lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1487292582.22520.12.camel@decadent.org.uk>
Date:   Fri, 17 Feb 2017 00:49:42 +0000
From:   Ben Hutchings <ben@...adent.org.uk>
To:     x86@...nel.org
Cc:     Miloslav Hula <miloslav.hula@...il.com>, 855183@...s.debian.org,
        LKML <linux-kernel@...r.kernel.org>
Subject: Re: Bug#855183: linux-image-4.9.0-0.bpo.1-amd64: modprobe
 intel_rapl_perf stay in uninterruptible sleep

On Wed, 2017-02-15 at 09:08 +0100, Miloslav Hula wrote:
[...]
> When I boot the system up, there is a constant load 1.0. I found one
> process systemd-udevd in uninterruptible sleep.
> Digging in proc/PID/fd I found, this proces usees fd 7 for
> intel_rapl_perf.ko
> 
> * What exactly did you do (or not do) that was effective (or
> ineffective)?
> I rmmod intel_rapl_perf, the systemd-udevd process disappeared. I
> tried to load intel_rapl_perf manually.
> 
> * What was the outcome of this action?
> Now, the modprobe is in uninterruptible sleep
[...]

Here's a traceback for that:

> [ 1090.784109] INFO: task systemd-udevd:1182 blocked for more than 120 seconds.
> [ 1090.784167]       Not tainted 4.9.0-0.bpo.1-amd64 #1
> [ 1090.784202] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
> [ 1090.784254] systemd-udevd   D    0  1182   1098 0x00000004
> [ 1090.784260]  ffffa079b6c9d000 0000000000000000 ffffa089b8ffa0c0 ffffa079b688c140
> [ 1090.784265]  ffffa089bf2987c0 ffffc1d3ce12bb30 ffffffff929f536d ffffa089bf3d8828
> [ 1090.784268]  ffffc1d3ce12bb60 00000000924b0afe ffffa089bf2987c0 ffffa079b688c140
> [ 1090.784272] Call Trace:
> [ 1090.784284]  [<ffffffff929f536d>] ? __schedule+0x23d/0x6d0
> [ 1090.784308]  [<ffffffffc083e6b0>] ? uncore_cpu_prepare+0x100/0x100 [intel_uncore]
> [ 1090.784310]  [<ffffffff929f5832>] ? schedule+0x32/0x80
> [ 1090.784316]  [<ffffffff929f8d3c>] ? schedule_timeout+0x21c/0x3c0
> [ 1090.784327]  [<ffffffff924b1374>] ? enqueue_task_fair+0x74/0x950
> [ 1090.784329]  [<ffffffff929f5375>] ? __schedule+0x245/0x6d0
> [ 1090.784336]  [<ffffffff9242ed05>] ? sched_clock+0x5/0x10
> [ 1090.784344]  [<ffffffffc083e6b0>] ? uncore_cpu_prepare+0x100/0x100 [intel_uncore]
> [ 1090.784347]  [<ffffffff929f624a>] ? wait_for_completion+0xfa/0x130
> [ 1090.784353]  [<ffffffff924a2b60>] ? wake_up_q+0x60/0x60
> [ 1090.784358]  [<ffffffff924791b6>] ? cpuhp_issue_call+0x96/0xc0
> [ 1090.784361]  [<ffffffff9247946a>] ? __cpuhp_setup_state+0xca/0x200
> [ 1090.784369]  [<ffffffffc069d34d>] ? intel_uncore_init+0x1f7/0xeaa [intel_uncore]
> [ 1090.784376]  [<ffffffffc069d156>] ? uncore_type_init+0x156/0x156 [intel_uncore]
> [ 1090.784383]  [<ffffffff9240218c>] ? do_one_initcall+0x4c/0x180
> [ 1090.784393]  [<ffffffff9257cbaf>] ? do_init_module+0x5a/0x1f1
> [ 1090.784400]  [<ffffffff92502729>] ? load_module+0x23c9/0x28f0
> [ 1090.784403]  [<ffffffff924fef90>] ? __symbol_put+0x60/0x60
> [ 1090.784411]  [<ffffffff92603964>] ? vfs_read+0x114/0x130
> [ 1090.784418]  [<ffffffff926a4351>] ? security_capable+0x41/0x60
> [ 1090.784421]  [<ffffffff92502e3e>] ? SYSC_finit_module+0x8e/0xe0
> [ 1090.784425]  [<ffffffff929fa1bb>] ? system_call_fast_compare_end+0xc/0x9b
[...]

The CPU is a Broadwell (I don't have more information than that);
here's the model information from DMI:

> ** Model information
> sys_vendor: Supermicro
> product_name: X10DRi
> product_version: 123456789
> chassis_vendor: Default string
> chassis_version: Default string
> bios_vendor: American Megatrends Inc.
> bios_version: 2.1
> board_vendor: Supermicro
> board_name: X10DRi
> board_version: 1.02B
[...]

The full bug report is at <https://bugs.debian.org/855183>, with a
little more system information.

Ben.

-- 
Ben Hutchings
Any sufficiently advanced bug is indistinguishable from a feature.

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ