lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87r08zvsdd.fsf@debian-BULLSEYE-live-builder-AMD64>
Date: Wed, 02 Oct 2024 13:24:19 +0530
From: Chandan Babu R <chandanbabu@...nel.org>
To: linux-kernel@...r.kernel.org
Cc: Carlos Maiolino <cem@...nel.org>, mingo@...hat.com,
 peterz@...radead.org, juri.lelli@...hat.com, vincent.guittot@...aro.org,
 dietmar.eggemann@....com, rostedt@...dmis.org, bsegall@...gle.com,
 mgorman@...e.de, vschneid@...hat.com, Darrick J. Wong <djwong@...nel.org>
Subject: [BUG REPORT] v6.12-rc1 kernel crashes intermittently

Hi,

v6.12-rc1 crashes intermittently on an Oracle cloud instance during boot
sequence. The following call trace is printed on the console,

[   49.052832] fbcon: Taking over console
[   49.052839] BUG: spinlock recursion on CPU#3, systemd/2480
[   49.052844]  lock: 0xffff8883ef3c6840, .magic: dead4ead, .owner: systemd/2480, .owner_cpu: 3
[   49.052854] CPU: 3 UID: 982 PID: 2480 Comm: systemd Not tainted 6.12.0-rc1+ #1
[   49.052861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.6.4 02/27/2023
[   49.052864] Call Trace:
[   49.052868]  <TASK>
[   49.052871]  dump_stack_lvl+0x66/0x80
[   49.052882]  do_raw_spin_lock+0x214/0x270
[   49.052915]  raw_spin_rq_lock_nested+0x24/0x130
[   49.052923]  try_to_wake_up+0x64c/0x1180
[   49.052949]  kick_pool+0x174/0x500
[   49.052963]  __queue_work.part.0+0x4cf/0x9e0
[   49.052977]  queue_work_on+0x73/0x80
[   49.052984]  fbcon_output_notifier+0xa5/0x130
[   49.052996]  notifier_call_chain+0xc6/0x280
[   49.053005]  vt_console_print+0x8c9/0xd20
[   49.053040]  console_emit_next_record+0x23d/0x410
[   49.053063]  console_flush_all+0x30b/0x4c0
[   49.053088]  console_unlock+0xa3/0x150
[   49.053149]  vprintk_emit+0x1e8/0x230
[   49.053177]  _printk+0xb7/0xf0
[   49.053204]  __warn_printk+0x190/0x1e0
[   49.053236]  unthrottle_cfs_rq+0xfed/0x1440
[   49.053250]  __cfsb_csd_unthrottle+0x29d/0x430
[   49.053263]  __flush_smp_call_function_queue+0x26e/0x900
[   49.053273]  __sysvec_call_function_single+0x20/0x1a0
[   49.053280]  sysvec_call_function_single+0x33/0x90
[   49.053288]  asm_sysvec_call_function_single+0x1a/0x20
[   49.053294] RIP: 0033:0x7ffa7a196c0d
[   49.053300] Code: 07 48 89 fd 49 89 f4 48 89 d3 48 85 c0 74 2e 48 85 d2 75 09 5b 5d 41 5c c3 0f 1f 40 00 48 89 c7 e8 08 78 ee ff 31 d2 48 f7 f3 <4c> 39 e0 73 4e 4d 85 e4 79 79 5b 31 c0 5d 41 5c c3 66 90 48 85 f6
[   49.053305] RSP: 002b:00007fff8ac85190 EFLAGS: 00000212
[   49.053312] RAX: 0000000000000048 RBX: 0000000000000001 RCX: 0000000000000000
[   49.053316] RDX: 0000000000000000 RSI: 0000000000000017 RDI: 00005645cc6459f0
[   49.053319] RBP: 00007fff8ac851e0 R08: 0000000000000001 R09: 00000000ffffffff
[   49.053323] R10: 00005645cc66eb20 R11: 85ba68c3b059f779 R12: 0000000000000017
[   49.053327] R13: 00005645cc66ac80 R14: 0000000000000000 R15: 00007fff8ac851df
[   49.053335]  </TASK>

I am also attaching the corresponding kernel build config file along with this
mail.


View attachment "config" of type "text/plain" (175579 bytes)


-- 
Chandan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ