lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzZ=Z9kuXf-tAZpw3QTK4VA7vmCCP5nWJTV1L=x3wRhfKQ@mail.gmail.com>
Date: Mon, 12 Aug 2024 21:58:20 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Peter Ziljstra <peterz@...radead.org>
Cc: open list <linux-kernel@...r.kernel.org>, 
	"linux-perf-use." <linux-perf-users@...r.kernel.org>, Ingo Molnar <mingo@...hat.com>
Subject: New "using smp_processor_id() in preemptible" splat on tip/perf/core

Hey Peter,

I started getting a new splat on the latest tip/perf/core, I suspect
it's due to [0], which moved this_cpu_ptr() outside of
raw_spin_lock-protected area. Please take a look, thanks.

  [0] https://lore.kernel.org/linux-perf-users/20240807115550.138301094@infradead.org

[  139.529263] BUG: using smp_processor_id() in preemptible [00000000]
code: test_progs/2361
[  139.530412] caller is event_function_call+0x2f/0x180
[  139.531081] CPU: 10 UID: 0 PID: 2361 Comm: test_progs Tainted: G
       OE      6.11.0-rc1-00043-gb5e7663f6aac #217
[  139.532531] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[  139.533246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  139.534789] Call Trace:
[  139.535123]  <TASK>
[  139.535417]  dump_stack_lvl+0x56/0x80
[  139.535906]  check_preemption_disabled+0xc6/0xe0
[  139.536526]  event_function_call+0x2f/0x180
[  139.537088]  ? preempt_count_add+0x6c/0xa0
[  139.537639]  perf_event_release_kernel+0x72/0x2b0
[  139.538263]  ? __rseq_handle_notify_resume+0x26e/0x4a0
[  139.538973]  perf_release+0x11/0x20
[  139.539451]  __fput+0xee/0x2c0
[  139.539872]  __x64_sys_close+0x38/0x80
[  139.540389]  do_syscall_64+0x47/0x100
[  139.540900]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
[  139.541601] RIP: 0033:0x7f4b043fea94
[  139.542095] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84
00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00
00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c
e8 c3
[  139.544656] RSP: 002b:00007ffc19703188 EFLAGS: 00000202 ORIG_RAX:
0000000000000003
[  139.545683] RAX: ffffffffffffffda RBX: 00007ffc19703748 RCX: 00007f4b043fea94
[  139.546609] RDX: 00000000ffffffff RSI: 0000000000000939 RDI: 0000000000000007
[  139.547548] RBP: 00007ffc19703270 R08: 0000000000000008 R09: 0000000000000000
[  139.548515] R10: 00000000ffffffff R11: 0000000000000202 R12: 0000000000000000
[  139.549486] R13: 00007ffc19703778 R14: 00007f4b0455b000 R15: 0000000001004d90
[  139.550449]  </TASK>

-- Andrii

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ