lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 13 Nov 2018 21:58:06 -0500
From:   Qian Cai <cai@....us>
To:     linux kernel <linux-kernel@...r.kernel.org>
Cc:     catalin Marinas <catalin.marinas@....com>,
        linuxppc-dev@...ts.ozlabs.org
Subject: Unable to handle kernel paging request for data at address
 0xc000000001da0000

Running some container workloads on an IBM power9 server with the latest mainline (rc2) triggered this,

[ 1283.894167] Unable to handle kernel paging request for data at address 0xc000000001da0000
[ 1283.894215] Faulting instruction address: 0xc000000000487ab8
[ 1283.894223] Oops: Kernel access of bad area, sig: 11 [#1]
[ 1283.894227] LE SMP NR_CPUS=2048 DEBUG_PAGEALLOC NUMA pSeries
[ 1283.894235] Modules linked in: nf_conntrack_netlink xt_mark tun udp_diag tcp_diag inet_diag netlink_diag af_packet_diag unix_diag nft_chain_nat_ipv6 nf_nat_ipv6 xt_conntrack ipt_MASQUERADE nft_counter xt_comment nft_compat nft_chain_nat_ipv4 nf_nat_ipv4 nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables veth bridge stp llc nfnetlink overlay sg pseries_rng xfs libcrc32c sd_mod ibmvscsi ibmveth scsi_transport_srp dm_mirror dm_region_hash dm_log dm_mod
[ 1283.894275] CPU: 0 PID: 226 Comm: kmemleak Kdump: loaded Not tainted 4.20.0-rc2+ #1
[ 1283.894281] NIP:  c000000000487ab8 LR: c000000000487ab0 CTR: 0000000000000000
[ 1283.894287] REGS: c0000005e94f3970 TRAP: 0300   Not tainted  (4.20.0-rc2+)
[ 1283.894291] MSR:  800000010280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE,TM[E]>  CR: 24000822  XER: 00000000
[ 1283.894302] CFAR: c000000000487a04 DAR: c000000001da0000 DSISR: 40000000 IRQMASK: 1 
GPR00: c000000000487ab0 c0000005e94f3bf8 c000000001c93400 0000000000000000 
GPR04: c0000005d9380a90 0000000000000001 00000000e7d83172 c0000005d9380a90 
GPR08: 0000000078811199 c0000005f1665ac8 c0000005d9380080 fffffffffce6b398 
GPR12: 0000000000000000 c000000002de0000 c0000000001717b8 c0000005efa49ab8 
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 
GPR20: 0000000000000000 0000000000000000 0000000000000000 c000000001b85220 
GPR24: c00000046a1d8848 c00000046a1d1b88 0000000000000000 0000000000000000 
GPR28: c000000001da0ff9 c000000000f3b620 c000000001b85108 c000000001da0000 
[ 1283.894352] NIP [c000000000487ab8] scan_block+0xa8/0x190
[ 1283.894357] LR [c000000000487ab0] scan_block+0xa0/0x190
[ 1283.894361] Call Trace:
[ 1283.894365] [c0000005e94f3bf8] [c000000000487ab0] scan_block+0xa0/0x190 (unreliable)
[ 1283.894372] [c0000005e94f3c58] [c000000000487c00] scan_large_block+0x60/0xa0
[ 1283.894378] [c0000005e94f3c98] [c00000000048857c] kmemleak_scan+0x24c/0xa10
[ 1283.894384] [c0000005e94f3d48] [c000000000489960] kmemleak_scan_thread+0xec/0x12c
[ 1283.894391] [c0000005e94f3db8] [c00000000017196c] kthread+0x1bc/0x1d0
[ 1283.894397] [c0000005e94f3e28] [c00000000000b860] ret_from_kernel_thread+0x5c/0x7c
[ 1283.894402] Instruction dump:
[ 1283.894408] 7fa3eb78 4883847d 60000000 60000000 60000000 60000000 3bff0008 7fbcf840 
[ 1283.894416] 409d00b8 4bfffeed 2fa30000 409e00ac <e87f0000> e93e0108 7fa91840 419dffdc 
[ 1283.894425] ---[ end trace 8e9576ac10ae13a1 ]---
[ 1283.897274] 
[ 1283.897288] Sending IPI to other CPUs
[ 1285.021354] IPI complete
[ 1285.042568] kexec: Starting switchover sequence.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ