lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110217123511.GA26685@elte.hu>
Date:	Thu, 17 Feb 2011 13:35:11 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Tejun Heo <tj@...nel.org>
Cc:	linux-kernel@...r.kernel.org, x86@...nel.org, yinghai@...nel.org,
	brgerst@...il.com, gorcunov@...il.com, shaohui.zheng@...el.com,
	rientjes@...gle.com, hpa@...ux.intel.com, ankita@...ibm.com
Subject: [boot crash] Re: [PATCHSET x86/numa] x86-64, NUMA: bring sanity to
 NUMA config/emulation


FYI, -tip testing has found the follow boot crash:

[    0.000000] init_memory_mapping: 0000000000000000-000000003fff0000
[    0.000000]  0000000000 - 003fff0000 page 4k
[    0.000000] kernel direct mapping tables up to 3fff0000 @ 3fdee000-3fff0000
PANIC: early exception 06 rip 10:ffffffff8102f069 error 0 cr2 f06f53
[    0.000000] Pid: 0, comm: swapper Not tainted 2.6.38-rc5-tip+ #94135
[    0.000000] Call Trace:
[    0.000000]  [<ffffffff8199019e>] ? early_idt_handler+0x5e/0x71
[    0.000000]  [<ffffffff8102f069>] ? __phys_addr+0x69/0x70
[    0.000000]  [<ffffffff8102f009>] ? __phys_addr+0x9/0x70
[    0.000000]  [<ffffffff819a0156>] ? initmem_init+0xf0/0xa0d
[    0.000000]  [<ffffffff819a4cc2>] ? parse_crashkernel+0x40/0x2a1
[    0.000000]  [<ffffffff810303e0>] ? dummy_numa_init+0x0/0x70
[    0.000000]  [<ffffffff810284a9>] ? is_vsmp_box+0x9/0x50
[    0.000000]  [<ffffffff81992f4a>] ? setup_arch+0x9f9/0xaec
[    0.000000]  [<ffffffff813c585c>] ? printk+0x41/0x45
[    0.000000]  [<ffffffff81990999>] ? start_kernel+0x9d/0x3b5
[    0.000000]  [<ffffffff8199032b>] ? x86_64_start_reservations+0x132/0x136
[    0.000000]  [<ffffffff8199047d>] ? x86_64_start_kernel+0x14e/0x15d

Full crashlog attached below, config attached as well.

Testbox is a standard dual-core Athlon64 whitebox PC, with no particular 
weirdnesses. The box boots fine with x86/mm removed from tip:master.

I've excluded x86/mm from tip:master for the time being. This was with the 
e23bba604433 x86/mm tree.

Thanks,

	Ingo

early console in setup code
Probing EDD (edd=off to disable)... ok
early console in decompress_kernel

Decompressing Linux... Parsing ELF... done.
Booting the kernel.
[    0.000000] Linux version 2.6.38-rc5-tip+ (mingo@...ius) (gcc version 4.5.1 20100924 (Red Hat 4.5.1-4) (GCC) ) #94135 SMP Wed Feb 16 20:35:21 CET 2011
[    0.000000] Command line: root=/dev/sda6 earlyprintk=ttyS0,115200 console=ttyS0,115200 debug initcall_debug sysrq_always_enabled ignore_loglevel selinux=0 nmi_watchdog=0 panic=1 3
[    0.000000] BIOS-provided physical RAM map:
[    0.000000]  BIOS-e820: 0000000000000000 - 000000000009f800 (usable)
[    0.000000]  BIOS-e820: 000000000009f800 - 00000000000a0000 (reserved)
[    0.000000]  BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)
[    0.000000]  BIOS-e820: 0000000000100000 - 000000003fff0000 (usable)
[    0.000000]  BIOS-e820: 000000003fff0000 - 000000003fff3000 (ACPI NVS)
[    0.000000]  BIOS-e820: 000000003fff3000 - 0000000040000000 (ACPI data)
[    0.000000]  BIOS-e820: 00000000e0000000 - 00000000f0000000 (reserved)
[    0.000000]  BIOS-e820: 00000000fec00000 - 0000000100000000 (reserved)
[    0.000000] bootconsole [earlyser0] enabled
[    0.000000] debug: ignoring loglevel setting.
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] e820 update range: 0000000000000000 - 0000000000010000 (usable) ==> (reserved)
[    0.000000] e820 remove range: 00000000000a0000 - 0000000000100000 (usable)
[    0.000000] No AGP bridge found
[    0.000000] last_pfn = 0x3fff0 max_arch_pfn = 0x400000000
[    0.000000] MTRR default type: uncachable
[    0.000000] MTRR fixed ranges enabled:
[    0.000000]   00000-9FFFF write-back
[    0.000000]   A0000-BFFFF uncachable
[    0.000000]   C0000-C7FFF write-protect
[    0.000000]   C8000-FFFFF uncachable
[    0.000000] MTRR variable ranges enabled:
[    0.000000]   0 base 0000000000 mask FFC0000000 write-back
[    0.000000]   1 disabled
[    0.000000]   2 disabled
[    0.000000]   3 disabled
[    0.000000]   4 disabled
[    0.000000]   5 disabled
[    0.000000]   6 disabled
[    0.000000]   7 disabled
[    0.000000] x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106
[    0.000000] found SMP MP-table at [ffff8800000f5680] f5680
[    0.000000] Scanning 0 areas for low memory corruption
[    0.000000] initial memory mapped : 0 - 20000000
[    0.000000] init_memory_mapping: 0000000000000000-000000003fff0000
[    0.000000]  0000000000 - 003fff0000 page 4k
[    0.000000] kernel direct mapping tables up to 3fff0000 @ 3fdee000-3fff0000
PANIC: early exception 06 rip 10:ffffffff8102f069 error 0 cr2 f06f53
[    0.000000] Pid: 0, comm: swapper Not tainted 2.6.38-rc5-tip+ #94135
[    0.000000] Call Trace:
[    0.000000]  [<ffffffff8199019e>] ? early_idt_handler+0x5e/0x71
[    0.000000]  [<ffffffff8102f069>] ? __phys_addr+0x69/0x70
[    0.000000]  [<ffffffff8102f009>] ? __phys_addr+0x9/0x70
[    0.000000]  [<ffffffff819a0156>] ? initmem_init+0xf0/0xa0d
[    0.000000]  [<ffffffff819a4cc2>] ? parse_crashkernel+0x40/0x2a1
[    0.000000]  [<ffffffff810303e0>] ? dummy_numa_init+0x0/0x70
[    0.000000]  [<ffffffff810284a9>] ? is_vsmp_box+0x9/0x50
[    0.000000]  [<ffffffff81992f4a>] ? setup_arch+0x9f9/0xaec
[    0.000000]  [<ffffffff813c585c>] ? printk+0x41/0x45
[    0.000000]  [<ffffffff81990999>] ? start_kernel+0x9d/0x3b5
[    0.000000]  [<ffffffff8199032b>] ? x86_64_start_reservations+0x132/0x136
[    0.000000]  [<ffffffff8199047d>] ? x86_64_start_kernel+0x14e/0x15d
[    0.000000] RIP __phys_addr+0x69/0x70
Press any key to enter the menu

View attachment "config" of type "text/plain" (56697 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ