've actually had it the other way :-(  I hit this same crash without 
the patches, and it went away after adding my patches.

This is probably some nasty race that depends on a set of timings :-(


> 
> 	Ingo
> 
> ------------->
> EXT3-fs: mounted filesystem with ordered data mode.
> Adding 8193140k swap on /dev/sda2.  Priority:-1 extents:1 across:8193140k
> 0000:04:00.0: eth0: Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX
> 
> Fedora Core release 6 (Zod)
> Kernel 2.6.28-rc7-tip on an x86_64
> 
> titan login: BUG: unable to handle kernel NULL pointer dereference at 0000000000000009
> IP: [<ffffffff80572c57>] do_page_fault+0x414/0x8cd
> PGD 38519067 PUD 38518067 PMD 0 
> Oops: 0000 [#1] SMP 
> last sysfs file: /sys/devices/pci0000:00/0000:00:1c.5/0000:04:00.0/irq
> CPU 0 
> Modules linked in:
> Pid: 1617, comm: gnome-settings- Not tainted 2.6.28-rc7-tip #54
> RIP: 0010:[<ffffffff80572c57>]  [<ffffffff80572c57>] do_page_fault+0x414/0x8cd
> RSP: 0000:ffff880038407b58  EFLAGS: 00010002
> RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000000000000
> RDX: fffffffffffffffd RSI: 0000000000000000 RDI: ffff880000012698
> RBP: ffff880038407c28 R08: ffffffffffffffff R09: 0000000000000001
> R10: 0000000000000020 R11: dead000000100100 R12: 000000000000001f
> R13: ffff880000011e80 R14: 0000000000000000 R15: 0000000000000002
> FS:  00007f7f49376710(0000) GS:ffffffff80930a00(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000009 CR3: 0000000039804000 CR4: 00000000000006e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process gnome-settings- (pid: 1617, threadinfo ffff880038406000, task ffff88003c312080)
> Stack:
>  ffff880038407ba8 0000000000000292 ffffffff809b37c0 0000000000000000
>  0000000000000002 0000000300000044 ffff880000014a00 000000008028abed
>  0000000000000000 001200d200c96070 ffff880000014a08 0000000180221e63
> Call Trace:
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020ee9b>] dump_trace+0x26e/0x27f
>  [<ffffffff8020c132>] ? return_to_handler+0x35/0x73
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020f899>] show_trace_log_lvl+0x51/0x5d
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020e9f2>] show_stack_log_lvl+0x100/0x10f
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020eab6>] show_registers+0xb5/0x22c
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73

Cool! The output of the stack worked! My backtraces looked more like this, 
because it happened without the patches:

  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73   
  [<ffffffff8020c132>] ? return_to_handler+0x35/0x73
  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73

I'll look into it.

-- Steve

>  [<ffffffff805714bf>] __die+0x99/0xe7
>  [<ffffffff8027c4c4>] ? tracing_generic_entry_update+0x7f/0xab
>  [<ffffffff8020a6b2>] ? sys_clone+0x23/0x25
>  [<ffffffff80221f27>] ? ftrace_return_to_handler+0xa2/0xd2
>  [<ffffffff8023df2d>] ? do_fork+0x11/0x2a6
>  [<ffffffff8020c132>] ? return_to_handler+0x35/0x73
>  [<ffffffff80570479>] ? trace_hardirqs_off_thunk+0x3a/0x6c
>  [<ffffffff80570adf>] page_fault+0x1f/0x30
> Code: 02 01 00 00 48 8b bd b0 fe ff ff e8 c5 cc ff ff 48 8b bd b8 fe ff ff 4c 89 e6 e8 47 6a d2 ff 48 85 c0 48 89 c3 0f 84 c3 00 00 00 <4c> 39 60 08 76 38 f6 40 29 01 0f 84 b3 00 00 00 41 f6 c5 04 74 
> RIP  [<ffffffff80572c57>] do_page_fault+0x414/0x8cd
>  RSP <ffff880038407b58>
> CR2: 0000000000000009
> <<4>paging request at ffffffff80afe223
> IP: [<ffffffff8028a7e1>] get_page_from_freelist+0x324/0x64a
> PGD 203067 PUD 207063 PMD a001e3 
> Oops: 0020 [#2] SMP 
> last sysfs file: /sys/devices/pci0000:00/0000:00:1c.5/0000:04:00.0/irq
> CPU 1 
> Modules linked in:
> Pid: 1625, comm: gnome-settings- Tainted: G      D    2.6.28-rc7-tip #54
> RIP: 0010:[<ffffffff8028a7e1>]  [<ffffffff8028a7e1>] get_page_from_freelist+0x324/0x64a
> Process +. (pid: 612141896, threadinfo 4820247c8b482824, task ffffffff8020c0d6)
> Stack:
> BUG: unable to handle kernel NULL pointer dereference at 0000000000000003
> IP: [<ffffffff8020e9a7>] show_stack_log_lvl+0xb5/0x10f
> PGD 38457067 PUD 38452067 PMD 0 
> Oops: 0000 [#3] SMP 
> last sysfs file: /sys/devices/pci0000:00/0000:00:1c.5/0000:04:00.0/irq
> CPU 1 
> Modules linked in:
> Pid: 1625, comm: gnome-settings- Tainted: G      D    2.6.28-rc7-tip #54
> RIP: 0010:[<ffffffff8020e9a7>]  [<ffffffff8020e9a7>] show_stack_log_lvl+0xb5/0x10f
> RSP: 0018:ffff8800384d5ba8  EFLAGS: 00010046
> RAX: ffff88003e63ffc0 RBX: 0000000000000003 RCX: ffff8800384d5eb8
> RDX: ffff880001009b80 RSI: ffff8800384d5df8 RDI: 0000000000000000
> RBP: ffff8800384d5bf8 R08: ffffffff806a8871 R09: 0000000000000000
> R10: ffffffff80afe620 R11: 0000000000000010 R12: 0000000000000000
> R13: 0000000000000000 R14: ffff88003e643fc0 R15: ffffffff806a8871
> FS:  00007f7f49376710(0000) GS:ffff88003e60dac0(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000003 CR3: 0000000038456000 CR4: 00000000000006e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process gnome-settings- (pid: 1625, threadinfo ffff8800384d4000, task ffff88003e6cc7f0)
> Stack:
>  ffff880000000008 ffff8800384d5eb8 ffff8800384d5df8 ffff88003e63ffc0
>  0000000000000003 ffffffff8020c0d6 0000000000000003 0000000000000ac0
>  ffff8800384d5df8 0000000000000040 ffff8800384d5c48 ffffffff8020c0fd
> Call Trace:
>  [<ffffffff8020c0d6>] ? ftrace_graph_caller+0x46/0x6d
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020ee9b>] dump_trace+0x26e/0x27f
>  [<ffffffff8057318d>] ? atomic_notifier_call_chain+0x13/0x15
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020f899>] show_trace_log_lvl+0x51/0x5d
>  [<ffffffff80572ff2>] do_page_fault+0x7af/0x8cd
>  [<ffffffff8027c00f>] ? rb_reserve_next_event+0x19b/0x2f2
>  [<ffffffff8027c4c4>] ? tracing_generic_entry_update+0x7f/0xab
>  [<ffffffff80570479>] ? trace_hardirqs_off_thunk+0x3a/0x6c
>  [<ffffffff80570adf>] page_fault+0x1f/0x30
>  [<ffffffff8028a7e1>] ? get_page_from_freelist+0x324/0x64a
>  [<ffffffff8028a7df>] ? get_page_from_freelist+0x322/0x64a
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020e9f2>] show_stack_log_lvl+0x100/0x10f
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020eab6>] show_registers+0xb5/0x22c
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff805714bf>] __die+0x99/0xe7
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff8020eab6>] show_registers+0xb5/0x22c
>  [<ffffffff8020c0fd>] return_to_handler+0x0/0x73
>  [<ffffffff805714bf>] __die+0x99/0xe7
> Code: e8 4a fa 35 00 eb 08 f7 c3 ff 1f 00 00 74 42 45 85 e4 74 17 41 f6 c4 03 75 11 4c 89 fe 48 c7 c7 24 88 6a 80 31 c0 e8 24 fa 35 00 <48> 8b 33 48 c7 c7 28 88 6a 80 31 c0 48 83 c3 08 41 ff c4 e8 0c 
> RIP  [<ffffffff8020e9a7>] show_stack_log_lvl+0xb5/0x10f
>  RSP <ffff8800384d5ba8>
> CR2: 0000000000000003
> ---[ end trace 68aa414552b98440 ]---
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ