lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141210235658.GB28630@pd.tnic>
Date:	Thu, 11 Dec 2014 00:56:58 +0100
From:	Borislav Petkov <bp@...en8.de>
To:	Fengguang Wu <fengguang.wu@...el.com>
Cc:	Dietmar Eggemann <dietmar.eggemann@....com>,
	Michael Turquette <mturquette@...erred.io>, LKP <lkp@...org>,
	linux-kernel@...r.kernel.org
Subject: Re: [sched] WARNING: CPU: 0 PID: 0 at
 arch/x86/kernel/cpu/common.c:1439 warn_pre_alternatives()

On Wed, Dec 10, 2014 at 03:26:45PM -0800, Fengguang Wu wrote:
> Hi Dietmar,
> 
> FYI, here is another bisect result.
> 
> https://git.linaro.org/people/mturquette/linux.git eas-next
> commit 1fadb581b0be9420b143e43ff2f4a07ea7e45f6c
> Author:     Dietmar Eggemann <dietmar.eggemann@....com>
> AuthorDate: Tue Dec 2 14:06:24 2014 +0000
> Commit:     Michael Turquette <mturquette@...erred.io>
> CommitDate: Tue Dec 9 20:33:17 2014 -0800
> 
>     sched: Make usage and load tracking cpu scale-invariant
>     
>     Besides the existing frequency scale-invariance correction factor, apply
>     cpu scale-invariance correction factor to usage and load tracking.
>     
>     Cpu scale-invariance takes cpu performance deviations due to
>     micro-architectural differences (i.e. instructions per seconds) between
>     cpus in HMP systems (e.g. big.LITTLE) and differences in the frequency
>     value of the highest OPP between cpus in SMP systems into consideration.
>     
>     Each segment of the sched_avg::{running_avg_sum, runnable_avg_sum}
>     geometric series is now scaled by the cpu performance factor too so the
>     sched_avg::{utilization_avg_contrib, load_avg_contrib} of each entity will
>     be invariant from the particular cpu of the HMP/SMP system it is gathered
>     on. As a result, cfs_rq::runnable_load_avg which is the sum of
>     sched_avg::load_avg_contrib, becomes cpu scale-invariant too.
>     
>     So the {usage, load} level that is returned by {get_cpu_usage,
>     weighted_cpuload} stays relative to the max cpu performance of the system.
>     
>     Cc: Ingo Molnar <mingo@...hat.com>
>     Cc: Peter Zijlstra <peterz@...radead.org>
>     Signed-off-by: Dietmar Eggemann <dietmar.eggemann@....com>
> 
> ===================================================
> PARENT COMMIT NOT CLEAN. LOOK OUT FOR WRONG BISECT!
> ===================================================
> 
> Attached dmesg for the parent commit, too, to help confirm whether it is a noise error.
> 
> +------------------------------------------------------------------+------------+------------+------------+
> |                                                                  | e754569101 | 1fadb581b0 | 1e7327cb22 |
> +------------------------------------------------------------------+------------+------------+------------+
> | boot_successes                                                   | 0          | 0          | 0          |
> | boot_failures                                                    | 80         | 20         | 14         |
> | Kernel_panic-not_syncing:Out_of_memory_and_no_killable_processes | 80         |            |            |
> | backtrace:lock_torture_stats                                     | 80         |            |            |
> | WARNING:at_arch/x86/kernel/cpu/common.c:#warn_pre_alternatives() | 0          | 19         | 14         |
> | BUG:unable_to_handle_kernel                                      | 0          | 19         | 14         |
> | Oops                                                             | 0          | 19         | 14         |
> | RIP:arch_scale_cpu_capacity                                      | 0          | 19         | 14         |
> | Kernel_panic-not_syncing:Fatal_exception_in_interrupt            | 0          | 19         | 14         |
> | backtrace:acpi_load_tables                                       | 0          | 19         | 14         |
> | backtrace:acpi_early_init                                        | 0          | 19         | 14         |
> | BUG:kernel_boot_crashed                                          | 0          | 1          |            |
> +------------------------------------------------------------------+------------+------------+------------+
> 
> [    0.020000] pid_max: default: 32768 minimum: 301
> [    0.020000] ACPI: Core revision 20140926
> [    0.020006] ------------[ cut here ]------------
> [    0.021391] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/cpu/common.c:1439 warn_pre_alternatives+0x2e/0x40()
> [    0.024425] You're using static_cpu_has before alternatives have run!

This says it...

> [    0.026159] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.18.0-rc2-g1fadb58 #507
> [    0.028350] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
> [    0.029899]  0000000000000009 ffff8800126039f8 ffffffff82d77315 ffff880012603a48
> [    0.030000]  0000000000000009 ffff880012603a38 ffffffff81105674 0000000000000000
> [    0.030000]  0000000000000050 ffffffff83c7de40 0000000000000000 0000000000000060
> [    0.030000] Call Trace:
> [    0.030000]  <IRQ>  [<ffffffff82d77315>] dump_stack+0xc5/0x175
> [    0.030000]  [<ffffffff81105674>] warn_slowpath_common+0xc4/0x100
> [    0.030000]  [<ffffffff81105746>] warn_slowpath_fmt+0x56/0x60
> [    0.030000]  [<ffffffff81034dde>] warn_pre_alternatives+0x2e/0x40
> [    0.030000]  [<ffffffff81092831>] __do_page_fault+0x4f1/0x1060

... and it looks like it might be smap_violation() which uses
static_cpu_has() in __do_page_fault(). To verify, one would have to
rebuild with the attached config and peek at __do_page_fault+0x4f1 to
see whether that is actually the case.

-- 
Regards/Gruss,
    Boris.

Sent from a fat crate under my desk. Formatting is fine.
--
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ