lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1229622223.3374.9.camel@localhost.localdomain>
Date:	Thu, 18 Dec 2008 12:43:43 -0500
From:	Eric Paris <eparis@...hat.com>
To:	linux-kernel@...r.kernel.org
Subject: kernel BUG at arch/x86/mm/ioremap.c:39 from
 2.6.28-rc8-next-20081218 on x86_64 vmware guest

I also saw this yesterday with 2.6.28-rc8-next-20081217 (which
incidentally was the first time I tried to boot a linux-next kernel so
that's pretty useless information).  This is a guest on an x86_64 vmware
server virtual machine.  This is very early in the boot cycle the last
thing before the bug was messages about serial 8250 initialization.  I
will attach the full dmesg and config.  I'm going to start poking
around, but I'm hoping someone will know it or will give me an idea
where to poke.  I took my working config from 2.6.28-rc8 and just
answered questions for linux next including turning on some of the debug
options but typically taking the defaults.

[    2.489258] ------------[ cut here ]------------
[    2.490031] kernel BUG at arch/x86/mm/ioremap.c:39!
[    2.490031] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[    2.490031] last sysfs file: 
[    2.490031] CPU 1 
[    2.490031] Modules linked in:
[    2.490031] Pid: 1, comm: swapper Not tainted 2.6.28-rc8-next-20081218 #160
[    2.490031] RIP: 0010:[<ffffffff8103488e>]  [<ffffffff8103488e>] __phys_addr+0x7e/0xe2
[    2.490031] RSP: 0018:ffff880017609800  EFLAGS: 00010202
[    2.490031] RAX: ffff87ffffffffff RBX: 0000000000000001 RCX: 0000000000000003
[    2.490031] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8164ac30
[    2.490031] RBP: ffff880017609810 R08: 0000000000000000 R09: ffff8800159148d8
[    2.490031] R10: 000000000000005a R11: ffffffff811ccd2d R12: 6b6b6b6b6b6b6b6b
[    2.490031] R13: 6b6b6b6b6b6b6b6b R14: ffff880015920820 R15: ffffffff81612e80
[    2.490031] FS:  0000000000000000(0000) GS:ffff880016fe2320(0000) knlGS:0000000000000000
[    2.490031] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
[    2.490031] CR2: 0000000000000000 CR3: 0000000000201000 CR4: 00000000000006e0
[    2.490031] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    2.490031] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[    2.490031] Process swapper (pid: 1, threadinfo ffff880017608000, task ffff880017600000)
[    2.490031] Stack:
[    2.490031]  0000000000000000 ffff880015914720 ffff880017609830 ffffffff810e6abc
[    2.490031]  0000000000000000 ffff880015914720 ffff880017609880 ffffffff810e7dc7
[    2.490031]  ffff8800159146d8 ffffffff816150c0 ffff880015920820 ffff8800159146d8
[    2.490031] Call Trace:
[    2.490031]  [<ffffffff810e6abc>] virt_to_head_page+0x11/0x5d
[    2.490031]  [<ffffffff810e7dc7>] kfree+0x43/0x19e
[    2.490031]  [<ffffffff81253dba>] device_release+0x73/0x77
[    2.490031]  [<ffffffff811c255a>] kobject_release+0xcb/0xf2
[    2.490031]  [<ffffffff811c248f>] ? kobject_release+0x0/0xf2
[    2.490031]  [<ffffffff811c34d4>] kref_put+0xb9/0xc9
[    2.490031]  [<ffffffff811c23e7>] kobject_put+0x47/0x4b
[    2.490031]  [<ffffffff81252b41>] put_device+0x17/0x19
[    2.490031]  [<ffffffff81253635>] device_unregister+0x83/0x88
[    2.490031]  [<ffffffff81253675>] device_destroy+0x3b/0x3f
[    2.490031]  [<ffffffff8122a4f6>] tty_unregister_device+0x26/0x28
[    2.490031]  [<ffffffff8124e74f>] uart_remove_one_port+0xc9/0x132
[    2.490031]  [<ffffffff81250be4>] serial8250_register_port+0xdd/0x212
[    2.490031]  [<ffffffff813a03dc>] serial_pnp_probe+0x189/0x1cb
[    2.490031]  [<ffffffff8121dd4b>] ? match_device+0x2a/0x41
[    2.490031]  [<ffffffff8121de05>] pnp_device_probe+0x80/0xa5
[    2.490031]  [<ffffffff81256e0b>] driver_probe_device+0x1f8/0x2f6
[    2.490031]  [<ffffffff81256f66>] __driver_attach+0x5d/0x80
[    2.490031]  [<ffffffff81256f09>] ? __driver_attach+0x0/0x80
[    2.490031]  [<ffffffff81255fe0>] bus_for_each_dev+0x54/0x83
[    2.490031]  [<ffffffff81256a0a>] driver_attach+0x21/0x23
[    2.490031]  [<ffffffff81255a5e>] bus_add_driver+0x124/0x279
[    2.490031]  [<ffffffff817085d0>] ? serial8250_pnp_init+0x0/0x12
[    2.490031]  [<ffffffff8125715e>] driver_register+0x98/0x10f
[    2.490031]  [<ffffffff817085d0>] ? serial8250_pnp_init+0x0/0x12
[    2.490031]  [<ffffffff8121db78>] pnp_register_driver+0x21/0x23
[    2.490031]  [<ffffffff817085e0>] serial8250_pnp_init+0x10/0x12
[    2.490031]  [<ffffffff8100a075>] do_one_initcall+0x75/0x18c
[    2.490031]  [<ffffffff810740b9>] ? mark_lock+0x1c/0x35b
[    2.490031]  [<ffffffff8107444a>] ? mark_held_locks+0x52/0x72
[    2.490031]  [<ffffffff810740b9>] ? mark_lock+0x1c/0x35b
[    2.490031]  [<ffffffff81074ee7>] ? __lock_acquire+0x44b/0xb2a
[    2.490031]  [<ffffffff811c174f>] ? ida_get_new_above+0x167/0x188
[    2.490031]  [<ffffffff81018cdc>] ? native_sched_clock+0x53/0x57
[    2.490031]  [<ffffffff81018b60>] ? sched_clock+0x9/0xc
[    2.490031]  [<ffffffff81072ddc>] ? lock_release_holdtime+0x4e/0x53
[    2.490031]  [<ffffffff811cc0f9>] ? _raw_spin_unlock+0xf5/0xfb
[    2.490031]  [<ffffffff813ae35a>] ? _spin_unlock+0x2b/0x2f
[    2.490031]  [<ffffffff81140c91>] ? proc_register+0x189/0x19d
[    2.490031]  [<ffffffff81140dc2>] ? create_proc_entry+0x79/0x8f
[    2.490031]  [<ffffffff8109fc22>] ? register_irq_proc+0xb3/0xcf
[    2.490031]  [<ffffffff81140000>] ? proc_pid_lookup+0xfd/0x15e
[    2.490031]  [<ffffffff816dd92d>] kernel_init+0x12d/0x17e
[    2.490031]  [<ffffffff813ae00d>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[    2.490031]  [<ffffffff81013aaa>] child_rip+0xa/0x20
[    2.490031]  [<ffffffff810133be>] ? restore_args+0x0/0x30
[    2.490031]  [<ffffffff816dd800>] ? kernel_init+0x0/0x17e
[    2.490031]  [<ffffffff81013aa0>] ? child_rip+0x0/0x20


View attachment "config" of type "text/plain" (56514 bytes)

View attachment "serial0.txt" of type "text/plain" (24303 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ