lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 31 Aug 2008 16:01:23 -0700 From: Jeremy Fitzhardinge <jeremy@...p.org> To: Alex Nixon <alex.nixon@...rix.com> CC: Bernhard Schmidt <berni@...kenwald.de>, linux-kernel@...r.kernel.org Subject: Re: 2.6.27-rc xen pvops regression? Alex Nixon wrote: > Bernhard Schmidt wrote: >> Hello, >> >> I've been a happy user of vanilla 2.6.26 with pvops in my Xen domU for >> a couple of months. I wanted to test 2.6.27-rc (-rc3 a couple of weeks >> ago, -rc5 just now) to verify another issue and ran into the following >> error >> > Thanks Bernhard - I'm able to reproduce it with your config. Is this the crash with the UP config? > I've had a look, and it seems the register_vcpu_info hypercall is > being made twice, failing on the second time. In fact, > paravirt_pagetable_setup_{start,done} are both being called twice - > once from arch/x86/kernel/setup.c, and then again from > arch/x86/mm/init_32.c Hm, yes. Looks like a unifcation side-effect, though I thought I'd run a 32-bit kernel recently enough to notice this. Anyway, I think the init_32.c calls should be redundant. > I suspect one of them should go, but I'm not familiar enough with this > code to suggest which one. > > But still with that crudely resolved, the kernel BUGs (see below). > Jeremy - any ideas? > > - Alex > > > `xm dmesg': > > (XEN) mm.c:2249:d168 Mfn 24384 not pinned Bit hard to know what this means without knowing what mfn 24384 is. J > > dmesg: > > EXT3-fs: mounted filesystem with ordered data mode. > VFS: Mounted root (ext3 filesystem) readonly. > Freeing unused kernel memory: 160k freed > ------------[ cut here ]------------ > kernel BUG at > /local/scratch/hotplug.linux.trees.git/arch/x86/xen/enlighten.c:850! > invalid opcode: 0000 [#1] > > Pid: 1, comm: init Tainted: G W > (2.6.27-rc5-tip-00672-ge5c5407-dirty #52) > EIP: 0061:[<c0102b04>] EFLAGS: 00010282 CPU: 0 > EIP is at pin_pagetable_pfn+0x3f/0x4b > EAX: ffffffea EBX: e242dd74 ECX: 00000001 EDX: 00000000 > ESI: 00007ff0 EDI: 00000000 EBP: e242dd8c ESP: e242dd74 > DS: 007b ES: 007b FS: 0000 GS: 0000 SS: e021 > Process init (pid: 1, ti=e242c000 task=e242a000 task.ti=e242c000) > Stack: 00000004 00024384 00000000 c144e8e0 00022747 00000000 e242dd9c > c0102ee8 > c02fe5d4 c144e8e0 e242dda4 c0102f23 e242ddbc c0116722 00000000 > 00000000 > 00000000 00000000 e242de2c c01467a8 00000000 c1000000 00000000 > 22747067 > Call Trace: > [<c0102ee8>] ? xen_release_ptpage+0x52/0x71 > [<c0102f23>] ? xen_release_pte+0xd/0xf > [<c0116722>] ? __pte_free_tlb+0x35/0x4b > [<c01467a8>] ? free_pgd_range+0x377/0x38c > [<c015a4bf>] ? setup_arg_pages+0x1b8/0x22b > [<c017a80f>] ? load_elf_binary+0x3f1/0x10a4 > [<c0104ffa>] ? check_events+0x8/0xe > [<c0104f71>] ? xen_restore_fl_direct_end+0x0/0x3 > [<c0104937>] ? xen_force_evtchn_callback+0xf/0x14 > [<c0104f71>] ? xen_restore_fl_direct_end+0x0/0x3 > [<c014298a>] ? page_address+0x85/0xa2 > [<c0159c51>] ? put_arg_page+0x8/0xa > [<c0159e27>] ? copy_strings+0x156/0x160 > [<c0159ea8>] ? search_binary_handler+0x42/0x10a > [<c015ad64>] ? do_execve+0x129/0x192 > [<c0105354>] ? sys_execve+0x29/0x50 > [<c0106b1e>] ? syscall_call+0x7/0xb > [<c0109b2f>] ? kernel_execve+0x17/0x1c > [<c0102140>] ? run_init_process+0x17/0x19 > [<c01021e3>] ? init_post+0xa1/0xf2 > [<c01077df>] ? kernel_thread_helper+0x7/0x10 > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists