lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <db7043a4-f815-4178-8d81-2da1dda6236e@linux.intel.com>
Date: Tue, 29 Jul 2025 17:23:32 +0800
From: "Mi, Dapeng" <dapeng1.mi@...ux.intel.com>
To: Vince Weaver <vincent.weaver@...ne.edu>
Cc: linux-kernel@...r.kernel.org, linux-perf-users@...r.kernel.org,
 "Liang, Kan" <kan.liang@...ux.intel.com>,
 Peter Zijlstra <peterz@...radead.org>, Ingo Molnar <mingo@...hat.com>,
 Arnaldo Carvalho de Melo <acme@...nel.org>,
 Namhyung Kim <namhyung@...nel.org>, Mark Rutland <mark.rutland@....com>,
 Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
 Jiri Olsa <jolsa@...nel.org>, Ian Rogers <irogers@...gle.com>,
 Adrian Hunter <adrian.hunter@...el.com>
Subject: Re: [perf] fuzzer triggers "BUG: kernel NULL pointer dereference"

Hi Vince,

Could you please provide more information about this issue?  Like HW
information, how long can the issue be produced and whether the issue can
be seen in latest kernel (6.16)? Thanks.

--

Dapeng Mi

On 7/22/2025 5:17 AM, Vince Weaver wrote:
> I'm still tracking this fuzzer issue.  The fuzzer can reliably trigger the 
> crash but only 32000 syscalls deep into a run and I am having a lot of 
> trouble trying to gather a trace/testcase that can generate it.
>
> I was hoping the recent
> 	[PATCH] perf/x86: Check if cpuc->events[*] pointer exists before accessing it
> patch might fix things as the symptoms were vaguely similar but that 
> particular patch does not fix the problem.
>
> Vince
>
> On Tue, 8 Jul 2025, Vince Weaver wrote:
>
>> Hello
>>
>> the perf_fuzzer can reliably trigger this on a 6.16-rc2 kernel.  It 
>> doesn't look obviously perf related but since the perf_fuzzer triggered it 
>> I thought I'd report it as a perf issue first.  I can work on a smaller 
>> test case but that might take a bit especially as the machine locks up 
>> super hard and requires being unplugged after it's triggered.
>>
>> let me know if there's any other info I can provide.  The dump below is 
>> transcribed from a screenshot as I still haven't figured out a way to get 
>> a serial console on this Raptorlake system.
>>
>> BUG: kernel NULL pointer dereference, address: 0000000000000008
>> #PF: supervisor read access in kernel mode
>> #PF: error_code(0x0000) - not-present page
>> PGD 0 P4D 0
>> Oops: Oops: 0000 [#1] SMP NOPTI
>> CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Not tainted 6.16.0-rc2+ #8 PREEMPT (voluntary)
>> Hardware name: Dell Inc. Precision 3660/0VJ7G2
>> RIP: 0010:rb_insert_color+0x18/0x130
>> Code: 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 07
>> RSP: 0018:ffffb5e5c01e3df8 EFLAGS: 00010046
>> RAX: ffff93f1927f8168 .....
>> ...
>> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> CR2: 000000000000008 CR3: 00000000596824001 CR4: 000000000000f72ef0
>> DR0: 00000000a000001 ....
>> PKRU: 55555554
>> Call Trace:
>>  <TASK>
>>  timerqueue_add+0x66/0xb0
>>  hrtimer_start_range_ns+0x102/0x420
>>  ? next_zone+0x42/0x70
>>  tick_nohz_stop_tick+0xce/0x230
>>  tick_nohz_idle_stop_tick+0x70/0xd0
>>  do_idle+0x1d3/240
>>  cpu_startup_entry+0x29/0x30
>>  start_secondary+0x119/0x140
>>  common_startup_64+0x13e/0x141
>>  </TASK>
>>
>>
>>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ