lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3b284689aaa1573610c0e388e66e756a@eikelenboom.it>
Date:	Sat, 15 Aug 2015 00:09:15 +0200
From:	Sander Eikelenboom <linux@...elenboom.it>
To:	Eric Dumazet <eric.dumazet@...il.com>
Cc:	David Miller <davem@...emloft.net>, linux-kernel@...r.kernel.org,
	netdev@...r.kernel.org, xen-devel@...ts.xen.org,
	david.vrabel@...rix.com
Subject: Re: Linux 4.2-rc6 regression: RIP: e030:[<ffffffff8110fb18>]
 [<ffffffff8110fb18>] detach_if_pending+0x18/0x80

On 2015-08-13 00:41, Eric Dumazet wrote:
> On Wed, 2015-08-12 at 23:46 +0200, Sander Eikelenboom wrote:
> 
>> Thanks for the reminder, but luckily i was aware of that,
>> seen enough of your replies asking for patches to be resubmitted
>> against "the other tree" ;)
>> Kernel with patch is currently running so fingers crossed.
> 
> Thanks for testing. I am definitely interested knowing your results.

Hmm it seems now commit 83fccfc3940c4a2db90fd7e7079f5b465cd8c6af is 
breaking things
(have to test if a revert helps) i get this in some guests:

NMI watchdog: BUG: soft lockup - CPU#0 stuck for 506s! [swapper/0:0]
[ 6620.282805] Modules linked in:
[ 6620.282805] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 
4.2.0-rc6-20150814-linus-doflr-apicrevert+ #1
[ 6620.282805] task: ffffffff8221a580 ti: ffffffff82200000 task.ti: 
ffffffff82200000
[ 6620.282805] RIP: e030:[<ffffffff8100122a>]  [<ffffffff8100122a>] 
xen_hypercall_xen_version+0xa/0x20
[ 6620.282805] RSP: e02b:ffff88000fc03d48  EFLAGS: 00000246
[ 6620.282805] RAX: 0000000000040006 RBX: 0000000000000200 RCX: 
ffffffff8100122a
[ 6620.282805] RDX: 0000000000000001 RSI: 00000000deadbeef RDI: 
00000000deadbeef
[ 6620.282805] RBP: ffff88000fc03d60 R08: ffff88000fc03ee0 R09: 
00000000000000ee
[ 6620.282805] R10: ffffffff8220a0c0 R11: 0000000000000246 R12: 
00000000ffffffff
[ 6620.282805] R13: 0000000000000001 R14: ffff880003b53054 R15: 
0000000000000005
[ 6620.282805] FS:  00007fec747ad800(0000) GS:ffff88000fc00000(0000) 
knlGS:0000000000000000
[ 6620.282805] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 6620.282805] CR2: 00007ffcb7a7a6d8 CR3: 0000000003164000 CR4: 
0000000000000660
[ 6620.282805] Stack:
[ 6620.282805]  0000000000000068 0000000000000007 ffffffff81008dbd 
ffff88000fc03dd8
[ 6620.282805]  ffffffff81009592 0000000000000068 ffffffff8220a0c0 
00000000000000ee
[ 6620.282805]  ffff88000fc03ee0 0000000000000200 0000000000000200 
0000000000000001
[ 6620.282805] Call Trace:
[ 6620.282805]  <IRQ>
[ 6620.282805]  [<ffffffff81008dbd>] ? 
xen_force_evtchn_callback+0xd/0x10
[ 6620.282805]  [<ffffffff81009592>] check_events+0x12/0x20
[ 6620.282805]  [<ffffffff8100957f>] ? 
xen_restore_fl_direct_reloc+0x4/0x4
[ 6620.282805]  [<ffffffff81af79a5>] ? 
_raw_spin_unlock_irqrestore+0x25/0x30
[ 6620.282805]  [<ffffffff8110ed43>] try_to_del_timer_sync+0x43/0x60
[ 6620.282805]  [<ffffffff8110eda7>] del_timer_sync+0x47/0x60
[ 6620.282805]  [<ffffffff81a2b698>] 
inet_csk_reqsk_queue_drop+0x118/0x1f0
[ 6620.282805]  [<ffffffff81a2b8c6>] reqsk_timer_handler+0x156/0x260
[ 6620.282805]  [<ffffffff81a2b770>] ? 
inet_csk_reqsk_queue_drop+0x1f0/0x1f0
[ 6620.282805]  [<ffffffff8110f3c7>] call_timer_fn.isra.27+0x17/0x80
[ 6620.282805]  [<ffffffff81a2b770>] ? 
inet_csk_reqsk_queue_drop+0x1f0/0x1f0
[ 6620.282805]  [<ffffffff8110f55d>] run_timer_softirq+0x12d/0x200
[ 6620.282805]  [<ffffffff810ca6c3>] __do_softirq+0x103/0x210
[ 6620.282805]  [<ffffffff810ca9cb>] irq_exit+0x4b/0xa0
[ 6620.282805]  [<ffffffff814f05d4>] xen_evtchn_do_upcall+0x34/0x50
[ 6620.282805]  [<ffffffff81af932e>] 
xen_do_hypervisor_callback+0x1e/0x40
[ 6620.282805]  <EOI>
[ 6620.282805]  [<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[ 6620.282805]  [<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[ 6620.282805]  [<ffffffff81008d60>] ? xen_safe_halt+0x10/0x20
[ 6620.282805]  [<ffffffff810188d3>] ? default_idle+0x13/0x20
[ 6620.282805]  [<ffffffff81018e1a>] ? arch_cpu_idle+0xa/0x10
[ 6620.282805]  [<ffffffff810f8e7e>] ? default_idle_call+0x2e/0x50
[ 6620.282805]  [<ffffffff810f9112>] ? cpu_startup_entry+0x272/0x2e0
[ 6620.282805]  [<ffffffff81ae7967>] ? rest_init+0x77/0x80
[ 6620.282805]  [<ffffffff82312f58>] ? start_kernel+0x43b/0x448
[ 6620.282805]  [<ffffffff823124ef>] ? 
x86_64_start_reservations+0x2a/0x2c
[ 6620.282805]  [<ffffffff82316008>] ? xen_start_kernel+0x550/0x55c
[ 6620.282805] Code: cc 51 41 53 b8 10 00 00 00 0f 05 41 5b 59 c3 cc cc 
cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 51 41 53 b8 11 00 00 00 
0f 05 <41> 5b 59 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ