lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <f088db6a-6b1e-ff76-b400-5417ad99008e@linux.vnet.ibm.com>
Date:   Wed, 1 Mar 2023 12:37:35 +0530
From:   Abdul Haleem <abdhalee@...ux.vnet.ibm.com>
To:     linux-kernel <linux-kernel@...r.kernel.org>,
        Alexey Kardashevskiy <aik@....com>
Cc:     linux-kernel <linux-kernel@...r.kernel.org>,
        linuxppc-dev <linuxppc-dev@...ts.ozlabs.org>,
        Michael Ellerman <mpe@...erman.id.au>,
        Brian King <brking@...ux.vnet.ibm.com>, zdai@...ibm.com,
        aik@....com, "linux-mm@...ck.org" <linux-mm@...ck.org>,
        iommu@...ts.linux.dev, sachinp <sachinp@...ux.vnet.ibm.com>,
        manvanth <manvanth@...ux.vnet.ibm.com>
Subject: [mainline 6.2.0][PPC][bisected b1fc44e] WARNING: CPU: 3 PID: 3873 at
 arch/powerpc/kernel/iommu.c

Greeting's

DLPAR remove operation of SRIOV logical device triggers WARN_ON() on 
mainline kernel 6.2.0 (first seen on 5.19.0)

Regression was introduced by below patch, as WARN_ON is not seen when 
reverted

commit b1fc44eaa9ba31e28c4125d6b9205a3582b47b5d
Author: Alexey Kardashevskiy <aik@...abs.ru>
Date:   Wed Jun 29 16:06:14 2022 +1000

     pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window


kernel : mainline 6.2.0
Machine: Power 10 PowerVM LPAR
test :  drmgr -c phb -s "PHB 4432" -r -d 5   (DLPAR remove)
kernel config: attached

console logs:
  ------------[ cut here ]------------
WARNING: CPU: 3 PID: 3873 at arch/powerpc/kernel/iommu.c:830 
iommu_tce_table_put+0x20/0x170
Modules linked in: rpcrdma sunrpc rdma_ucm ib_srpt ib_isert 
iscsi_target_mod target_core_mod ib_iser ib_umad rdma_cm ib_ipoib iw_cm 
libiscsi ib_cm scsi_transport_iscsi mlx5_ib ib_uverbs ib_core mlx5_core 
mlxfw psample ptp pps_core rpadlpar_io rpaphp tcp_diag udp_diag 
inet_diag unix_diag af_packet_diag netlink_diag bonding rfkill xts 
vmx_crypto pseries_rng sch_fq_codel binfmt_misc ip_tables ext4 mbcache 
jbd2 dm_service_time sd_mod t10_pi crc64_rocksoft crc64 sg ibmvfc 
scsi_transport_fc ibmveth dm_multipath dm_mirror dm_region_hash dm_log 
dm_mod fuse
CPU: 3 PID: 3873 Comm: drmgr Not tainted 5.19.0-autotest-geb555cb5b794 #1
NIP:  c000000000062380 LR: c0000000000fd9e8 CTR: c000000000060720
REGS: c000000053d87790 TRAP: 0700   Not tainted 
(5.19.0-autotest-geb555cb5b794)
MSR:  8000000000029033 <SF,EE,ME,IR,DR,RI,LE>  CR: 24002244  XER: 20040000
CFAR: c0000000000fd9e4 IRQMASK: 0
GPR00: c0000000000fd9e8 c000000053d87a30 c000000002a10700 0000000000000000
GPR04: c00c000000036ac0 c00000000dab0830 c00000000dab0830 0000000000000001
GPR08: 027ffff000000201 0000000000000001 0000000000000001 fffffffffffffffd
GPR12: 0000000000002000 c00000077fff8e80 0000000000000000 0000000000000000
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: 0000000000000000 0000000136dc20f8 0000000136dbee08 0000000000000006
GPR24: 0000000000000000 00000001749423fd c000000002970418 c000000053d87b50
GPR28: 0000000000000002 0000000000000000 c000000009781500 c000000054f1a2c0
NIP [c000000000062380] iommu_tce_table_put+0x20/0x170
LR [c0000000000fd9e8] iommu_reconfig_notifier+0x98/0x220
Call Trace:
[c000000053d87a30] [c0000000659eec00] 0xc0000000659eec00 (unreliable)
[c000000053d87aa0] [c0000000000fd9d4] iommu_reconfig_notifier+0x84/0x220
[c000000053d87ae0] [c00000000018e174] 
blocking_notifier_call_chain+0xa4/0x110
[c000000053d87b30] [c000000000a76f6c] of_detach_node+0xbc/0x100
[c000000053d87b90] [c0000000000f9fc8] ofdt_write+0x898/0x1050
[c000000053d87c60] [c0000000005656dc] proc_reg_write+0x10c/0x1b0
[c000000053d87c90] [c000000000493cc4] vfs_write+0x104/0x460
[c000000053d87d50] [c0000000004941fc] ksys_write+0x7c/0x140
[c000000053d87da0] [c000000000033b88] system_call_exception+0x198/0x430
[c000000053d87e10] [c00000000000c63c] system_call_common+0xec/0x250
--- interrupt: c00 at 0x20002a31bd74
NIP:  000020002a31bd74 LR: 0000000136da3804 CTR: 0000000000000000
REGS: c000000053d87e80 TRAP: 0c00   Not tainted 
(5.19.0-autotest-geb555cb5b794)
MSR:  800000000200d033 <SF,VEC,EE,PR,ME,IR,DR,RI,LE>  CR: 24002402  XER: 
00000000
IRQMASK: 0
GPR00: 0000000000000004 00007ffff4a44ec0 000020002a417100 0000000000000006
GPR04: 00007ffff4a44f68 0000000000000020 0000000000000000 00000001749423fd
GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR12: 0000000000000000 0000200029f5b520 0000000000000000 0000000000000000
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: 0000000000000000 0000000136dc20f8 0000000136dbee08 0000000136dbcfd0
GPR24: 0000000136dc1dc8 0000000136dc20c8 0000000136dbcfd0 0000000136dbd038
GPR28: 0000000000000020 0000000000000006 00000001749423d8 00007ffff4a44f68
NIP [000020002a31bd74] 0x20002a31bd74
LR [0000000136da3804] 0x136da3804
--- interrupt: c00
Instruction dump:
4e800020 60000000 60000000 60000000 3c4c029b 3842e3a0 7c0802a6 60000000
7c690074 fbc1fff0 f821ff91 7929d182 <0b090000> fbe10068 7c7f1b78 38630330
---[ end trace 0000000000000000 ]---

-- 
Regard's

Abdul Haleem
IBM Linux Technology Center
View attachment "ZZ-VM-config" of type "text/plain" (147154 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ