lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250527204728.63d538f8@yea>
Date: Tue, 27 May 2025 20:47:28 +0200
From: Erhard Furtner <erhard_f@...lbox.org>
To: Srikar Dronamraju <srikar@...ux.ibm.com>
Cc: linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org
Subject: Re: WARNING: CPU: 12 PID: 44394 at
 arch/powerpc/kernel/process.c:437 giveup_all+0x90/0x1d0 (v6.14.8, Talos II)

On Tue, 27 May 2025 14:19:13 +0530
Srikar Dronamraju <srikar@...ux.ibm.com> wrote:

> > Getting these from time to time when I run the machine for longer periods building:
> > 
> > [...]
> > ------------[ cut here ]------------
> > WARNING: CPU: 12 PID: 44394 at arch/powerpc/kernel/process.c:437 giveup_all+0x90/0x1d0  
> 
> Its a warning with says that the task's userspace MSR register has
> VSX set but not the VEC or FP.
> 
> Were you building the kernel or were you building something else.
> Can you paste the command you attempted?

I was doing an 'emerge -e @world' in Gentoo Linux and probably building a kernel in another shell. Noticed it only in the logs on the next day so I can't tell exactly which command triggered the issue.

But I will pay closer attention from now on.

> If this is happening with only the recent kernel and working with a previous
> kernel, do you happen to know the previous kernel version.
> In which case, is there a possibility of doing a git bisect?

I think I have not seen this in v6.13, certainly not in v6.12.

As I get this only from time to time bisecting will be hard. For that purpose I have yet to find a way to trigger it more reliably. But I'll take your hints and try!

Regards,
Erhard

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ