lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <bfb2d2dc-fd27-19b8-f83e-aead73ccc0b3@linux.vnet.ibm.com>
Date:   Wed, 25 Jan 2017 20:32:13 +0530
From:   abdul <abdhalee@...ux.vnet.ibm.com>
To:     linuxppc-dev@...ts.ozlabs.org
Cc:     linux-kernel@...r.kernel.org, ego@...ux.vnet.ibm.co,
        aneesh.kumar@...ux.vnet.ibm.com, mpe@...erman.id.au,
        Sachin Sant <sachinp@...ux.vnet.ibm.com>
Subject: [PowerPC] [next-20170125] WARNING at kernel/sched/sched.h:804
 set_next_entity+0xb88/0xca0

Hi,

Today's next tree has warning messages in dmesg when running rcutorture 
tests.

Machine : Power8 PowerVM LPAR
Build kernel : 4.10.0-rc5-next-20170125

Steps to recreate:
1.modprobe rcutorture
2.32 CPUS; offline 0-15 CPUS keeping 16-31 CPUs online and vice versa in 
a loop
3. modprobe -r rcutorture

trace messages:
rcu-torture: Creating rcu_torture_cbflood task
rcu-torture: rcu_torture_cbflood task started
rcu-torture: rcu_torture_cbflood task started
rq->clock_update_flags < RQCF_ACT_SKIP
------------[ cut here ]------------
WARNING: CPU: 1 PID: 8780 at kernel/sched/sched.h:804 
set_next_entity+0xb88/0xca0
Modules linked in: rcutorture torture tun bridge stp llc kvm xt_tcpudp 
ipt_REJECT nf_reject_ipv4 xt_conntrack nfnetlink iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack 
iptable_mangle iptable_filter vmx_crypto pseries_rng rng_core 
binfmt_misc nfsd ip_tables x_tables autofs4
CPU: 1 PID: 8780 Comm: torture_shuffle Not tainted 
4.10.0-rc5-next-20170125-autotest #1
task: c0000003a6520000 task.stack: c0000003aa3e4000
NIP: c0000000016c1a18 LR: c0000000016c1a14 CTR: c000000001b38d30
REGS: c0000003aa3e7900 TRAP: 0700   Not tainted 
(4.10.0-rc5-next-20170125-autotest)
MSR: 800000000282b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>
   CR: 28042022  XER: 00000000
CFAR: c000000001f8c204 SOFTE: 0
GPR00: c0000000016c1a14 c0000003aa3e7b80 c000000002631500 0000000000000026
GPR04: 0000000000000000 0000000000000006 6574616470755f6b 3c207367616c665f
GPR08: 0000000000000000 c00000000230bdc0 00000003bda23000 00000000000001dd
GPR12: 0000000000002200 c00000000ea80400 c00000000169e0d8 c0000003a643ff00
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: 0000000000000000 0000000000000000 0000000000000001 c00000000264aaa8
GPR24: ffffffffffffffff d000000006370cb8 d000000006370400 c00000000264aaa8
GPR28: d0000000063712f0 c0000003bfd75a80 c0000003bfd75a00 c0000003acd74a80
NIP [c0000000016c1a18] set_next_entity+0xb88/0xca0
LR [c0000000016c1a14] set_next_entity+0xb84/0xca0
Call Trace:
[c0000003aa3e7b80] [c0000000016c1a14] set_next_entity+0xb84/0xca0 
(unreliable)
[c0000003aa3e7c30] [c0000000016c1b6c] set_curr_task_fair+0x3c/0x60
[c0000003aa3e7c60] [c0000000016ace64] do_set_cpus_allowed+0xd4/0x1c0
[c0000003aa3e7ca0] [c0000000016ad6e8] __set_cpus_allowed_ptr+0x128/0x290
[c0000003aa3e7d10] [d00000000636eaec] 
torture_kthread_stopping+0x1dc/0x710 [torture]
[c0000003aa3e7dc0] [c00000000169e21c] kthread+0x14c/0x190
[c0000003aa3e7e30] [c0000000015cbc60] ret_from_kernel_thread+0x5c/0x7c
Instruction dump:
fbdf0068 4bfff4fc 3d42fff2 892af4ab 2f890000 40fef8a4 39200001 3c62ffb4
38636328 992af4ab 488ca7b5 60000000 <0fe00000> 4bfff884 3d02fff2 8928f4ab
---[ end trace 33443e753ef16727 ]---
rcu-torture: Stopping rcu_torture_reader
rcu-torture: Stopping rcu_torture_reader
rcu-torture: Stopping torture_shuffle task
rcu-torture: Stopping rcu_torture_reader

Config file attached

View attachment "alp12-le-config" of type "text/plain" (86633 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ