lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9a0a9c6d-4e00-4244-b1da-f0b869ba70eb@linux.vnet.ibm.com>
Date: Fri, 22 Nov 2024 16:41:24 +0530
From: Venkat Rao Bagalkote <venkat88@...ux.vnet.ibm.com>
To: linux-kernel@...r.kernel.org
Subject: [6.12.0-gfc39fb56917b]Kernel OOPs while running perf_fuzzer tests

Greetings!!!


I am seeing kernel oops while running perf_fuzzer tests. I saw this 
failure couple of times now.

Issue is seen on IBM Power HW.

Repo: Linux Mainline

Kernel Version: 6.12.0-gfc39fb56917b

Traces:

[17479.927041] Oops: Kernel access of bad area, sig: 7 [#1]
[17479.927045] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
[17479.927050] Modules linked in: rpadlpar_io rpaphp uinput torture 
dummy veth nfsv3 nfs netfs dns_resolver tun brd overlay exfat vfat fat 
btrfs blake2b_generic xor raid6_pq zstd_compress xfs loop sctp 
ip6_udp_tunnel udp_tunnel rpcrdma rdma_cm iw_cm ib_cm ib_core nfsd 
auth_rpcgss nfs_acl lockd grace dm_mod nft_fib_inet nft_fib_ipv4 
nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 
nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack bonding 
nf_defrag_ipv6 nf_defrag_ipv4 tls rfkill sunrpc ip_set nf_tables 
libcrc32c nfnetlink pseries_rng vmx_crypto fuse ext4 mbcache jbd2 sd_mod 
sg ibmvscsi scsi_transport_srp ibmveth [last unloaded: zram]
[17479.927118] CPU: 3 UID: 0 PID: 870493 Comm: perf_fuzzer Kdump: loaded 
Tainted: G   M       O       6.12.0-gfc39fb56917b #1
[17479.927125] Tainted: [M]=MACHINE_CHECK, [O]=OOT_MODULE

[17479.927134] NIP:  c0000000003c76f8 LR: c0000000003a69dc CTR: 
c000000000376988
[17479.927139] REGS: c0000005e141f720 TRAP: 0300   Tainted: G M       
O        (6.12.0-gfc39fb56917b)
[17479.927144] MSR:  8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 
84008428  XER: 20040000
[17479.927154] CFAR: c0000000003a69d8 DAR: 0000000000000010 DSISR: 
00080000 IRQMASK: 0
[17479.927154] GPR00: c0000000003a69dc c0000005e141f9c0 c000000001614400 
0000000000000000
[17479.927154] GPR04: c008000011e50000 0000000000000000 0000000000000000 
c0000005e141f9e0
[17479.927154] GPR08: 0000000000000000 c00000066726ba50 c0000001160dc800 
0000000000008000
[17479.927154] GPR12: c000000000376988 c000000effffbb00 0000000000000000 
0000000000000000
[17479.927154] GPR16: 0000000000000000 0000000000000000 c0000001160dc800 
c0000001160dc880
[17479.927154] GPR20: c0000001160dd538 0000000000000000 0000000000000000 
0000000000000000
[17479.927154] GPR24: 0000000002002000 c0000001160dd710 c0000000784e5500 
c0000001160dc800
[17479.927154] GPR28: c000000529826508 0000000000000000 c000000002bc2348 
c000000149a42418
[17479.927203] NIP [c0000000003c76f8] bpf_prog_array_delete_safe+0x10/0x50
[17479.927211] LR [c0000000003a69dc] perf_event_detach_bpf_prog+0xf4/0x108
[17479.927217] Call Trace:
[17479.927220] [c0000005e141f9c0] [c0000000003a6924] 
perf_event_detach_bpf_prog+0x3c/0x108 (unreliable)
[17479.927227] [c0000005e141fa10] [c000000000481d58] _free_event+0x26c/0x378
[17479.927234] [c0000005e141fa50] [c0000000004858f0] 
perf_event_exit_event+0xd0/0x1ac
[17479.927240] [c0000005e141fa90] [c000000000489f38] 
perf_event_exit_task+0x238/0x2f4
[17479.927247] [c0000005e141fb00] [c000000000173370] do_exit+0x308/0x5a0
[17479.927254] [c0000005e141fbb0] [c0000000001737f4] do_group_exit+0x4c/0xbc
[17479.927260] [c0000005e141fbf0] [c00000000018ad24] get_signal+0xb4c/0xb50
[17479.927265] [c0000005e141fcf0] [c00000000002184c] do_signal+0x7c/0x324
[17479.927272] [c0000005e141fd90] [c0000000000229c0] 
do_notify_resume+0xb0/0x13c
[17479.927279] [c0000005e141fdc0] [c000000000032578] 
interrupt_exit_user_prepare_main+0x1ac/0x264
[17479.927286] [c0000005e141fe20] [c0000000000328a8] 
interrupt_exit_user_prepare+0x58/0xa8
[17479.927292] [c0000005e141fe50] [c00000000000d8e4] 
interrupt_return_srr_user+0x8/0x154
[17479.927299] --- interrupt: a00 at 0x10015b24
[17479.927303] NIP:  0000000010015b24 LR: 000000001000d2dc CTR: 
0000000000000000
[17479.927307] REGS: c0000005e141fe80 TRAP: 0a00   Tainted: G M       
O        (6.12.0-gfc39fb56917b)
[17479.927312] MSR:  800000000280f033 
<SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE>  CR: 48002422  XER: 20040000
[17479.927323] CFAR: 0000000000000000 IRQMASK: 0
[17479.927323] GPR00: 0000000000000040 00007fffcbc09a70 0000000010047f00 
00000000000d3a77
[17479.927323] GPR04: 0000000000000000 0000000000000000 0000000000000001 
00007fff884f1010
[17479.927323] GPR08: 00007fff884f1010 00000000000d3a77 0000000000000000 
0000000000000000
[17479.927323] GPR12: 0000000000000000 00007fff884fa5a0 0000000000000000 
0000000000075f96
[17479.927323] GPR16: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000
[17479.927323] GPR20: 0000000000000000 0000000000000000 0000000000000000 
0000000010002ae8
[17479.927323] GPR24: 00007fff884f0000 00007fff884ef6c0 00007fffcbc0c288 
000000001003fce8
[17479.927323] GPR28: 00007fffcbc0c438 00007fffcbc0c278 0000000000000001 
00007fffcbc09a70
[17479.927369] NIP [0000000010015b24] 0x10015b24
[17479.927372] LR [000000001000d2dc] 0x1000d2dc
[17479.927376] --- interrupt: a00
[17479.927379] Code: 3860fff2 ebe10048 4bffffb4 ebe10048 3860fff2 
4bffffa8 3860fff4 4bffffa0 3c4c0125 3842cd18 7c0802a6 60000000 
<e9230010> 38630010 2c290000 4082001c
[17479.927394] ---[ end trace 0000000000000000 ]---


Regards,

Venkat.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ