lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50A1B59D.1020106@linux.vnet.ibm.com>
Date:	Tue, 13 Nov 2012 10:51:09 +0800
From:	Michael Wang <wangyun@...ux.vnet.ibm.com>
To:	Paweł Sikora <pawel.sikora@...k.net>
CC:	linux-kernel@...r.kernel.org, stable@...r.kernel.org,
	torvalds@...ux-foundation.org, arekm@...-linux.org,
	baggins@...-linux.org
Subject: Re: [3.6.6] panic on reboot / khungtaskd blocked? (WARNING: at arch/x86/kernel/smp.c:123
 native_smp_send_reschedule)

On 11/12/2012 08:33 PM, Paweł Sikora wrote:
> On Monday 12 of November 2012 11:22:47 Paweł Sikora wrote:
>> On Monday 12 of November 2012 15:40:31 Michael Wang wrote:
>>> On 11/12/2012 03:16 PM, Paweł Sikora wrote:
>>>> On Monday 12 of November 2012 11:04:12 Michael Wang wrote:
>>>>> On 11/09/2012 09:48 PM, Paweł Sikora wrote:
>>>>>> Hi,
>>>>>>
>>>>>> during playing with new ups i've caught an nice oops on reboot:
>>>>>>
>>>>>> http://imgbin.org/index.php?page=image&id=10253
>>>>>>
>>>>>> probably the upstream is also affected.
>>>>>
>>>>> Hi, Paweł
>>>>>
>>>>> Are you using a clean 3.6.6 without any modify?
>>>>
>>>> yes, pure 3.6.6 form git tree with modular config.
>>>>
>>>>> Looks like some threads has set itself to be UNINTERRUPTIBLE with out
>>>>> any design on switch itself back later(or the time is too long), are you
>>>>> accidentally using some bad designed module?
>>>>
>>>> hmm, hard to say. mostly all modules are loaded automatically by kernel.
>>>
>>> Could you please provide the whole dmesg in text? your picture lost the
>>> print info of the hung task.
>>
>> i've grabbed the console via rs232 but there's no more info (see attached txt).
> 
> hmm, i have one observation.
> 
> during rc.shutdown there're messages on console like this: Cannot stat file /proc/$pid/fd/1: Connection timed out
> afaics this file descriptor points to vnc log file on a remote machine, e.g.:
> 
> # ps aux|grep xfwm4
> eda       1748  0.0  0.0 320220 11224 ?        S    13:08   0:00 xfwm4 
> 
> # readlink -m /proc/1748/fd/1
> /remote/dragon/ahome/eda/.vnc/odra:11.log
> 
> # mount|grep ahome
> dragon:/home/users/ on /remote/dragon/ahome type nfs (rw,relatime,vers=3,rsize=262144,wsize=262144,namlen=255,soft,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=10.0.2.121,mountvers=3,mountport=45251,mountproto=udp,local_lock=none,addr=10.0.2.121)
> 

We can report the bug to driver folks, but have to make sure whether
the hung thread is belong to it firstly, so we need the hung task info
(at least the name).

I'm not sure what's the environment we faced, but setup debug method is
necessary, 'script' may help you to record the dmesg even when remote
console hung.

If it's really hard to get dmesg, please try below modify and
see whether the info print out on console.

Regards,
Michael Wang



diff --git a/kernel/sched/core.c b/kernel/sched/core.c
index c2e077c..2f1b718 100644
--- a/kernel/sched/core.c
+++ b/kernel/sched/core.c
@@ -4504,7 +4504,7 @@ void sched_show_task(struct task_struct *p)
        unsigned state;
 
        state = p->state ? __ffs(p->state) + 1 : 0;
-       printk(KERN_INFO "%-15.15s %c", p->comm,
+       printk(KERN_EMERG "%-15.15s %c", p->comm,
                state < sizeof(stat_nam) - 1 ? stat_nam[state] : '?');
 #if BITS_PER_LONG == 32
        if (state == TASK_RUNNING)


> 
> so, probably during `killall5 -TERM/-KILL` on shutdown stage something sometimes go wrong
> and these processes (xfce4/vncserver) survive the signal and hang on the nfs i/o.
> 
> BR,
> Paweł.
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ