lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <483A8607.6050905@linux.vnet.ibm.com>
Date:	Mon, 26 May 2008 15:12:31 +0530
From:	Kamalesh Babulal <kamalesh@...ux.vnet.ibm.com>
To:	Stephen Rothwell <sfr@...b.auug.org.au>
CC:	linux-next@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
	Ingo Molnar <mingo@...e.hu>, Andy Whitcroft <apw@...dowen.org>
Subject: [BUG] linux-next: Tree for May 26 - kernel oops at __alloc_pages_internal
 ()

Hi,

While booting up the next-20080526 kernel on the x86_64 machines, the
kernel panics. The config file of the kernel has been attached


BUG: unable to handle kernel paging request at 0000000000003708
IP: [<ffffffff802663d5>] __alloc_pages_internal+0xc0/0x3d3
PGD 0 
Oops: 0000 [1] SMP 
last sysfs file: 
CPU 0 
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.26-rc3-next-20080526-autotest #1
RIP: 0010:[<ffffffff802663d5>]  [<ffffffff802663d5>] __alloc_pages_internal+0xc0/0x3d3
RSP: 0000:ffff81003f9e1c00  EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000012d0 RCX: 0000000000000000
RDX: 0000000000003700 RSI: 00000000000005c4 RDI: ffffffff805af487
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000018
R10: 0000000000000002 R11: ffffffff8034fd8e R12: 0000000000003700
R13: 0000000000000000 R14: ffff81003f9d8000 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffffffff80690e80(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 0000000000003708 CR3: 0000000000201000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 1, threadinfo ffff81003f9e0000, task ffff81003f9d8000)
Stack:  0000000000000000 0000000000000000 ffff81000103b000 0000000200000010
 0000000000000000 0000000000000000 00000000ffffffff ffffffff803931b7
 ffff81000103b000 ffff8100010117a0 0000000000000001 00000000000000d0
Call Trace:
 [<ffffffff803931b7>] notify_update+0x2b/0x30
 [<ffffffff8028522f>] new_slab+0x91/0x268
 [<ffffffff8028561c>] __slab_alloc+0x1d5/0x3c1
 [<ffffffff8022a9ed>] __build_sched_domains+0x6cf/0xa32
 [<ffffffff8022a1ad>] sched_domain_node_span+0xc9/0xf3
 [<ffffffff80285b0e>] kmem_cache_alloc_node+0x3e/0x73
 [<ffffffff8022a9ed>] __build_sched_domains+0x6cf/0xa32
 [<ffffffff806b2974>] setup_ioapic_dest+0x30/0xd7
 [<ffffffff8022b1a8>] arch_init_sched_domains+0x69/0x76
 [<ffffffff806b6bdd>] sched_init_smp+0x4f/0x123
 [<ffffffff806a48cc>] kernel_init+0xf6/0x28f
 [<ffffffff804f2689>] _spin_unlock_irq+0x9/0xc
 [<ffffffff8022c15e>] finish_task_switch+0x38/0x9e
 [<ffffffff8020cb18>] child_rip+0xa/0x12
 [<ffffffff806a47d6>] kernel_init+0x0/0x28f
 [<ffffffff8020cb0e>] child_rip+0x0/0x12


Code: 25 00 00 00 00 83 7c 24 18 00 74 16 be c4 05 00 00 48 c7 c7 87 f4 5a 80 e8 3b 0d fc ff e8 39 ac 28 00 48 c7 44 24 28 00 00 00 00 <49> 83 7c 24 08 00 74 90 89 d9 44 8b 44 24 1c 48 8b 74 24 08 81 
RIP  [<ffffffff802663d5>] __alloc_pages_internal+0xc0/0x3d3
 RSP <ffff81003f9e1c00>
CR2: 0000000000003708
---[ end trace 4eaa2a86a8e2da22 ]---
Kernel panic - not syncing: Attempted to kill init!
Pid: 1, comm: swapper Tainted: G      D   2.6.26-rc3-next-20080526-autotest #1

Call Trace:
 [<ffffffff8023049f>] panic+0x86/0x144
 [<ffffffff8023104f>] printk+0x4e/0x56
 [<ffffffff802333b8>] do_exit+0x71/0x67c
 [<ffffffff804f2ba1>] oops_begin+0x0/0x8c
 [<ffffffff804f4a98>] do_page_fault+0x75f/0x818
 [<ffffffff80397312>] vt_console_print+0x26f/0x293
 [<ffffffff804f27e9>] error_exit+0x0/0x51
 [<ffffffff8034fd8e>] vgacon_cursor+0x0/0x1a4
 [<ffffffff802663d5>] __alloc_pages_internal+0xc0/0x3d3
 [<ffffffff803931b7>] notify_update+0x2b/0x30
 [<ffffffff8028522f>] new_slab+0x91/0x268
 [<ffffffff8028561c>] __slab_alloc+0x1d5/0x3c1
 [<ffffffff8022a9ed>] __build_sched_domains+0x6cf/0xa32
 [<ffffffff8022a1ad>] sched_domain_node_span+0xc9/0xf3
 [<ffffffff80285b0e>] kmem_cache_alloc_node+0x3e/0x73
 [<ffffffff8022a9ed>] __build_sched_domains+0x6cf/0xa32
 [<ffffffff806b2974>] setup_ioapic_dest+0x30/0xd7
 [<ffffffff8022b1a8>] arch_init_sched_domains+0x69/0x76
 [<ffffffff806b6bdd>] sched_init_smp+0x4f/0x123
 [<ffffffff806a48cc>] kernel_init+0xf6/0x28f
 [<ffffffff804f2689>] _spin_unlock_irq+0x9/0xc
 [<ffffffff8022c15e>] finish_task_switch+0x38/0x9e
 [<ffffffff8020cb18>] child_rip+0xa/0x12
 [<ffffffff806a47d6>] kernel_init+0x0/0x28f
 [<ffffffff8020cb0e>] child_rip+0x0/0x12

-- 
Thanks & Regards,
Kamalesh Babulal,
Linux Technology Center,
IBM, ISTL.

View attachment "config-x86-64-next20050526" of type "text/plain" (74904 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ