lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAKfTPtDrHv4OOfPvwOE2DMNoucXQJ=yvvEpTVKrXghSdKEnZcA@mail.gmail.com>
Date:   Tue, 22 Jun 2021 09:49:31 +0200
From:   Vincent Guittot <vincent.guittot@...aro.org>
To:     Sachin Sant <sachinp@...ux.vnet.ibm.com>
Cc:     open list <linux-kernel@...r.kernel.org>,
        Linux Next Mailing List <linux-next@...r.kernel.org>,
        linuxppc-dev@...ts.ozlabs.org, Odin Ugedal <odin@...d.al>
Subject: Re: [powerpc][next-20210621] WARNING at kernel/sched/fair.c:3277
 during boot

Hi Sachin,

On Tue, 22 Jun 2021 at 09:39, Sachin Sant <sachinp@...ux.vnet.ibm.com> wrote:
>
> While booting 5.13.0-rc7-next-20210621 on a PowerVM LPAR following warning
> is seen
>
> [   30.922154] ------------[ cut here ]------------
> [   30.922201] cfs_rq->avg.load_avg || cfs_rq->avg.util_avg || cfs_rq->avg.runnable_avg
> [   30.922219] WARNING: CPU: 6 PID: 762 at kernel/sched/fair.c:3277 update_blocked_averages+0x758/0x780
> [   30.922259] Modules linked in: pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables sd_mod t10_pi sg fuse
> [   30.922309] CPU: 6 PID: 762 Comm: augenrules Not tainted 5.13.0-rc7-next-20210621 #1
> [   30.922329] NIP:  c0000000001b27e8 LR: c0000000001b27e4 CTR: c0000000007cfda0
> [   30.922344] REGS: c000000023fcb660 TRAP: 0700   Not tainted  (5.13.0-rc7-next-20210621)
> [   30.922359] MSR:  8000000000029033 <SF,EE,ME,IR,DR,RI,LE>  CR: 48488224  XER: 00000005
> [   30.922394] CFAR: c00000000014d120 IRQMASK: 1
>                GPR00: c0000000001b27e4 c000000023fcb900 c000000002a08400 0000000000000048
>                GPR04: 00000000ffff7fff c000000023fcb5c0 0000000000000027 c000000f6fdd7e18
>                GPR08: 0000000000000023 0000000000000001 0000000000000027 c0000000028a6650
>                GPR12: 0000000000008000 c000000f6fff7680 c000000f6fe62600 0000000000000032
>                GPR16: 00000007331a989a c000000f6fe62600 c0000000238a6800 0000000000000001
>                GPR20: 0000000000000000 c000000002a4dfe0 0000000000000000 0000000000000006
>                GPR24: 0000000000000000 c000000f6fe63010 0000000000000001 c000000f6fe62680
>                GPR28: 0000000000000006 c0000000238a69c0 0000000000000000 c000000f6fe62600
> [   30.922569] NIP [c0000000001b27e8] update_blocked_averages+0x758/0x780
> [   30.922599] LR [c0000000001b27e4] update_blocked_averages+0x754/0x780
> [   30.922624] Call Trace:
> [   30.922631] [c000000023fcb900] [c0000000001b27e4] update_blocked_averages+0x754/0x780 (unreliable)
> [   30.922653] [c000000023fcba20] [c0000000001bd668] newidle_balance+0x258/0x5c0
> [   30.922674] [c000000023fcbab0] [c0000000001bdaac] pick_next_task_fair+0x7c/0x4d0
> [   30.922692] [c000000023fcbb10] [c000000000dcd31c] __schedule+0x15c/0x1780
> [   30.922708] [c000000023fcbc50] [c0000000001a5a04] do_task_dead+0x64/0x70
> [   30.922726] [c000000023fcbc80] [c000000000156338] do_exit+0x848/0xcc0
> [   30.922743] [c000000023fcbd50] [c000000000156884] do_group_exit+0x64/0xe0
> [   30.922758] [c000000023fcbd90] [c000000000156924] sys_exit_group+0x24/0x30
> [   30.922774] [c000000023fcbdb0] [c0000000000310c0] system_call_exception+0x150/0x2d0
> [   30.922792] [c000000023fcbe10] [c00000000000cc5c] system_call_common+0xec/0x278
> [   30.922808] --- interrupt: c00 at 0x7fffb3acddcc
> [   30.922821] NIP:  00007fffb3acddcc LR: 00007fffb3a27f04 CTR: 0000000000000000
> [   30.922833] REGS: c000000023fcbe80 TRAP: 0c00   Not tainted  (5.13.0-rc7-next-20210621)
> [   30.922847] MSR:  800000000280f033 <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE>  CR: 28444202  XER: 00000000
> [   30.922882] IRQMASK: 0
>                GPR00: 00000000000000ea 00007fffc8f21780 00007fffb3bf7100 0000000000000000
>                GPR04: 0000000000000000 0000000155f142f0 0000000000000000 00007fffb3d23740
>                GPR08: fffffffffbad2a87 0000000000000000 0000000000000000 0000000000000000
>                GPR12: 0000000000000000 00007fffb3d2aeb0 0000000116be95e0 0000000000000032
>                GPR16: 0000000000000000 00007fffc8f21cd8 000000000000002d 0000000000000024
>                GPR20: 00007fffc8f21cd4 00007fffb3bf4f98 0000000000000001 0000000000000001
>                GPR24: 00007fffb3bf0950 0000000000000000 0000000000000000 0000000000000001
>                GPR28: 0000000000000000 0000000000000000 00007fffb3d23ec0 0000000000000000
> [   30.923023] NIP [00007fffb3acddcc] 0x7fffb3acddcc
> [   30.923035] LR [00007fffb3a27f04] 0x7fffb3a27f04
> [   30.923045] --- interrupt: c00
> [   30.923052] Instruction dump:
> [   30.923061] 3863be48 9be97ae6 4bf9a8f9 60000000 0fe00000 4bfff980 e9210070 e8610088
> [   30.923088] 39400001 99490003 4bf9a8d9 60000000 <0fe00000> 4bfffc24 3d22fff5 89297ae3
> [   30.923113] ---[ end trace ed07974d2149c499 ]—
>
> This warning was introduced with commit 9e077b52d86a
> sched/pelt: Check that *_avg are null when *_sum are

Yes. That was exactly the purpose of the patch. There is one last
remaining part which could generate this. I'm going to prepare a patch

Thanks

>
> next-20210618 was good.
>
> Thanks
> -Sachin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ