lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sun, 9 Oct 2016 15:09:29 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     David Carrillo-Cisneros <davidcc@...gle.com>
Cc:     linux-kernel@...r.kernel.org, "x86@...nel.org" <x86@...nel.org>,
        Ingo Molnar <mingo@...hat.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Andi Kleen <ak@...ux.intel.com>,
        Kan Liang <kan.liang@...el.com>,
        Peter Zijlstra <peterz@...radead.org>,
        Vegard Nossum <vegard.nossum@...il.com>,
        Paul Turner <pjt@...gle.com>,
        Stephane Eranian <eranian@...gle.com>,
        David Carrillo-Cisneros <davidcc@...gle.com>, lkp@...org
Subject: [lkp] [perf/core]  412929295f: WARNING: CPU: 2 PID: 600 at
 kernel/events/core.c:3530 perf_event_read+0x17d/0x190


FYI, we noticed the following commit:

https://github.com/0day-ci/linux David-Carrillo-Cisneros/remove-unnecessary-IPI-reading-uncore-events/20160818-045857
commit 412929295ff670aa6890e346e2fc05f58d93cd96 ("perf/core: check return value of perf_event_read IPI")

in testcase: postmark
with following parameters:

	disk: 1HDD
	fs: ext4
	fs1: nfsv4
	number: 20000n
	trans: 100000s
	subdirs: 100d




on test machine: 4 threads Intel(R) Atom(TM) CPU S1240 @ 1.60GHz with 8G memory

caused below changes:


+------------------------------------------------------------------+------------+------------+
|                                                                  | e48c178814 | 412929295f |
+------------------------------------------------------------------+------------+------------+
| boot_successes                                                   | 0          | 4          |
| boot_failures                                                    | 4          | 9          |
| invoked_oom-killer:gfp_mask=0x                                   | 4          | 3          |
| Mem-Info                                                         | 4          | 2          |
| Kernel_panic-not_syncing:Out_of_memory_and_no_killable_processes | 2          | 2          |
| WARNING:at_kernel/events/core.c:#perf_event_read                 | 0          | 5          |
| calltrace:SyS_read                                               | 0          | 5          |
| BUG:kernel_reboot-without-warning_in_test_stage                  | 0          | 2          |
+------------------------------------------------------------------+------------+------------+



[   97.852491] ipmi device interface
[   97.994091] BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Disabled
[  407.987666] ------------[ cut here ]------------
[  408.001711] WARNING: CPU: 2 PID: 600 at kernel/events/core.c:3530 perf_event_read+0x17d/0x190
[  408.017980] Modules linked in: ipmi_devintf nfsd dm_mod rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver sg sd_mod ast ttm drm_kms_helper syscopyarea sysfillrect ie6xx_wdt sysimgblt fb_sys_fops i2c_isch intel_powerclamp coretemp ahci drm libahci libata kvm_intel snd_pcm kvm snd_timer irqbypass snd soundcore pcspkr ipmi_si i2c_ismt ipmi_msghandler lpc_sch shpchp acpi_cpufreq
[  408.071520] CPU: 2 PID: 600 Comm: perf Not tainted 4.8.0-rc1-00041-g4129292 #1
[  408.085106] Hardware name: To be filled by O.E.M. To be filled by O.E.M./Double Cove , BIOS BWDEXT.86B.000.012.D127 10/08/2012
[  408.109181]  0000000000000000 ffff88023916fcf0 ffffffff8144bd99 0000000000000000
[  408.123022]  0000000000000000 ffff88023916fd30 ffffffff8107e6cb 00000dca0000000d
[  408.136695]  ffff8801f9bc9800 0000000000000000 0000000000000003 ffff8801f9bc9800
[  408.149723] Call Trace:
[  408.157564]  [<ffffffff8144bd99>] dump_stack+0x63/0x8a
[  408.168028]  [<ffffffff8107e6cb>] __warn+0xcb/0xf0
[  408.178003]  [<ffffffff8107e7bd>] warn_slowpath_null+0x1d/0x20
[  408.188919]  [<ffffffff81168f8d>] perf_event_read+0x17d/0x190
[  408.199648]  [<ffffffff81168fe5>] perf_event_read_value+0x45/0x130
[  408.210680]  [<ffffffff8116d3ab>] perf_read+0x17b/0x2b0
[  408.220656]  [<ffffffff8120c528>] __vfs_read+0x28/0x110
[  408.230485]  [<ffffffff813d8590>] ? security_file_permission+0xa0/0xc0
[  408.241569]  [<ffffffff8120c9be>] ? rw_verify_area+0x4e/0xb0
[  408.251709]  [<ffffffff8120cab6>] vfs_read+0x96/0x130
[  408.261173]  [<ffffffff8120dea6>] SyS_read+0x46/0xa0
[  408.270426]  [<ffffffff8192e9b2>] entry_SYSCALL_64_fastpath+0x1a/0xa4
[  408.281217] ---[ end trace ebd31c6575c28d79 ]---
--


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Xiaolong

View attachment "config-4.8.0-rc1-00041-g4129292" of type "text/plain" (152771 bytes)

View attachment "job-script" of type "text/plain" (6410 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (26872 bytes)

View attachment "job.yaml" of type "text/plain" (4169 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ