lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120729124022.GA16748@localhost>
Date:	Sun, 29 Jul 2012 20:40:22 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	LKML <linux-kernel@...r.kernel.org>
Cc:	Stephen Hemminger <shemminger@...ux-foundation.org>,
	Joe Perches <joe@...ches.com>,
	"kernel-janitors@...r.kernel..." <kernel-janitors@...r.kernel.org>,
	netdev <netdev@...r.kernel.org>
Subject: appletalk/cops_probe BUG: soft lockup - CPU#1 stuck for 23s!

Hi,

This is probably a rather old bug, triggered while doing randconfig
boot tests in kvm:

[    0.891661] Copyright (C) 2004 MontaVista Software - IPMI Powerdown via sys_reboot.
[    0.893806] cops.c:v0.04 6/7/98 Jay Schulist <jschlst@...ba.org>
[   28.160015] BUG: soft lockup - CPU#1 stuck for 23s! [swapper/0:1]
[   28.160777] irq event stamp: 119196
[   28.161214] hardirqs last  enabled at (119195): [<c1366a25>] restore_all_notrace+0x0/0x18
[   28.162242] hardirqs last disabled at (119196): [<c136752f>] apic_timer_interrupt+0x2f/0x40
[   28.163269] softirqs last  enabled at (119194): [<c10313e6>] __do_softirq+0x136/0x150
[   28.164234] softirqs last disabled at (119189): [<c1003ece>] do_softirq+0x5e/0xd0
[   28.165156] 
[   28.165349] Pid: 1, comm: swapper/0 Not tainted 3.5.0-rc5-02613-g501462f #1  
[   28.166246] EIP: 0060:[<c1500210>] EFLAGS: 00000206 CPU: 1
[   28.166912] EIP is at cops_probe1+0xab/0x1a1
[   28.167441] EAX: 000000ff EBX: c13c3dc8 ECX: 00002dd4 EDX: 00000352
[   28.168204] ESI: 00000350 EDI: 00000003 EBP: cec2df64 ESP: cec2df40
[   28.168961]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[   28.169621] CR0: 8005003b CR2: 00000000 CR3: 01538000 CR4: 00000690
[   28.170010] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   28.170010] DR6: ffff0ff0 DR7: 00000400
[   28.170010] Process swapper/0 (pid: 1, ti=cec2c000 task=cec30000 task.ti=cec2c000)
[   28.170010] Stack:
[   28.170010]  cdb21000 00000000 ffffffff cdb21000 00000001 cdb21000 cdb21000 c14bbff0
[   28.170010]  c14fffe5 cec2df80 c15003ab cdb21000 c146790e 00000001 00000008 00000001
[   28.170010]  cec2df90 c1500062 00000006 00000000 cec2dfc0 c14e2a4c 00060006 c1496bc8
[   28.170010] Call Trace:
[   28.170010]  [<c14fffe5>] ? probe_list2+0x41/0x41
[   28.170010]  [<c15003ab>] cops_probe+0xa5/0xfa
[   28.170010]  [<c1500062>] net_olddevs_init+0x7d/0x92
[   28.170010]  [<c14e2a4c>] do_one_initcall+0x7f/0x131
[   28.170010]  [<c14e2c28>] kernel_init+0x12a/0x1c4
[   28.170010]  [<c14e23e6>] ? loglevel+0x2b/0x2b
[   28.170010]  [<c14e2afe>] ? do_one_initcall+0x131/0x131
[   28.170010]  [<c1367fa6>] kernel_thread_helper+0x6/0xd
[   28.170010] Code: ee ec bf 4e 01 00 00 eb 0a b8 58 89 41 00 e8 88 5b c6 ff 4f 75 f3 b8 c0 3d 3c c1 8d 56 02 89 5d f0 89 c3 eb 13 b9 ff ff 00 00 ec <83> e0 03 fe c8 74 0c 49 75 f5 83 c3 04 8b 3b 85 ff 75 e7 8b 5d 

Thanks,
Fengguang

View attachment "dmesg-kvm-fat-3803-2012-07-29-20-29-25" of type "text/plain" (24845 bytes)

View attachment "config-3.5.0-rc5-02613-g501462f" of type "text/plain" (42455 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ