lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 11 Jun 2008 23:26:47 +0530
From:	Kamalesh Babulal <kamalesh@...ux.vnet.ibm.com>
To:	Andrew Morton <akpm@...ux-foundation.org>
CC:	linux-kernel@...r.kernel.org, kernel-testers@...r.kernel.org,
	linux-mm@...ck.org, Andy Whitcroft <apw@...dowen.org>,
	Balbir Singh <balbir@...ux.vnet.ibm.com>
Subject: [BUG] 2.6.26-rc5-mm2 - kernel BUG at arch/x86/kernel/setup.c:388!

Hi Andrew,

The 2.6.26-rc5-mm2 kernel panic's, while booting up on the x86_64
box with the attached .config file.

kernel BUG at arch/x86/kernel/setup.c:388!
invalid opcode: 0000 [1] SMP DEBUG_PAGEALLOC
last sysfs file: 
CPU 0 
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.26-rc5-mm2-autokern1 #1
RIP: 0010:[<ffffffff80210492>]  [<ffffffff80210492>] _node_to_cpumask_ptr+0x54/0x6a
RSP: 0000:ffff8100bf683d30  EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000000000040
RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff806907c0
RBP: ffff8100bf683d40 R08: 0000000000000000 R09: ffff8100bf683c90
R10: ffffffff806a30e0 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000001 R14: 0000000000000000 R15: ffff81000104da58
FS:  0000000000000000(0000) GS:ffffffff8073fac0(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000000201000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 1, threadinfo ffff8100bf682000, task ffff8100bf688000)
Stack:  ffff8100bf683c90 0000000000000001 ffff8100bf683da0 ffffffff8022ee0a
 00000000ffffffff 7fffffff00000001 0000000000000001 0000000000000000
 0000000000000000 ffff81000104da58 ffff81000104da40 ffff8100bf64e030
Call Trace:
 [<ffffffff8022ee0a>] sched_domain_node_span+0x56/0xcb
 [<ffffffff8022f199>] __build_sched_domains+0x1aa/0x64d
 [<ffffffff8025730b>] mark_held_locks+0x4a/0x6a
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff803c1934>] do_check_likely+0x9/0x65
 [<ffffffff802a0d20>] kmem_cache_alloc+0xb6/0xd6
 [<ffffffff8022face>] arch_init_sched_domains+0x63/0x71
 [<ffffffff80763694>] sched_init_smp+0x60/0x119
 [<ffffffff80750999>] kernel_init+0xf9/0x2bf
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff80526b17>] trace_hardirqs_on_thunk+0x3a/0x3f
 [<ffffffff80257582>] trace_hardirqs_on_caller+0x18d/0x1b8
 [<ffffffff8020c458>] child_rip+0xa/0x12
 [<ffffffff8020bb6f>] restore_args+0x0/0x30
 [<ffffffff8024e630>] up+0x14/0x52
 [<ffffffff807508a0>] kernel_init+0x0/0x2bf
 [<ffffffff8020c44e>] child_rip+0x0/0x12


Code: 00 e8 16 d6 ff ff 48 c7 c0 d8 fc 73 80 eb 2e 31 f6 3b 3d a2 26 53 00 48 c7 c7 c0 07 69 80 40 0f 9d c6 e8 9d 14 1b 00 85 c0 74 04 <0f> 0b eb fe 48 63 c3 48 c1 e0 03 48 03 05 a4 76 60 00 5e 5b c9 
RIP  [<ffffffff80210492>] _node_to_cpumask_ptr+0x54/0x6a
 RSP <ffff8100bf683d30>
---[ end trace 4eaa2a86a8e2da22 ]---
Kernel panic - not syncing: Attempted to kill init!
Pid: 1, comm: swapper Tainted: G      D   2.6.26-rc5-mm2-autokern1 #1

Call Trace:
 [<ffffffff8023655c>] panic+0xa5/0x163
 [<ffffffff8024e630>] up+0x14/0x52
 [<ffffffff8024e630>] up+0x14/0x52
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff80239536>] do_exit+0xc8/0x8b9
 [<ffffffff80402f4c>] get_random_bytes+0x20/0x22
 [<ffffffff8020c8de>] oops_begin+0x0/0x9b
 [<ffffffff8020d488>] die+0x62/0x6b
 [<ffffffff8020d616>] do_trap+0x115/0x124
 [<ffffffff8020e344>] do_invalid_op+0xae/0xb7
 [<ffffffff80210492>] _node_to_cpumask_ptr+0x54/0x6a
 [<ffffffff8025e9bd>] __module_text_address+0x9/0x72
 [<ffffffff802487f0>] __kernel_text_address+0x27/0x35
 [<ffffffff8020ccba>] dump_trace+0x2fb/0x349
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff805276fd>] error_exit+0x0/0xa9
 [<ffffffff80210492>] _node_to_cpumask_ptr+0x54/0x6a
 [<ffffffff8022ee0a>] sched_domain_node_span+0x56/0xcb
 [<ffffffff8022f199>] __build_sched_domains+0x1aa/0x64d
 [<ffffffff8025730b>] mark_held_locks+0x4a/0x6a
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff803c1934>] do_check_likely+0x9/0x65
 [<ffffffff802a0d20>] kmem_cache_alloc+0xb6/0xd6
 [<ffffffff8022face>] arch_init_sched_domains+0x63/0x71
 [<ffffffff80763694>] sched_init_smp+0x60/0x119
 [<ffffffff80750999>] kernel_init+0xf9/0x2bf
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff8020b360>] mcount_call+0x5/0x35
 [<ffffffff80526b17>] trace_hardirqs_on_thunk+0x3a/0x3f
 [<ffffffff80257582>] trace_hardirqs_on_caller+0x18d/0x1b8
 [<ffffffff8020c458>] child_rip+0xa/0x12
 [<ffffffff8020bb6f>] restore_args+0x0/0x30
 [<ffffffff8024e630>] up+0x14/0x52
 [<ffffffff807508a0>] kernel_init+0x0/0x2bf
 [<ffffffff8020c44e>] child_rip+0x0/0x12


-- 
Thanks & Regards,
Kamalesh Babulal,
Linux Technology Center,
IBM, ISTL.

View attachment "config-2.6.26-rc5-mm2-x86-64" of type "text/plain" (34552 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ