lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 12 May 2008 14:19:32 +0200
From:	"Vegard Nossum" <vegard.nossum@...il.com>
To:	"Gianni Tedesco" <gxt@...nott.ac.uk>
Cc:	oprofile-list@...ts.sf.net, linux-kernel@...r.kernel.org,
	"Mike Travis" <travis@....com>
Subject: Re: oprofile BUG() in current kernel.

Hi,

On Mon, May 12, 2008 at 2:02 PM, Gianni Tedesco <gxt@...nott.ac.uk> wrote:
> This is from Linus' git tree, pulled this morning. To reproduce simply
>  opcontrol --start
>
>  oprofile: using NMI interrupt.
>  BUG: unable to handle kernel paging request at eff86d58
>  IP: [<eeb9d508>] :oprofile:alloc_cpu_buffers+0x42/0xd6
>  *pde = 00000000
>  Oops: 0002 [#1] SMP
>  Modules linked in: oprofile af_packet i915 drm binfmt_misc kvm_intel kvm cpufreq_powersave cpufreq_stats cpufreq_userspace cpufreq_ondemand cpufreq_conservative sbs fan sbshc iptable_filter ip_tables x_tables ipcomp authenc esp4 aead ah4 xfrm4_mode_transport deflate zlib_deflate zlib_inflate ctr twofish twofish_common camellia serpent blowfish des_generic cbc aes_i586 aes_generic xcbc sha256_generic sha1_generic md5 hmac crypto_hash crypto_null af_key sierra usbserial snd_usb_audio snd_usb_lib snd_hwdep fuse arc4 ecb crypto_blkcipher cryptomgr crypto_algapi snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq yenta_socket iwl3945 mac80211 rsrc_nonstatic ehci_hcd snd_timer snd_seq_device uhci_hcd cfg80211 snd pcmcia_core usbcore soundcore snd_page_alloc battery ac thinkpad_acpi backlight button led_class thermal evdev nvram
>
>  Pid: 4589, comm: oprofiled Not tainted (2.6.26-rc2 #37)
>  EIP: 0060:[<eeb9d508>] EFLAGS: 00010286 CPU: 1
>  EIP is at alloc_cpu_buffers+0x42/0xd6 [oprofile]
>  EAX: eeba5000 EBX: eff86d40 ECX: eeb9d506 EDX: 00000000
>  ESI: 00000000 EDI: eeba2d40 EBP: 00002000 ESP: e6824e94
>   DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
>  Process oprofiled (pid: 4589, ti=e6824000 task=ed109560 task.ti=e6824000)
>  Stack: 00010000 ffffffea d04eaec0 e6824f14 eeb9dcc5 eeb9d114 ffffffea d04eaec0
>        eeb9dcfe d04eaec0 d0d7fcf4 b0158a50 ec9379c0 d0ddbc6c e6824f14 d04eaec0
>        e6824f14 00000001 b0158b55 d04eaec0 00000000 00000000 e6824f14 b01628fd
>  Call Trace:
>   [<eeb9dcc5>] event_buffer_open+0x0/0x55 [oprofile]
>   [<eeb9d114>] oprofile_setup+0x11/0x85 [oprofile]
>   [<eeb9dcfe>] event_buffer_open+0x39/0x55 [oprofile]
>   [<b0158a50>] __dentry_open+0xfd/0x1e6
>   [<b0158b55>] nameidata_to_filp+0x1c/0x2c
>   [<b01628fd>] do_filp_open+0x31c/0x676
>   [<b014a4cc>] handle_mm_fault+0x1c6/0x48d
>   [<b0158875>] do_sys_open+0x3d/0xb5
>   [<b0111723>] do_page_fault+0x206/0x523
>   [<b0158931>] sys_open+0x1e/0x23
>   [<b0102a79>] sysenter_past_esp+0x6a/0x91
>   [<b02e0000>] lock_kernel+0x2f/0x31
>   =======================
>  Code: e8 db 77 63 c1 89 c6 8d 04 ed 00 00 00 00 89 04 24 e9 8b 00 00 00 8b 04 24 31 d2 89 fb 03 1c b5 80 de 39 b0 e8 9d 28 5b c1 85 c0 <89> 43 18 74 7e 8d 43 34 c7 43 04 00 00 00 00 89 73 2c 89 43 34
>  EIP: [<eeb9d508>] alloc_cpu_buffers+0x42/0xd6 [oprofile] SS:ESP
>  0068:e6824e94
>  ---[ end trace dda7923c8b798701 ]---

This looks similar to:

http://www.uwsg.iu.edu/hypermail/linux/kernel/0805.0/2845.html

Does reverting 608dfddd845da5ab6accef70154c8910529699f7 fix it for you too?

Vegard

-- 
"The animistic metaphor of the bug that maliciously sneaked in while
the programmer was not looking is intellectually dishonest as it
disguises that the error is the programmer's own creation."
	-- E. W. Dijkstra, EWD1036
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ