lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090210142443.629E.KOSAKI.MOTOHIRO@jp.fujitsu.com>
Date:	Tue, 10 Feb 2009 14:41:29 +0900 (JST)
From:	KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>
To:	David Howells <dhowells@...hat.com>,
	Serge Hallyn <serue@...ibm.com>,
	LKML <linux-kernel@...r.kernel.org>
Cc:	kosaki.motohiro@...fujitsu.com,
	Lee Schermerhorn <Lee.Schermerhorn@...com>
Subject: [CRED bug?] 2.6.29-rc3 don't survive on stress workload

Hi

I periodically test kernel on stress workload.
Unfortunately, recent kerenel don't survive >24H.

It paniced with following stack.
Do you have any suggestions?

thanks!


My test box:
  CPU: ia64 x8
  MEM: 8GB (4GB x2node)


=================================================================
PQ-muneda login: Unable to handle kernel paging request at virtual address a040000000403400
etex[669958]: Oops 8813272891392 [1]
Modules linked in: binfmt_misc nls_iso8859_1 nls_cp437 dm_multipath scsi_dh fan sg e100 thermal button container processor mii dm_snapshot dm_zero dm_mirror dm_region_hash dm_log dm_mod lpfc mptspi mptscsih mptbase ehci_hcd ohci_hcd uhci_hcd usbcore

Pid: 669958, CPU 2, comm:                 etex
psr : 0000101008026038 ifs : 800000000000028a ip  : [<a0000001001c45e0>]    Not tainted (2.6.29-rc3)
ip is at kfree+0x40/0x2a0
unat: 0000000000000000 pfs : 0000000000000205 rsc : 0000000000000003
rnat: 00000000498f1c7b bsps: 0000000000000000 pr  : 00000000005655ab
ldrs: 0000000000000000 ccv : 0000000000000130 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000100123210 b6  : a0000001001231e0 b7  : a000000100014d20
f6  : 1003e006caf999642a000 f7  : 1003e000000000183c978
f8  : 1003e0000000080000000 f9  : 100099ba0000000000000
f10 : 10014d28eb1b735286a15 f11 : 1003e000000000034a3ac
r1  : a000000100f680c0 r2  : 000000000000012f r3  : 0000000000403400
r8  : 00000000000100d0 r9  : a0000001001231e0 r10 : e000000002b6d148
r11 : a000000100d69018 r12 : e00000408a78fe20 r13 : e00000408a780000
r14 : 0000000000000130 r15 : a040000000000000 r16 : ffffffffdead4ead
r17 : 00000000dead4ead r18 : a000000100cd2274 r19 : a000000100d796b8
r20 : 0000000000004000 r21 : 0000000000004000 r22 : 000000000000000a
r23 : a0000001009a95b8 r24 : a0000001000ec2a0 r25 : e00001600999b1e0
r26 : 0000000000004000 r27 : e000000001116a48 r28 : 0000000000000002
r29 : e00000408a780d54 r30 : 0000000000004000 r31 : 0000000000004000

Call Trace:
 [<a000000100017780>] show_stack+0x80/0xa0
                                sp=e00000408a78f9f0 bsp=e00000408a781418
 [<a000000100018080>] show_regs+0x880/0x8c0
                                sp=e00000408a78fbc0 bsp=e00000408a7813b8
 [<a000000100040290>] die+0x1b0/0x2e0
                                sp=e00000408a78fbc0 bsp=e00000408a781370
 [<a0000001007add90>] ia64_do_page_fault+0x810/0xb00
                                sp=e00000408a78fbc0 bsp=e00000408a781310
 [<a00000010000c860>] ia64_native_leave_kernel+0x0/0x270
                                sp=e00000408a78fc50 bsp=e00000408a781310
 [<a0000001001c45e0>] kfree+0x40/0x2a0
                                sp=e00000408a78fe20 bsp=e00000408a7812c0
 [<a000000100123210>] free_user_ns+0x30/0x60
                                sp=e00000408a78fe20 bsp=e00000408a7812a0
 [<a00000010037a320>] kref_put+0xe0/0x100
                                sp=e00000408a78fe20 bsp=e00000408a781278
 [<a0000001000c5bf0>] free_uid+0x110/0x1a0
                                sp=e00000408a78fe20 bsp=e00000408a781250
 [<a0000001000ec340>] put_cred_rcu+0xa0/0xe0
                                sp=e00000408a78fe30 bsp=e00000408a781228
 [<a00000010012db90>] __rcu_process_callbacks+0x2f0/0x580
                                sp=e00000408a78fe30 bsp=e00000408a7811e0
 [<a00000010012de70>] rcu_process_callbacks+0x50/0xc0
                                sp=e00000408a78fe30 bsp=e00000408a7811c0
 [<a0000001000b7ac0>] __do_softirq+0x220/0x320
                                sp=e00000408a78fe30 bsp=e00000408a781120
 [<a0000001000b7c30>] do_softirq+0x70/0xc0
                                sp=e00000408a78fe30 bsp=e00000408a7810c0
 [<a0000001000b7d00>] irq_exit+0x80/0xa0
                                sp=e00000408a78fe30 bsp=e00000408a7810a8
 [<a000000100014600>] ia64_handle_irq+0x1e0/0x400
                                sp=e00000408a78fe30 bsp=e00000408a781030
 [<a00000010000c860>] ia64_native_leave_kernel+0x0/0x270
                                sp=e00000408a78fe30 bsp=e00000408a781030
Kernel panic - not syncing: Fatal exception
Rebooting in 1 seconds..

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ