lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5d7bd9aa-3456-cda8-ecaf-87a75daf56e9@linux.vnet.ibm.com>
Date:   Fri, 4 Aug 2023 12:35:00 +0530
From:   Tasmiya Nalatwad <tasmiya@...ux.vnet.ibm.com>
To:     linux-kernel@...r.kernel.org, linux-block@...r.kernel.org,
        abdhalee@...ux.vnet.ibm.com, mputtash@...ux.vnet.com,
        sachinp@...ux.vnet.com,
        Tasmiya Nalatwad <tasmiya@...ux.vnet.ibm.com>
Subject: [linux-next] [Mellanox] [6.5.0-rc4-next-20230803] Kernel crash while
 installing to upstream kernel

Greetings,

[linux-next] [Mellanox] [6.5.0-rc4-next-20230803] Kernel crash while 
installing to upstream kernel

---Traces---

[  216.663025] BUG: Unable to handle kernel data access at 
0x6800000005a01500
[  216.663034] Faulting instruction address: 0xc000000000531654
[  216.663039] Oops: Kernel access of bad area, sig: 11 [#1]
[  216.663041] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
[  216.663046] Modules linked in: pseries_rng vmx_crypto binfmt_misc 
ext4 mbcache jbd2 dm_service_time sd_mod t10_pi crc64_rocksoft crc64 sg 
ibmvfc scsi_transport_fc ibmveth mlx5_core mlxfw psample dm_multipath 
dm_mirror dm_region_hash dm_log dm_mod fuse
[  216.663067] CPU: 8 PID: 1035 Comm: systemd-cgroups Not tainted 
6.5.0-rc4-next-20230803-auto #1
[  216.663072] Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 
0xf000006 of:IBM,FW1030.20 (NH1030_047) hv:phyp pSeries
[  216.663076] NIP:  c000000000531654 LR: c000000000531538 CTR: 
0000000000000000
[  216.663078] REGS: c00000000da5f7a0 TRAP: 0380   Not tainted 
(6.5.0-rc4-next-20230803-auto)
[  216.663082] MSR:  8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 
28022848  XER: 00000000
[  216.663090] CFAR: c000000000531540 IRQMASK: 0
[  216.663090] GPR00: c000000000531538 c00000000da5fa40 c000000001451c00 
0000000000000000
[  216.663090] GPR04: 0000000000000cc0 0000000000000008 00000000000016c5 
6800000005a01500
[  216.663090] GPR08: 00000000000016c4 0000000000000010 42f6d0d03e938537 
c000000005a0b8d8
[  216.663090] GPR12: 0000000000000000 c0000018ffff5700 0000000000000000 
0000000000000000
[  216.663090] GPR16: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000
[  216.663090] GPR20: c00000000da5fcc0 c00000000da5fd00 c00000000da5fcb8 
0000000000000001
[  216.663090] GPR24: c00000000a709580 0000000000000000 c0000000001589e0 
0000000000000028
[  216.663090] GPR28: 0000000000000cc0 0000000000000cc0 6800000005a014f0 
c000000003019a00
[  216.663127] NIP [c000000000531654] kmem_cache_alloc+0x1c4/0x470
[  216.663134] LR [c000000000531538] kmem_cache_alloc+0xa8/0x470
[  216.663137] Call Trace:
[  216.663139] [c00000000da5fa40] [c000000000531538] 
kmem_cache_alloc+0xa8/0x470 (unreliable)
[  216.663144] [c00000000da5fab0] [c0000000001589e0] vm_area_dup+0x70/0x110
[  216.663149] [c00000000da5faf0] [c0000000004bc190] __split_vma+0xc0/0x880
[  216.663153] [c00000000da5fbb0] [c0000000004c3c14] 
mprotect_fixup+0x304/0x3c0
[  216.663158] [c00000000da5fc90] [c0000000004c4038] 
do_mprotect_pkey+0x368/0x5c0
[  216.663162] [c00000000da5fdf0] [c0000000004c42c0] sys_mprotect+0x30/0x40
[  216.663166] [c00000000da5fe10] [c000000000036554] 
system_call_exception+0x134/0x330
[  216.663171] [c00000000da5fe50] [c00000000000d6a0] 
system_call_common+0x160/0x2e4
[  216.663177] --- interrupt: c00 at 0x7fff9cd89db4
[  216.663180] NIP:  00007fff9cd89db4 LR: 00007fff9cd70c9c CTR: 
0000000000000000
[  216.663183] REGS: c00000000da5fe80 TRAP: 0c00   Not tainted 
(6.5.0-rc4-next-20230803-auto)
[  216.663186] MSR:  800000000280f033 
<SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE>  CR: 24022248  XER: 00000000
[  216.663195] IRQMASK: 0
[  216.663195] GPR00: 000000000000007d 00007ffffadf2600 00007fff9cdb7e00 
00007fff9c5f0000
[  216.663195] GPR04: 0000000000010000 0000000000000001 000000000000000b 
00007fff9c5ff170
[  216.663195] GPR08: 00000000001fc1a8 0000000000000000 0000000000000000 
0000000000000000
[  216.663195] GPR12: 0000000000000000 00007fff9cdc5ed0 00007fff9c4120a0 
00007fff9cdb2ef8
[  216.663195] GPR16: 00007fff9c403fd0 00007ffffadf26d0 000000000000fff1 
00007ffffadf26d0
[  216.663195] GPR20: 00007fff9c41848c 0000000000000000 00007fff9c600070 
00007fff9c400000
[  216.663195] GPR24: 0000000000200070 0000000000000015 00007fff9c411f20 
000000000000df50
[  216.663195] GPR28: 0000094e00000015 00007fff9cdb2b70 0000000000000000 
00007fff9cdb2b70
[  216.663230] NIP [00007fff9cd89db4] 0x7fff9cd89db4
[  216.663233] LR [00007fff9cd70c9c] 0x7fff9cd70c9c
[  216.663235] --- interrupt: c00
[  216.663236] Code: 7ce95214 e9070008 7fc9502a e9270010 2fbe0000 
419e01f8 2fa90000 419e01f0 813f0028 e95f00b8 38c80001 7cfe4a14 
<7d3e482a> 78e50022 54fdc03e 54a4c03e
[  216.663249] ---[ end trace 0000000000000000 ]---


-- 
Regards,
Tasmiya Nalatwad
IBM Linux Technology Center

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ