lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1510053227.24015.3.camel@gmail.com>
Date:   Tue, 07 Nov 2017 12:13:47 +0100
From:   Richard Genoud <richard.genoud@...il.com>
To:     Stanislaw Gruszka <sgruszka@...hat.com>
Cc:     Helmut Schaa <helmut.schaa@...glemail.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        linux-wireless@...r.kernel.org
Subject: Re: Soft lockup in rt2x00usb_work_rxdone()

Le mardi 07 novembre 2017 à 11:13 +0100, Stanislaw Gruszka a écrit :
> On Tue, Nov 07, 2017 at 11:06:39AM +0100, Richard Genoud wrote:
> > > 3 short articles how to configure and use ftrace are here:
> > > https://lwn.net/Articles/365835/
> > > https://lwn.net/Articles/366796/
> > > https://lwn.net/Articles/370423/
> > > 
> > 
> > I tried with ftrace, but I don't think there's a way to dump the
> > trace
> > when there's a soft lock-up
> > (I can't do anything after the unbind, even the heartbeat led
> > stopped blinking).
> > I saw the /proc/sys/kernel/ftrace_dump_on_oops file, but there's no
> > /proc/sys/kernel/ftrace_dump_on_soft_lock-up file :)
> 
> You should configure function trace with rt2x* functions. After that
> start tracing, unbind the device, then stop tracing and provide trace
> output.
Here is another trace, with rt2* as function filter.
(sorry for the noise)

Dumping ftrace buffer:
---------------------------------
CPU:0 [LOST 3606923 EVENTS]
 0)   0.000 us    |      } /* rt2x00usb_clear_entry */
 0)   0.000 us    |    } /* rt2x00lib_rxdone */
 0)   0.000 us    |    rt2x00queue_get_entry();
 0)               |    rt2x00lib_rxdone() {
 0)   0.000 us    |      rt2x00queue_index_inc();
 0)               |      rt2x00usb_clear_entry() {
 0)               |        rt2x00usb_kick_rx_entry() {
 0)               |          rt2x00lib_dmastart() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)               |          rt2x00lib_dmadone() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)   0.000 us    |        }
 0)   0.000 us    |      }
 0)   0.000 us    |    }
 0)   0.000 us    |    rt2x00queue_get_entry();
 0)               |    rt2x00lib_rxdone() {
 0)   0.000 us    |      rt2x00queue_index_inc();
 0)               |      rt2x00usb_clear_entry() {
 0)               |        rt2x00usb_kick_rx_entry() {
 0)               |          rt2x00lib_dmastart() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)               |          rt2x00lib_dmadone() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)   0.000 us    |        }
 0)   0.000 us    |      }
 0)   0.000 us    |    }
 0)   0.000 us    |    rt2x00queue_get_entry();
 0)               |    rt2x00lib_rxdone() {
 0)   0.000 us    |      rt2x00queue_index_inc();
 0)               |      rt2x00usb_clear_entry() {
 0)               |        rt2x00usb_kick_rx_entry() {
 0)               |          rt2x00lib_dmastart() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)               |          rt2x00lib_dmadone() {
 0)   0.000 us    |            rt2x00queue_index_inc();
 0)   0.000 us    |          }
 0)   0.000 us    |        }
 0)   0.000 us    |      }
 0)   0.000 us    |    }

> 
> Thanks
> Stanislaw

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ