[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: kernel bug in linux-image-3.2.0-0.bpo.4-amd64



On Thu, 2012-12-27 at 12:44 +0100, Mattias wrote:
> Hi!
> 
> I have a VIA VB8001-16 motherboard running xen and when using
> linux-image-3.2.0-0.bpo.4-amd64 I can trigger a kernel oops in domU.
> I suspect that this is caused by the bug  
> corrected in commit a349e23d1cf746f8bdc603dcc61fae9ee4a695f6 upstream.
> But that is just my unqualified guess.
> 
> And for debian testing:
> 
> linux (3.2.35-1) unstable; urgency=low
>  .
>     * New upstream stable update:
>     ...
>     - [x86] xen: don't corrupt %eip when returning from a signal
> 	handler

This particular bug would cause a userland crash or other misbehaviour -
not a kernel oops.  Also I think it only affects i386 and not amd64.

> Sorry for the poor formatting, below:
> 
> [  854.826235] alignment check: 0000 [#1] SMP

Alignment check is surprising but could be introduced by the hypervisor.

[...]
> Does anyone know more about this, or have any advice how to debug this?
> I'm fairly capable (I think) of debugging code using gdb in userspace, never
> tried kernel gdb though.

Try asking on debian-kernel; we have at least one Xen developer reading.

Ben.

-- 
Ben Hutchings
The world is coming to an end.	Please log off.

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: