lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3e8340490901112247y4d82a71ah23ab1453ca0d9819@mail.gmail.com>
Date:	Mon, 12 Jan 2009 01:47:40 -0500
From:	"Bryan Donlan" <bdonlan@...il.com>
To:	"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>
Subject: OOPS and freeze on 2.6.29-rc1 on xen-x86

Hi,

After testing 2.6.29-rc1 on xen-x86 with a btrfs root filesystem, I
got the OOPS quoted below and a hard freeze shortly after boot
(running update-grub of all things).
Boot messages and config are attached.

This is on a test system, so I'd be happy to test any patches.

------------[ cut here ]------------

Kernel BUG at c05ef80d [verbose debug info unavailable]

invalid opcode: 0000 [#1] SMP

last sysfs file: /sys/block/xvdc/size

Modules linked in:



Pid: 0, comm: swapper Not tainted (2.6.29-rc1 #6)

EIP: 0061:[<c05ef80d>] EFLAGS: 00010087 CPU: 2

EIP is at schedule+0x7cd/0x950

EAX: d5aeca80 EBX: 00000002 ECX: 00000000 EDX: d4cb9a40

ESI: c12f5600 EDI: d4cb9a40 EBP: d6033fa4 ESP: d6033ef4

 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069

Process swapper (pid: 0, ti=d6032000 task=d6020b70 task.ti=d6032000)

Stack:

 000d85bc 00000000 000186a0 00000000 0dd11410 c0105417 c12efe00 0dc367c3

 00000011 c0105d46 d5a5d310 deadbeef d4cb9a40 c07cc600 c05f1340 c12e0060

 deadbeef d6020b70 d6020d08 00000002 c014377d 00000000 c12f5600 00002c22

Call Trace:

 [<c0105417>] xen_force_evtchn_callback+0x17/0x30

 [<c0105d46>] check_events+0x8/0x12

 [<c05f1340>] _spin_unlock_irqrestore+0x20/0x40

 [<c014377d>] hrtimer_start_range_ns+0x12d/0x2e0

 [<c014c4f6>] tick_nohz_restart_sched_tick+0x146/0x160

 [<c0107485>] cpu_idle+0xa5/0xc0

Code: e8 79 6c b1 ff 90 8b 45 a4 e8 20 6a b3 ff 89 f0 e8 d9 1a 00 00
e9 67 fd ff ff 8d 74 26 00 e8 0b 1d 00 00 8d 76 00 e9 7e f8 ff ff <0f>
0b 90 eb fd 8d b6 00 00 00 00 85 ff 8d b6 00 00 00 00 75 11

EIP: [<c05ef80d>] schedule+0x7cd/0x950 SS:ESP 0069:d6033ef4

---[ end trace 4dda895500d0b401 ]---

Kernel panic - not syncing: Attempted to kill the idle task!

------------[ cut here ]------------

WARNING: at kernel/smp.c:299 smp_call_function_many+0x1de/0x240()

Modules linked in:

Pid: 0, comm: swapper Tainted: G      D    2.6.29-rc1 #6

Call Trace:

 [<c012b4a7>] warn_slowpath+0x87/0xe0

 [<c014469a>] atomic_notifier_call_chain+0x1a/0x20

 [<c045728f>] vt_console_print+0x23f/0x330

 [<c0105417>] xen_force_evtchn_callback+0x17/0x30

 [<c0105d46>] check_events+0x8/0x12

 [<c0105caf>] xen_restore_fl_direct_end+0x0/0x1

 [<c05f1340>] _spin_unlock_irqrestore+0x20/0x40

 [<c0105400>] xen_force_evtchn_callback+0x0/0x30

 [<c0105d46>] check_events+0x8/0x12

 [<c0105caf>] xen_restore_fl_direct_end+0x0/0x1

 [<c012c0b1>] vprintk+0x1b1/0x370

 [<c0105d46>] check_events+0x8/0x12

 [<c0105417>] xen_force_evtchn_callback+0x17/0x30

 [<c0105d46>] check_events+0x8/0x12

 [<c014fcee>] smp_call_function_many+0x1de/0x240

 [<c0106030>] stop_self+0x0/0x30

 [<c012bc71>] release_console_sem+0x191/0x1e0

 [<c01095e0>] do_invalid_op+0x0/0xa0

 [<c014fd6e>] smp_call_function+0x1e/0x30

 [<c05eeb95>] panic+0x4a/0xec

 [<c012edda>] do_exit+0x6ea/0x800

 [<c0105caf>] xen_restore_fl_direct_end+0x0/0x1

 [<c05f1340>] _spin_unlock_irqrestore+0x20/0x40

 [<c01095e0>] do_invalid_op+0x0/0xa0

 [<c05eec4e>] printk+0x17/0x1b

 [<c01095e0>] do_invalid_op+0x0/0xa0

 [<c010b7a9>] oops_end+0x99/0xa0

 [<c010965f>] do_invalid_op+0x7f/0xa0

 [<c05ef80d>] schedule+0x7cd/0x950

 [<c01434fb>] hrtimer_get_next_event+0x10b/0x120

 [<c0118665>] pvclock_clocksource_read+0x55/0xc0

 [<c0118665>] pvclock_clocksource_read+0x55/0xc0

 [<c0105be1>] xen_sched_clock+0x21/0x90

 [<c0105b82>] xen_vcpuop_set_next_event+0x42/0x80

 [<c014528b>] __update_sched_clock+0x2b/0x1a0

 [<c05f160a>] error_code+0x72/0x78

 [<c014007b>] finish_wait+0x2b/0x70

 [<c05ef80d>] schedule+0x7cd/0x950

 [<c0105417>] xen_force_evtchn_callback+0x17/0x30

 [<c0105d46>] check_events+0x8/0x12

 [<c05f1340>] _spin_unlock_irqrestore+0x20/0x40

 [<c014377d>] hrtimer_start_range_ns+0x12d/0x2e0

 [<c014c4f6>] tick_nohz_restart_sched_tick+0x146/0x160

 [<c0107485>] cpu_idle+0xa5/0xc0

---[ end trace 4dda895500d0b402 ]---

Download attachment "dotconfig" of type "application/octet-stream" (32989 bytes)

View attachment "dmesg.log" of type "text/x-log" (18341 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ