lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 26 Aug 2016 12:02:13 +0530
From:   Abdul Haleem <abdhalee@...ux.vnet.ibm.com>
To:     linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org
Cc:     mpe@...erman.id.au, aneesh.kumar@...ux.vnet.ibm.com
Subject: Kernel Oops on 4.8.0-rc3 while running trinity tests

Hi,

Trinity tests failed on mainline4.8.0-rc3with the following error message:

Machine Type : PowerPC Bare Metal & also reproducible on PowerVM LPAR
config : attached

06:05:25 20:36:07 INFO | Test: running trinity tests
06:05:25 20:36:07 INFO | trinity
06:05:25 20:36:07 INFO | 	START	trinity	trinity	timestamp=1471912567	localtime=Aug 22 20:36:07	
06:06:19 Unable to handle kernel paging request for data at address 0xe475e1dc07000000
06:06:19 Faulting instruction address: 0xc0000000000553a0
06:06:19 Oops: Kernel access of bad area, sig: 11 [#1]
06:06:19 SMP NR_CPUS=32 NUMA PowerNV
06:06:19 Modules linked in: torture iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp tun bridge stp llc iptable_filter ip_tables x_tables binfmt_misc kvm_hv kvm leds_powernv led_class powernv_op_panel powernv_rng rng_core autofs4 btrfs xor raid6_pq [last unloaded: rcutorture]
06:06:19 CPU: 24 PID: 16309 Comm: trinity-main Not tainted 4.8.0-rc3-autotest #1
06:06:19 task: c0000007de330000 task.stack: c0000007d85dc000
06:06:19 NIP: c0000000000553a0 LR: c0000000002345a8 CTR: 0000000000000000
06:06:19 REGS: c0000007d85df640 TRAP: 0300   Not tainted  (4.8.0-rc3-autotest)
06:06:19 MSR: 9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE>  CR: 24002452  XER: 00000000
06:06:19 CFAR: c0000000000087d0 DAR: e475e1dc07000000 DSISR: 40000000 SOFTE: 1
06:06:19 GPR00: 0000000000000007 c0000007d85df8c0 c000000000f7ad00 c000000000000000
06:06:19 GPR04: 0000000000000000 0000000000000009 0000000007000000 0000000000000000
06:06:19 GPR08: e475e1dc07000000 0000000000000000 000000000000007f 0000000000000015
06:06:19 GPR12: 0000000000000000 c00000000fffe000 0000000000000000 0000000000001000
06:06:19 GPR16: 0000000000000001 0000000000000000 c0000007ddfa6798 00000000100341e0
06:06:19 GPR20: 00000000100341c8 c0000007dc336508 c000000000ff0df8 0000000000000000
06:06:19 GPR24: c1fffffffffff7ff 0000000000000000 c0000007d85dfa60 0000000001000000
06:06:19 GPR28: 0000000001000000 c0000007ddfa6400 c0000007ddfa6464 0000000000000007
06:06:19 NIP [c0000000000553a0] __find_linux_pte_or_hugepte+0x1c0/0x330
06:06:19 LR [c0000000002345a8] __unmap_hugepage_range+0x178/0x670
06:06:19 Call Trace:
06:06:19 [c0000007d85df980] [c000000000234ac0] __unmap_hugepage_range_final+0x20/0x50
06:06:19 [c0000007d85df9b0] [c00000000020a16c] unmap_single_vma+0xcc/0x120
06:06:19 [c0000007d85df9f0] [c00000000020a5c4] unmap_vmas+0x84/0x120
06:06:19 [c0000007d85dfa40] [c000000000212840] unmap_region+0xd0/0x1a0
06:06:19 [c0000007d85dfb30] [c000000000214acc] do_munmap+0x2dc/0x4a0
06:06:19 [c0000007d85dfba0] [c000000000216440] mmap_region+0x1c0/0x6e0
06:06:19 [c0000007d85dfc90] [c000000000216d3c] do_mmap+0x3dc/0x4c0
06:06:19 [c0000007d85dfd20] [c0000000001f0d04] vm_mmap_pgoff+0xc4/0x100
06:06:19 [c0000007d85dfd90] [c000000000214110] SyS_mmap_pgoff+0x100/0x2a0
06:06:19 [c0000007d85dfe10] [c000000000012424] sys_mmap+0x44/0x70
06:06:19 [c0000007d85dfe30] [c0000000000095e0] system_call+0x38/0x108
06:06:19 Instruction dump:
06:06:19 7d290030 79081764 3929ffff 3860ffff 7d2a07b4 7c895c36 7d494838 78630044
06:06:19 7908f5e6 79291f24 7d081b78 796b0020 <7d49402a> 7c694214 2eaa0000 f941ffd0
06:06:19 ---[ end trace 871b82883646cab5 ]---

Regard's
Abdul


View attachment "base_config" of type "text/plain" (173158 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ