lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 18 Nov 2013 16:32:19 +0100
From:	Peter Zijlstra <peterz@...radead.org>
To:	Stephane Eranian <eranian@...gle.com>
Cc:	Vince Weaver <vincent.weaver@...ne.edu>,
	LKML <linux-kernel@...r.kernel.org>,
	Ingo Molnar <mingo@...nel.org>,
	Paul Mackerras <paulus@...ba.org>,
	Arnaldo Carvalho de Melo <acme@...stprotocols.net>
Subject: Re: perf sw_event related lockup

On Mon, Nov 18, 2013 at 04:18:34PM +0100, Stephane Eranian wrote:
> Peter,
> 
> I missed the beginning of this thread somehow.
> What's the initial problem?

lkml.kernel.org/r/alpine.DEB.2.10.1311141412060.8746@...cent-weaver-1.um.maine.edu
lkml.kernel.org/r/alpine.DEB.2.10.1311151223040.11932@...cent-weaver-1.um.maine.edu

Vince managed to make the intel constraints code go *bang*.

---
[  573.054155] BUG: unable to handle kernel NULL pointer dereference at        )
[  573.057564] IP: [<ffffffff81520a44>] _raw_spin_lock_irqsave+0x11/0x2d
[  573.057564] PGD c814b067 PUD cb183067 PMD 0
[  573.057564] Oops: 0002 [#1] SMP
[  573.057564] Modules linked in: cpufreq_userspace cpufreq_stats cpufreq_powern
[  573.057564] CPU: 1 PID: 3926 Comm: perf_fuzzer Tainted: G        W    3.12.04
[  573.057564] Hardware name: AOpen   DE7000/nMCP7ALPx-DE R1.06 Oct.19.2012, BI2
[  573.057564] task: ffff880037cfd0c0 ti: ffff8800ca4ae000 task.ti: ffff8800ca40
[  573.057564] RIP: 0010:[<ffffffff81520a44>]  [<ffffffff81520a44>] _raw_spin_ld
[  573.057564] RSP: 0018:ffff8800ca4afa08  EFLAGS: 00010046
[  573.057564] RAX: 0000000000000046 RBX: ffff8800c813e800 RCX: 0000000000000000
[  573.057564] RDX: 0000000000010000 RSI: ffff8800c813e800 RDI: 0000000000000000
[  573.057564] RBP: ffff8800ca4afa08 R08: ffff8800c813e800 R09: ffff8800ca4afdf8
[  573.057564] R10: ffff88011a2261c0 R11: 0000000000000246 R12: ffff88011fc8b940
[  573.057564] R13: 0000000000000000 R14: ffff8800c813e948 R15: 0000000000000000
[  573.057564] FS:  00007fc238e92700(0000) GS:ffff88011fc80000(0000) knlGS:00000
[  573.057564] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  573.057564] CR2: 0000000000000000 CR3: 00000000c88c4000 CR4: 00000000000407e0
[  573.057564] DR0: 0000000000033c20 DR1: 0000000000000000 DR2: 0000000000000000
[  573.057564] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  573.057564] Stack:
[  573.057564]  ffff8800ca4afa58 ffffffff810190b0 0000000000000000 0000000000000
[  573.057564]  ffff88011fff8680 0000000000000000 ffff8800c813e800 ffff88011fc80
[  573.057564]  0000000000000040 0000000000000000 ffff8800ca4afa88 ffffffff81013
[  573.057564] Call Trace:
[  573.057564]  [<ffffffff810190b0>] __intel_shared_reg_get_constraints+0x5e/0xc
[  573.057564]  [<ffffffff81019273>] intel_get_event_constraints+0x85/0x154
[  573.057564]  [<ffffffff81013bcc>] x86_schedule_events+0x54/0x185
[  573.057564]  [<ffffffff8101284f>] ? x86_pmu_add+0xf8/0x110
[  573.057564]  [<ffffffff810126ee>] x86_pmu_commit_txn+0x51/0x9a
[  573.057564]  [<ffffffff810d6fef>] ? __alloc_pages_nodemask+0x173/0x718
[  573.057564]  [<ffffffff810c88bc>] ? event_sched_in+0x7a/0x109
[  573.057564]  [<ffffffff810c89e3>] group_sched_in+0x98/0x147
[  573.057564]  [<ffffffff81067436>] ? sched_clock_cpu+0xc3/0xd1
[  573.057564]  [<ffffffff810c8bf0>] ctx_sched_in+0x15e/0x185
[  573.057564]  [<ffffffff810c8c80>] perf_event_sched_in+0x69/0x72
[  573.057564]  [<ffffffff810c8d51>] __perf_install_in_context+0xc8/0xf1
[  573.057564]  [<ffffffff810c956f>] ? perf_event_task_output+0x13d/0x13d
[  573.057564]  [<ffffffff810c95ab>] remote_function+0x3c/0x43
[  573.057564]  [<ffffffff8108c655>] smp_call_function_single+0x8a/0x101
[  573.057564]  [<ffffffff810c95f6>] task_function_call+0x44/0x4e
[  573.057564]  [<ffffffff810c8c89>] ? perf_event_sched_in+0x72/0x72
[  573.057564]  [<ffffffff810c9a0c>] perf_install_in_context+0x81/0xbc
[  573.057564]  [<ffffffff8151dddc>] ? mutex_lock+0x16/0x37
[  573.057564]  [<ffffffff810cd56b>] SYSC_perf_event_open+0x634/0x7e9
[  573.057564]  [<ffffffff810cd729>] SyS_perf_event_open+0x9/0xb
[  573.057564]  [<ffffffff81527b56>] system_call_fastpath+0x1a/0x1f
[  573.057564] Code: c1 07 89 c2 c1 ea 10 66 39 c2 74 0c 66 8b 07 66 39 d0 74 0
[  573.057564] RIP  [<ffffffff81520a44>] _raw_spin_lock_irqsave+0x11/0x2d
[  573.057564]  RSP <ffff8800ca4afa08>
[  573.057564] CR2: 0000000000000000
[  573.057564] ---[ end trace ee0dc4a441b301c0 ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ