lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 10 Mar 2017 11:39:42 -0600
From:   Tom Lendacky <thomas.lendacky@....com>
To:     Mark Rutland <mark.rutland@....com>, <netdev@...r.kernel.org>,
        <linux-kernel@...r.kernel.org>
CC:     "David S. Miller" <davem@...emloft.net>
Subject: Re: amd-xgbe: unbalanced irq enable in v4.11-rc1

On 3/10/2017 11:19 AM, Mark Rutland wrote:
> Hi,
>
> I'm seeing the below splat when transferring data over the network, using
> v4.11-rc1 on an AMD Seattle platform. I don't see the splat with v4.10.
>
> Looking at just the driver, I couldn't see any suspicious changes. Reverting
> commit 402168b4c2dc0734 ("amd-xgbe: Stop the PHY before releasing interrupts")
> doesn't change matters.
>
> Any ideas?

Yes, patch submitted.  Please see:

	http://marc.info/?l=linux-netdev&m=148910333810442&w=2

Thanks,
Tom

>
> Thanks,
> Mark.
>
> [  106.114135] Unbalanced enable for IRQ 34
> [  106.118157] ------------[ cut here ]------------
> [  106.122793] WARNING: CPU: 0 PID: 0 at kernel/irq/manage.c:529 __enable_irq+0x168/0x1d8
> [  106.130708] Modules linked in:
> [  106.133766]
> [  106.135262] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.11.0-rc1-00001-g2411f70 #5
> [  106.142830] Hardware name: AMD Seattle (Rev.B0) Development Board (Overdrive) (DT)
> [  106.150398] task: ffff20000a9e2000 task.stack: ffff20000a9c0000
> [  106.156320] PC is at __enable_irq+0x168/0x1d8
> [  106.160679] LR is at __enable_irq+0x168/0x1d8
> [  106.165036] pc : [<ffff2000082a1340>] lr : [<ffff2000082a1340>] pstate: 000001c5
> [  106.172428] sp : ffff8003fff17c50
> [  106.175742] x29: ffff8003fff17c50 x28: ffff800359255160
> [  106.181063] x27: 1ffff0006b24aa2d x26: ffff800359255170
> [  106.186385] x25: ffff20000a9ca000 x24: ffff800359255168
> [  106.191706] x23: ffff80036902ca80 x22: ffff80036bbe8f78
> [  106.197027] x21: 1ffff0006d77d1ef x20: 0000000000000000
> [  106.202348] x19: ffff80036bbe8f00 x18: ffff20000a9e27b8
> [  106.207668] x17: 0000ffff7e2b5d90 x16: 0000000000000000
> [  106.212989] x15: 1fffe4000153c4f7 x14: 00006003f5590000
> [  106.218310] x13: ffff20000ac45000 x12: ffff20000b803000
> [  106.223631] x11: 1fffe40001ba7a8d x10: 0000000000000000
> [  106.228951] x9 : ffff10007ffe2ee0 x8 : ffff20000a9e27e8
> [  106.234272] x7 : ffff20000d2d3000 x6 : 0000000000000000
> [  106.239592] x5 : 0000000041b58ab3 x4 : 1fffe40001ba3a10
> [  106.244913] x3 : 1fffe40001ba3a10 x2 : dfff200000000000
> [  106.250234] x1 : ffff10007ffe2f58 x0 : 000000000000001c
> [  106.255553]
> [  106.257044] ---[ end trace 86935ef2e5e5c498 ]---
> [  106.261658] Call trace:
> [  106.264106] Exception stack(0xffff8003fff17a00 to 0xffff8003fff17b30)
> [  106.270550] 7a00: ffff80036bbe8f00 0001000000000000 ffff8003fff17c50 ffff2000082a1340
> [  106.278383] 7a20: 00000000000001c5 000000000000003d ffff20000a9ca000 ffff800359255170
> [  106.286216] 7a40: 1ffff0006b24aa2d ffff20000a9e2000 ffff8003fff17b60 0000ffff73870f20
> [  106.294048] 7a60: 0000000041b58ab3 ffff20000a7164f0 ffff200008081ac8 ffff20000a05d4a0
> [  106.301881] 7a80: ffff80036902ca80 ffff800359255168 ffff20000a9ca000 ffff800359255170
> [  106.309713] 7aa0: ffff8003fff17c50 ffff8003fff17c50 ffff8003fff17c10 00000000ffffffc8
> [  106.317546] 7ac0: 0000000041b58ab3 ffff20000a72a340 ffff200008299380 ffff20000a9e2000
> [  106.325379] 7ae0: ffff8003fff17b20 ffff200008bf8f08 ffff80036bbe8f00 ffff80036d8002c0
> [  106.333211] 7b00: ffff80036d8003f8 1ffff0007ffe2f70 0000000000000000 0000000000000000
> [  106.341040] 7b20: 000000000000001c ffff10007ffe2f58
> [  106.345921] [<ffff2000082a1340>] __enable_irq+0x168/0x1d8
> [  106.351323] [<ffff2000082a1458>] enable_irq+0xa8/0x118
> [  106.356467] [<ffff2000094c8950>] xgbe_one_poll+0x190/0x280
> [  106.361956] [<ffff200009c7a944>] net_rx_action+0x6ac/0xd88
> [  106.367444] [<ffff20000808266c>] __do_softirq+0x324/0xb70
> [  106.372845] [<ffff20000815908c>] irq_exit+0x1cc/0x338
> [  106.377900] [<ffff20000829acdc>] __handle_domain_irq+0xdc/0x230
> [  106.383821] [<ffff2000080820f4>] gic_handle_irq+0x6c/0xe0
> [  106.389220] Exception stack(0xffff20000a9c3d40 to 0xffff20000a9c3e70)
> [  106.395663] 3d40: ffff20000a9e27bc 0000000000000007 0000000000000000 1fffe4000153c4f7
> [  106.403495] 3d60: 0000000000000004 0000000000000000 0000000000000000 ffff20000d2d3000
> [  106.411327] 3d80: ffff20000a9e27c0 ffff040001538762 0000000000000000 0000000000000003
> [  106.419160] 3da0: ffff20000b803000 ffff20000ac45000 1ffff0007ffe4281 1fffe4000153c4f7
> [  106.426992] 3dc0: 0000000000000000 0000ffff7e2b5d90 ffff20000a9e27b8 ffff20000a9e2000
> [  106.434824] 3de0: ffff20000a9e2000 0000000000000000 ffff20000a9cfeb0 0000000000000003
> [  106.442656] 3e00: 00000000000000ff ffff20000a9cfe18 ffff20000a901058 0000000000000000
> [  106.450488] 3e20: 0000008004810018 ffff20000a9c3e70 ffff20000808a1d8 ffff20000a9c3e70
> [  106.458321] 3e40: ffff20000808a1dc 0000000060000145 0000000000000000 ffff20000a901058
> [  106.466150] 3e60: ffffffffffffffff ffff20000808a1d8
> [  106.471029] [<ffff200008083ff8>] el1_irq+0xb8/0x130
> [  106.475909] [<ffff20000808a1dc>] arch_cpu_idle+0x1c/0x28
> [  106.481225] [<ffff200009ffd27c>] default_idle_call+0x34/0x78
> [  106.486888] [<ffff20000824db0c>] do_idle+0x21c/0x3c0
> [  106.491856] [<ffff20000824e37c>] cpu_startup_entry+0x24/0x28
> [  106.497517] [<ffff200009fe9824>] rest_init+0x1ec/0x200
> [  106.502659] [<ffff20000a8117a0>] start_kernel+0x5d8/0x604
> [  106.508061] [<ffff20000a8101e8>] __primary_switched+0x6c/0x74
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ