lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1531740497.15016.26.camel@abdul.in.ibm.com>
Date:   Mon, 16 Jul 2018 16:58:17 +0530
From:   Abdul Haleem <abdhalee@...ux.vnet.ibm.com>
To:     linuxppc-dev <linuxppc-dev@...ts.ozlabs.org>
Cc:     linux-next <linux-next@...r.kernel.org>,
        netdev <netdev@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        mpe <mpe@...erman.id.au>, sachinp <sachinp@...ux.vnet.ibm.com>,
        manvanth <manvanth@...ux.vnet.ibm.com>,
        netfilter-devel@...r.kernel.org,
        David Miller <davem@...emloft.net>, maurosr@...ux.vnet.ibm.com,
        muvic@...ibm.com
Subject: [next-20180713][NET] linux-next kernel panics when booting powerpc


Greeting's

Today's next kernel panics while booting powerpc

Machine: Power 8 Bare-metal
kernel : 4.18.0-rc4-next-20180713
test: Boot

boot messages:
--------------
Reached target Timers.
Started System Logging Service.
Started Dump dmesg to /var/log/dmesg.
Started Login Service.
Started Resets System Activity Logs.
Started GSSAPI Proxy Daemon.
Reached target NFS client services.
Started Authorization Manager.
Starting firewalld - dynamic firewall daemon...
Started Install ABRT coredump hook.
Started NTP client/server.
Started firewalld - dynamic firewall daemon.
Reached target Network (Pre).
Starting Network Manager...
Unable to handle kernel paging request for data at address 0xd000001ff5c31048
Faulting instruction address: 0xd000000011ca1a84
Oops: Kernel access of bad area, sig: 11 [#1]
LE SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in: iptable_filter dm_mirror dm_region_hash dm_log
vmx_crypto powernv_rng rng_core nfsd ip_tables x_tables autofs4 xfs
libcrc32c dm_service_time dm_multipath lpfc crc_t10dif crct10dif_generic
nvme_fc nvme_fabrics i40e nvme_core crct10dif_common
CPU: 113 PID: 12689 Comm: iptables Not tainted 4.18.0-rc4-next-20180713-autotest-autotest #1
NIP:  d000000011ca1a84 LR: d000000011ca19ac CTR: c0000000009d1e30
REGS: c000003c841838a0 TRAP: 0300   Not tainted  (4.18.0-rc4-next-20180713-autotest-autotest)
MSR:  9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE>  CR: 84008884  XER: 20000000
CFAR: d000000011ca19f4 DAR: d000001ff5c31048 DSISR: 40000000 IRQMASK: 0
GPR00: d000000011ca19ac c000003c84183b20 d000000011cac900 0000000000000000
GPR04: 0000000000000800 0000000000000000 000000008484018e 0000000000000001
GPR08: ffffffffffffffff c000000000d97000 c000001ff5c37000 d000000011ca3bd8
GPR12: c0000000009d1e30 c000003fff760100 0000000000000000 0000000010014f80
GPR16: 000001000b0d0010 00007fffb11804f0 00007fffe2306428 0000000000000000
GPR20: 0000000000000003 c000000001091ee0 c000001fc02ff040 0000000000000000
GPR24: c00000000108db70 0000000000000000 c000000001092214 d000001ff5c31048
GPR28: c000001fc02ff000 d000000013ba0000 0000000000000000 c000001fc02ff040
NIP [d000000011ca1a84] alloc_counters.isra.11+0x164/0x200 [ip_tables]
LR [d000000011ca19ac] alloc_counters.isra.11+0x8c/0x200 [ip_tables]
Call Trace:
[c000003c84183b20] [d000000011ca19ac] alloc_counters.isra.11+0x8c/0x200 [ip_tables] (unreliable)
[c000003c84183ba0] [d000000011ca2108] do_ipt_get_ctl+0x258/0x510 [ip_tables]
[c000003c84183c80] [c0000000008f7e20] nf_getsockopt+0x80/0xc0
[c000003c84183cd0] [c000000000907ec8] ip_getsockopt+0xc8/0x150
[c000003c84183d30] [c0000000009394f0] raw_getsockopt+0x40/0x80
[c000003c84183d50] [c00000000087b70c] sock_common_getsockopt+0x2c/0x40
[c000003c84183d70] [c000000000878394] __sys_getsockopt+0x84/0xf0
[c000003c84183dd0] [c00000000087b0d8] sys_socketcall+0x1f8/0x370
[c000003c84183e30] [c00000000000b9e4] system_call+0x5c/0x70
Instruction dump:
39290040 7fff5214 7d3c4a14 7fbf4840 409cff3c 813a0000 2b890001 395f0060 
409d0010 7d58c82a e93f0060 7d495214 <813b0000> 792807e1 41e2ff74 7c210b78 
---[ end trace 7f524609ba19346a ]---
Started Network Manager. 
Starting Network Manager Wait Online...
Starting Network Manager Script Dispatcher Service...
Started Network Manager Script Dispatcher Service. 
Starting Hostname Service...
Started Hostname Service. 
Unable to handle kernel paging request for data at address 0xd000001ff6b31048
Faulting instruction address: 0xd000000011ca02d0
Oops: Kernel access of bad area, sig: 11 [#2]
LE SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in: iptable_filter dm_mirror dm_region_hash dm_log
vmx_crypto powernv_rng rng_core nfsd ip_tables x_tables autofs4 xfs
libcrc32c dm_service_time dm_multipath lpfc crc_t10dif crct10dif_generic
nvme_fc nvme_fabrics i40e nvme_core crct10dif_common
CPU: 60 PID: 0 Comm: swapper/60 Tainted: G      D           4.18.0-rc4-next-20180713-autotest-autotest #1
NIP:  d000000011ca02d0 LR: d000000013b60088 CTR: d000000011ca01f0
REGS: c000001fffdd7630 TRAP: 0300   Tainted: G      D            (4.18.0-rc4-next-20180713-autotest-autotest)
MSR:  9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE>  CR: 44882082  XER: 00000000  
CFAR: d000000011ca06ec DAR: d000001ff6b31048 DSISR: 40000000 IRQMASK: 0 
GPR00: d000000013b60088 c000001fffdd78b0 d000000011cac900 c000001fccbf1500 
GPR04: c000001fffdd7a00 c000003ca37203c0 0000000000000002 0000000000000002
GPR08: 0000001ff5da0000 d000000000d91048 0000000000000300 d000000013b60328
GPR12: d000000011ca01f0 c000001ffffcd680 c000000000000000 c000003c7ffe0000
GPR16: 0000000000000000 0000000000000000 c000003c0540008e 0000000000000000
GPR20: 0000000000000001 0000000000000040 fffffffffffff000 d000000000d91048
GPR24: 0000000000000000 0000000000000000 0000000000000001 d000000011ca4f80
GPR28: c000001ff41bb000 c000001fccbf1500 c000003ca37001c0 0000000000000000
NIP [d000000011ca02d0] ipt_do_table+0xe0/0x540 [ip_tables]
LR [d000000013b60088] 0xd000000013b60088
Call Trace:
[c000001fffdd78b0] [c000000000be1480] str_spec.63223+0x139324/0x1af894 (unreliable)
[c000001fffdd7970] [d000000013b60088] 0xd000000013b60088
[c000001fffdd7990] [c0000000008f5678] nf_hook_slow+0x68/0x140
[c000001fffdd79e0] [c0000000008ff65c] ip_local_deliver+0xcc/0x130
[c000001fffdd7a40] [c0000000008ff0f8] ip_rcv_finish+0x58/0x80
[c000001fffdd7a70] [c0000000008ff70c] ip_rcv+0x4c/0x110
[c000001fffdd7ae0] [c00000000089e530] __netif_receive_skb_one_core+0x60/0x80
[c000001fffdd7b20] [c0000000008a6c10] netif_receive_skb_internal+0x30/0x110
[c000001fffdd7b60] [c0000000008a775c] napi_gro_receive+0x11c/0x1c0
[c000001fffdd7ba0] [d000000010255b00] i40e_napi_poll+0x890/0x18b0 [i40e]
[c000001fffdd7d00] [c0000000008a816c] net_rx_action+0x31c/0x490
[c000001fffdd7e10] [c0000000009f50ac] __do_softirq+0x15c/0x3b4
[c000001fffdd7f00] [c0000000000fabf8] irq_exit+0xf8/0x110
[c000001fffdd7f20] [c000000000016fb8] __do_irq+0x98/0x200
[c000001fffdd7f90] [c000000000028964] call_do_irq+0x14/0x24
[c000001fed713a50] [c0000000000171b4] do_IRQ+0x94/0x110
[c000001fed713aa0] [c000000000008db8] hardware_interrupt_common+0x158/0x160
--- interrupt: 501 at replay_interrupt_return+0x0/0x4
    LR = arch_local_irq_restore+0x74/0x90
[c000001fed713d90] [c00000000083ec0c] menu_select+0x7c/0x790 (unreliable)
[c000001fed713db0] [c00000000083cbd8] cpuidle_enter_state+0x108/0x3c0
[c000001fed713e10] [c0000000001336e4] call_cpuidle+0x44/0x80
[c000001fed713e30] [c000000000133c78] do_idle+0x2f8/0x3a0
[c000001fed713ec0] [c000000000133ef0] cpu_startup_entry+0x30/0x40
[c000001fed713ef0] [c000000000044024] start_secondary+0x4d4/0x520
[c000001fed713f90] [c00000000000b270] start_secondary_prolog+0x10/0x14
Instruction dump:
f8810030 554a16ba 9141003c 0b090000 78290464 8149000c 394a0200 9149000c
e90d0030 3ee20000 eaf78008 7ee9bb78 <7ce9402e> 3b070001 571807fe 7ce7c214
---[ end trace 7f524609ba19346b ]---

Kernel panic - not syncing: Fatal exception in interrupt


-- 
Regard's

Abdul Haleem
IBM Linux Technology Centre



View attachment "Hab-NV-config_with_NVMe" of type "text/plain" (88351 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ