lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAO+szGtvxCo9he+pYjvMjVkMqBHLrXh6gNM4AHRYUWXQp_LnOw@mail.gmail.com>
Date:   Mon, 7 Oct 2019 15:57:50 +0100
From:   Francis M <fmcbra@...il.com>
To:     linux-kernel@...r.kernel.org
Cc:     torvalds@...ux-foundation.org
Subject: Decoding an oops

[Not subscribed to LKML so please Cc: me on replies if any]

Hello,

I've hit an oops in an Ubuntu 19.04 Server VirtualBox VM, running
Ubuntu's hacked-up version of (I think) 5.2.18, that's proving
difficult to fully capture.

Am in the process of trying to get the system back to a state where I
can boot into it cleanly and investigate further.

Alas a simple enabling of DHCPv6 in netplan's config for a single
network interface followed by "netplan apply && reboot" is what
triggered this oops and has bricked the VM. Copying over the VM's disc
images to a KVM host for further investigation but that'll annoyingly
take hours...

Attached is a JPEG of what I've been able to capture from the console.
I'm guessing it's probably not enough to go on, but hoping someone
might have an 'ahh, that looks familiar' moment.

Cheekily adding Linus to the Cc: on the off-chance; have admired your
opcode/register state demystifying skills from afar for many years.
Apologies in advance.

Failing that... I'll post back in few hours once I've been able to
grab the full oops.

Cheers,
Francis

Download attachment "ubuntu-5.x-oops-cropped.jpg" of type "image/jpeg" (189205 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ