lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C4A61A5CA4AD2246942F4BA6F20ACB804356554C@ALVA-EXMB04.alv.autoliv.int>
Date:	Thu, 26 Jun 2014 13:16:02 +0000
From:	Mattis Lorentzon <Mattis.Lorentzon@...oliv.com>
To:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"linux@....linux.org.uk" <linux@....linux.org.uk>
CC:	Fredrik Noring <fredrik.noring@...oliv.com>
Subject: RE: Oops: 17 SMP ARM (v3.16-rc2)

Hi again,

The Oops seems to have been introduced somewhere between v3.12 and v3.13:

- The Oops is reproducible within seconds when running Linux 3.16-rc2.
- We have observed the Oops on 8 different hardware units and two different chipsets (Freescale i.MX6 and Xilinx Zynq).
- The Oops has not been seen on Linux 3.12 so it appears to be good.
- The Oops has been seen on Linux 3.13, 3.14, 3.15, 3.16-rc2 so these appear to be bad.

Configs and a couple of Oops reports are attached.

Best regards,
Mattis Lorentzon

> Hello kernel people,
> 
> I have a similar issue with v3.16-rc2 as previously reported by Waldemar
> Brodkorb for v3.15-rc4.
> https://lkml.org/lkml/2014/5/9/330
> 
> We are running a benchmark application, sometimes using perf, with heavy
> traffic over NFS.
> The error is sporadic and it seems to occur more frequently when using perf.
> 
> Linux imx6-test0 3.16.0-rc2+ #1 SMP Wed Jun 25 15:04:16 CEST 2014 armv7l
> armv7l armv7l GNU/Linux
> 
> Any help is greatly appreciated.
> 
> Best regards,
> Mattis Lorentzon
> 
> Unable to handle kernel paging request at virtual address ffffffff pgd =
> 9e338000 [ffffffff] *pgd=2fffd821, *pte=00000000, *ppte=00000000 Internal
> error: Oops: 17 [#1] SMP ARM Modules linked in:
> CPU: 0 PID: 146 Comm: stereo Not tainted 3.16.0-rc2+ #1
> task: 9e07a700 ti: 81c42000 task.ti: 81c42000 PC is at
> find_get_entry+0x60/0xfc LR is at radix_tree_lookup_slot+0x1c/0x2c
> pc : [<800a34d8>]    lr : [<80290448>]    psr: a0000013
> sp : 81c43d98  ip : 00000000  fp : 81c43dcc
> r10: 00000001  r9 : 9e30e3c0  r8 : 000002a7
> r7 : 9f3758a0  r6 : 00000000  r5 : 00000001  r4 : 00000000
> r3 : 81c43d84  r2 : 00000000  r1 : 000002a7  r0 : ffffffff
> Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
> Control: 10c5387d  Table: 2e33804a  DAC: 00000015 Process stereo (pid: 146,
> stack limit = 0x81c42240)
> Stack: (0x81c43d98 to 0x81c44000)
> 3d80:                                                       00000000 00000000
> 3da0: 800a3478 000a6000 81c43ecc 00000000 9f37589c 00000000 806cb02a
> 000002a7
> 3dc0: 81c43e04 81c43dd0 800a406c 800a3484 80061ca0 9fc2dfe0 00000013
> 00000059
> 3de0: 9f37589c 9f375770 00000300 000002a7 9e30e3c0 000002a7 81c43e94
> 81c43e08
> 3e00: 800a50c4 800a4040 00000000 00000000 801d1818 00000000 00001000
> 00080001
> 3e20: 000002a6 9f3757f4 00000300 000a7000 00000000 801d1818 9e30e490
> 9f37567c
> 3e40: 81c43ee8 81c43ed4 00000000 00000000 804d87e0 80067098 00000004
> 9f375770
> 3e60: 81c43e94 81c43e70 801d491c 81c43ee8 9f375770 81c43ed4 9e30e3c0
> 9e07a700
> 3e80: 76907000 00000000 81c43ebc 81c43e98 801d1818 800a4dfc 80061ca0
> 80061b0c
> 3ea0: 9f375770 00200000 00000000 81c43f78 81c43f44 81c43ec0 800e1348
> 801d17b8
> 3ec0: 00100000 81c43ed0 800e1764 76907000 00100000 00000000 000a7000
> 00059000
> 3ee0: 81c43ecc 00000001 9e30e3c0 00000000 00000000 00000000 9e07a700
> 00000000
> 3f00: 00000000 00000000 00200000 00000000 00100000 00000000 00000000
> 00000000
> 3f20: 9e30e3c0 9e30e3c0 76907000 81c43f78 9e30e3c0 00100000 81c43f74
> 81c43f48
> 3f40: 800e1adc 800e12b8 00000000 0027cce0 00200000 00000000 9e30e3c0
> 9e30e3c0
> 3f60: 00100000 76907000 81c43fa4 81c43f78 800e2200 800e1a58 00200000
> 00000000
> 3f80: 0027cce0 00000000 0007cce0 00000003 8000ebc4 81c42000 00000000
> 81c43fa8
> 3fa0: 8000ea00 800e21c8 0027cce0 00000000 00000003 76907000 00100000
> 00000000
> 3fc0: 0027cce0 00000000 0007cce0 00000003 0142b5a0 00000000 00000000
> 00000000
> 3fe0: 00000000 7ec59d94 76dc26ac 76e1762c 60000010 00000003 00000000
> 00000000
> Backtrace:
> [<800a3478>] (find_get_entry) from [<800a406c>]
> (pagecache_get_page+0x38/0x1d8)
>  r8:000002a7 r7:806cb02a r6:00000000 r5:9f37589c r4:00000000 [<800a4034>]
> (pagecache_get_page) from [<800a50c4>]
> (generic_file_read_iter+0x2d4/0x750)
>  r10:000002a7 r9:9e30e3c0 r8:000002a7 r7:00000300 r6:9f375770 r5:9f37589c
>  r4:00000059
> [<800a4df0>] (generic_file_read_iter) from [<801d1818>]
> (nfs_file_read+0x6c/0xa8)
>  r10:00000000 r9:76907000 r8:9e07a700 r7:9e30e3c0 r6:81c43ed4 r5:9f375770
>  r4:81c43ee8
> [<801d17ac>] (nfs_file_read) from [<800e1348>]
> (new_sync_read+0x9c/0xc4)
>  r6:81c43f78 r5:00000000 r4:00200000
> [<800e12ac>] (new_sync_read) from [<800e1adc>] (vfs_read+0x90/0x150)
>  r8:00100000 r7:9e30e3c0 r6:81c43f78 r5:76907000 r4:9e30e3c0 [<800e1a4c>]
> (vfs_read) from [<800e2200>] (SyS_read+0x44/0x98)
>  r9:76907000 r8:00100000 r7:9e30e3c0 r6:9e30e3c0 r5:00000000 r4:00200000
> [<800e21bc>] (SyS_read) from [<8000ea00>] (ret_fast_syscall+0x0/0x48)
>  r9:81c42000 r8:8000ebc4 r7:00000003 r6:0007cce0 r5:00000000 r4:0027cce0
> Code: e1a01008 eb07b3d6 e3500000 0a00001c (e5904000) ---[ end trace
> bebb56a5d6f464ed ]---

***************************************************************
Consider the environment before printing this message.

To read Autoliv's Information and Confidentiality Notice, follow this link:
http://www.autoliv.com/disclaimer.html
***************************************************************

View attachment "oops_v3.13.txt" of type "text/plain" (3755 bytes)

View attachment "oops_v3.15.txt" of type "text/plain" (9848 bytes)

Download attachment "config-v3.12.gz" of type "application/x-gzip" (12937 bytes)

Download attachment "config-v3.13.gz" of type "application/x-gzip" (13164 bytes)

Download attachment "config-v3.14.gz" of type "application/x-gzip" (13298 bytes)

Download attachment "config-v3.15.gz" of type "application/x-gzip" (14686 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ