lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 1 Sep 2009 00:12:24 +0300
From:	Sergey Senozhatsky <sergey.senozhatsky@...il.com>
To:	Lin Ming <ming.m.lin@...el.com>
Cc:	"Brown, Len" <len.brown@...el.com>,
	"Moore, Robert" <robert.moore@...el.com>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: acpi_ex_system_memory_space_handler oops

On (08/27/09 16:44), Lin Ming wrote:
> On Thu, 2009-08-27 at 16:29 +0800, Sergey Senozhatsky wrote:
> > On (08/27/09 15:59), Lin Ming wrote:
> > > > rc7-git5 (patched)
> > > > 
> > > > [    0.178628] ACPI: EC: Look up EC in DSDT
> > > > [    0.196480] ACPI: Interpreter enabled
> > > > [    0.196575] ACPI: (supports S0 S1 S3 S4 S5)
> > > > [    0.197184] ACPI: Using IOAPIC for interrupt routing
> > > > [    0.197352] PCI: MCFG configuration 0: base e0000000 segment 0 buses 0 - 255
> > > > [    0.203511] ACPI Error (dswload-0790): [PCFG] Namespace lookup failure, AE_ALREADY_EXISTS
> > > > [    0.203738] ACPI Exception: AE_ALREADY_EXISTS, During name lookup/catalog 20090521 psloop-227
> > > > [    0.203964] ACPI Error (psparse-0537): Method parse/execution failed [\_SB_.RBPE] (Node f7017678), AE_ALREADY_EXISTS
> > > > [    0.204256] ACPI: Marking method RBPE as Serialized because of AE_ALREADY_EXISTS error
> > > > [    0.204510] ACPI Error (psparse-0537): Method parse/execution failed [\_GPE._L01] (Node f701d198), AE_ALREADY_EXISTS
> > > > [    0.204803] ACPI: Marking method _L01 as Serialized because of AE_ALREADY_EXISTS error
> > > > [    0.205063] ACPI Exception: AE_ALREADY_EXISTS, while evaluating GPE method [_L01] 20090521 evgpe-568
> > > 
> 
> So the patch only fixes the oops, 
> we also need to fix the AE_ALREADY_EXISTS error.
> 
> AE_ALREADY_EXISTS fix not confirmed.
I'm afraid there was my mistake. No luck in reproducing this with patched kernel.

I've updated BIOS (305 -> 307, ASUS F3Jc) - unpatched kernel (rc8, rc7) oopses.

Made some changes to acpi_ex_system_memory_space_handler:

	static int prev_ebx = 0;
	struct pt_regs *regs = task_pt_regs(current);
	[..]
	if (prev_ebx != regs->bx) {
		printk("EAX: %08lx EBX: %08lx ECX: %08lx EDX: %08lx\n",
			   regs->ax, regs->bx, regs->cx, regs->dx);
		prev_ebx = regs->bx;
	}

Kernel oopses at acpi_ex_system_memory_space_handler+0x75, which is
mov    0x8(%ebx),%edx  /* 0x8(%ebx) == mem_info->mapped_physical_address */

2 normal boots:
[    0.179720] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.203556] EAX: f7231fc8 EBX: f7231fe0 ECX: c1062064 EDX: 00000000
[    0.204522] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.204727] EAX: f7231fc8 EBX: f7231fe0 ECX: c1062064 EDX: 00000000
[    0.205402] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.207394] EAX: f7231fc8 EBX: f7231fe0 ECX: c1062064 EDX: 00000000
[    0.207742] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.223926] EAX: 00000002 EBX: c160368c ECX: c15adae0 EDX: 00000002
[    0.313569] EAX: 00000002 EBX: c1603720 ECX: c15adae0 EDX: 00000002
[    0.538362] EAX: 00000002 EBX: c160395c ECX: c15adae0 EDX: 00000002
[    0.539345] EAX: 00000002 EBX: c1603960 ECX: c15adae0 EDX: 00000002
[    0.551478] EAX: 00000002 EBX: c1603968 ECX: c15adae0 EDX: 00000002
[    0.553474] EAX: 00000002 EBX: c160396c ECX: c15adae0 EDX: 00000002
[    0.559407] EAX: 00000002 EBX: c1603970 ECX: c15adae0 EDX: 00000002
[    0.562432] EAX: 00000002 EBX: c1603974 ECX: c15adae0 EDX: 00000002
[    0.567686] EAX: f68fffc8 EBX: f68fffe0 ECX: c1062064 EDX: 00000000
[    0.929685] EAX: 00000002 EBX: c160399c ECX: c15adae0 EDX: 00000002
[    0.943102] EAX: f68fffc8 EBX: f68fffe0 ECX: c1062064 EDX: 00000000
[    1.119718] EAX: f707bfc8 EBX: f707bfe0 ECX: c1062064 EDX: 00000000
[    4.247438] EAX: 00000004 EBX: 00000003 ECX: 08061916 EDX: 00000003
[    4.624659] EAX: 00000080 EBX: b7fe3000 ECX: 00007111 EDX: 08d26e88
[    9.422412] EAX: 00000003 EBX: 00000003 ECX: b7f4e000 EDX: 00001000
[   15.780002] EAX: 00000003 EBX: 00000007 ECX: b803a000 EDX: 00001000
[   30.282635] EAX: 00000003 EBX: 00000004 ECX: b7313000 EDX: 00001000
[   31.760373] EAX: 00000003 EBX: 00000005 ECX: b8081000 EDX: 00001000
[   46.478595] EAX: 00000003 EBX: 00000011 ECX: b8085000 EDX: 00001000
[   60.287018] EAX: 00000003 EBX: 00000004 ECX: b7313000 EDX: 00001000
[   76.503652] EAX: 00000003 EBX: 00000011 ECX: b8085000 EDX: 00001000
[   95.286847] EAX: 00000003 EBX: 00000004 ECX: b7313000 EDX: 00001000
[  103.537367] EAX: 00000003 EBX: 00000005 ECX: b8081000 EDX: 00001000
[  106.503656] EAX: 00000003 EBX: 00000011 ECX: b8085000 EDX: 00001000

***
[    0.177114] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.200169] EAX: f7213fc8 EBX: f7213fe0 ECX: c1062064 EDX: 00000000
[    0.200854] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.200998] EAX: f7213fc8 EBX: f7213fe0 ECX: c1062064 EDX: 00000000
[    0.201331] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.202367] EAX: f7213fc8 EBX: f7213fe0 ECX: c1062064 EDX: 00000000
[    0.202569] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.204209] EAX: f7213fc8 EBX: f7213fe0 ECX: c1062064 EDX: 00000000
[    0.204452] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.206921] EAX: f7213fc8 EBX: f7213fe0 ECX: c1062064 EDX: 00000000
[    0.207834] EAX: 00000002 EBX: c1603684 ECX: c15adae0 EDX: 00000002
[    0.220475] EAX: 00000002 EBX: c160368c ECX: c15adae0 EDX: 00000002
[    0.319953] EAX: 00000002 EBX: c1603720 ECX: c15adae0 EDX: 00000002
[    0.540786] EAX: 00000002 EBX: c160395c ECX: c15adae0 EDX: 00000002
[    0.541769] EAX: 00000002 EBX: c1603960 ECX: c15adae0 EDX: 00000002
[    0.550439] EAX: 00000002 EBX: c1603968 ECX: c15adae0 EDX: 00000002
[    0.552394] EAX: 00000002 EBX: c160396c ECX: c15adae0 EDX: 00000002
[    0.560133] EAX: 00000002 EBX: c1603970 ECX: c15adae0 EDX: 00000002
[    0.563108] EAX: 00000002 EBX: c1603974 ECX: c15adae0 EDX: 00000002
[    0.568408] EAX: f697bfc8 EBX: f697bfe0 ECX: c1062064 EDX: 00000000
[    0.926336] EAX: f707ffc8 EBX: f707ffe0 ECX: c1062064 EDX: 00000000
[    0.932752] EAX: 00000002 EBX: c160399c ECX: c15adae0 EDX: 00000002
[    0.932974] EAX: f697bfc8 EBX: f697bfe0 ECX: c1062064 EDX: 00000000
[    4.094675] EAX: 00000004 EBX: 00000003 ECX: 08061916 EDX: 00000003
[    4.604710] EAX: 00000080 EBX: b80c2000 ECX: 00007111 EDX: 08cdae88
[    9.325215] EAX: 00000003 EBX: 00000003 ECX: b7f30000 EDX: 00001000
[   15.744843] EAX: 00000003 EBX: 00000007 ECX: b8003000 EDX: 00001000
[   30.818662] EAX: 00000003 EBX: 00000004 ECX: b7490000 EDX: 00001000
[   38.545531] EAX: 00000003 EBX: 00000005 ECX: b7edb000 EDX: 00001000


I also have changed show_registers(struct pt_regs *regs) to __show_regs(regs, 0); after the stack trace.
Here are 2 oopses (they are similar):
Kacpid not tainted
EIP: 0060: [<c12a30ce>] 	EFLAGS: 00010246 	CPU: 0
EIP is at acpi_ex_system_memory_space_handler+0x75/0x22f
EAX: 00000001	EBX: 00000020	ECX: 00000008	EDX: 00000000
ESI: f7213dec	EDI: 0000008	EBP: f7213d10	ESP: f7213cdc
DS: 007b	ES: 007b	FS: 00d8	GS: 00e0	SS: 0068

***
EAX: 00000001   EBX: 00000020   ECX: 00000008   EDX: 00000000
ESI: f7213dec   EDI: 0000008    EBP: f7213d10   ESP: f7213cdc
DS: 007b        ES: 007b        FS: 00d8        GS: 00e0        SS: 0068


Note EBX: 00000020 in both cases.
(happend around 0.21 min when 'usually' EBX: c1603684/f7213fe0).


	Sergey
Download attachment "signature.asc" of type "application/pgp-signature" (316 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ