lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 19 Nov 2009 14:20:28 +0100
From:	Blaschka <frank.blaschka@...ibm.com>
To:	netdev@...r.kernel.org, linux-s390@...r.kernel.org
Subject: Oops in Unix sockets code


Hi,

running disk tests on s390x (kernel 2.6.31) we get following Oops in Unix domain
socket code (hald process). Can somebody help? We do get this Oops from time to
time so we are willing to test a patch or provide additional debug data if
required.

Thanks,
  Frank

    <1>Unable to handle kernel pointer dereference at virtual kernel address 000000007575e000
    <4>Oops: 0011 [#1] PREEMPT SMP DEBUG_PAGEALLOC
    <4>Modules linked in: sunrpc qeth_l3 dm_multipath dm_mod qeth ccwgroup chsc_sch
    <4>CPU: 0 Not tainted 2.6.31-39.x.20091102-s390xdefault #1
    <4>Process hald (pid: 2117, task: 000000007d200c40, ksp: 000000007ab33880)
    <4>Krnl PSW : 0704100180000000 00000000003a15f8 (_raw_read_trylock+0x0/0x28)
    <4>           R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:0 CC:1 PM:0 EA:3
    <4>Krnl GPRS: 16c8a00000000000 000000007d200c40 000000007575ed18 0000000000000003
    <4>           00000000005853d2 000000007d201470 0000000000000002 000000007ab33c30
    <4>           0000000075746c78 000000007a74da48 000000000051a16a 000000007575ed18
    <4>           000000007575ed30 00000000005da190 00000000005853dc 000000007ab338c8
    <4>Krnl Code: 00000000003a15e8: c03000185811        larl    %r3,6ac60a
    <4>           00000000003a15ee: c0e5fffffdd9        brasl   %r14,3a11a0
    <4>           00000000003a15f4: a7f4ffce            brc     15,3a1590
    <4>          >00000000003a15f8: 58302000            l       %r3,0(%r2)
    <4>           00000000003a15fc: b9170033            llgtr   %r3,%r3
    <4>           00000000003a1600: 1853                lr      %r5,%r3
    <4>           00000000003a1602: 1813                lr      %r1,%r3
    <4>           00000000003a1604: a75a0001            ahi     %r5,1
    <4>Call Trace:
    <4>([<00000000005853d2>] _read_lock+0x5a/0x98)
    <4> [<000000000051a16a>] unix_write_space+0x36/0xb0
    <4> [<00000000004788a8>] sock_wfree+0x80/0x84
    <4> [<000000000047dc08>] skb_release_head_state+0x88/0x140
    <4> [<000000000047d7ec>] __kfree_skb+0x28/0x10c
    <4> [<0000000000481d7e>] skb_free_datagram+0x32/0x6c
    <4> [<0000000000517a46>] unix_dgram_recvmsg+0x246/0x38c
    <4> [<0000000000474036>] sock_recvmsg+0xe2/0x118
    <4> [<00000000004754f8>] SyS_recvmsg+0x134/0x310
    <4> [<0000000000472f14>] SyS_socketcall+0xfc/0x31c
    <4> [<0000000000117f9e>] sysc_noemu+0x10/0x16
    <4> [<0000004f131a95ae>] 0x4f131a95ae
    <4>INFO: lockdep is turned off.
    <4>Last Breaking-Event-Address:
    <4> [<00000000005853d6>] _read_lock+0x5e/0x98
    <4>
    <0>Kernel panic - not syncing: Fatal exception: panic_on_oops
    <4>CPU: 0 Tainted: G      D    2.6.31-39.x.20091102-s390xdefault #1
    <4>Process hald (pid: 2117, task: 000000007d200c40, ksp: 000000007ab33880)
    <4>0000000000000000 000000007ab33588 0000000000000002 0000000000000000
    <4>       000000007ab33628 000000007ab335a0 000000007ab335a0 00000000005801b8
    <4>       0000000000000001 0000000000000000 000000007ab33c30 0000000000000000
    <4>       000000000000000d 0000000000000000 000000007ab335f8 000000000000000e
    <4>       000000000058fc18 0000000000105700 000000007ab33588 000000007ab335d0
    <4>Call Trace:
    <4>([<00000000001055fc>] show_trace+0xf0/0x148)
    <4> [<0000000000580022>] panic+0xa2/0x1e4
    <4> [<0000000000105bf8>] die+0x14c/0x168
    <4> [<00000000001012d8>] do_no_context+0xa8/0xe8
    <4> [<000000000058597c>] do_dat_exception+0x134/0x338
    <4> [<0000000000117fa4>] sysc_return+0x0/0x8
    <4> [<00000000003a15f8>] _raw_read_trylock+0x0/0x28
    <4>([<00000000005853d2>] _read_lock+0x5a/0x98)
    <4> [<000000000051a16a>] unix_write_space+0x36/0xb0
    <4> [<00000000004788a8>] sock_wfree+0x80/0x84
    <4> [<000000000047dc08>] skb_release_head_state+0x88/0x140
    <4> [<000000000047d7ec>] __kfree_skb+0x28/0x10c
    <4> [<0000000000481d7e>] skb_free_datagram+0x32/0x6c
    <4> [<0000000000517a46>] unix_dgram_recvmsg+0x246/0x38c
    <4> [<0000000000474036>] sock_recvmsg+0xe2/0x118
    <4> [<00000000004754f8>] SyS_recvmsg+0x134/0x310
    <4> [<0000000000472f14>] SyS_socketcall+0xfc/0x31c
    <4> [<0000000000117f9e>] sysc_noemu+0x10/0x16
    <4> [<0000004f131a95ae>] 0x4f131a95ae
    <4>INFO: lockdep is turned off.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ