lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 20 Jul 2007 09:23:51 +0530
From:	"Satyam Sharma" <satyam.sharma@...il.com>
To:	werner <werner@...aya.yi.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Kernel Error / Crash

Hi Werner,

On 7/20/07, werner <werner@...aya.yi.org> wrote:
> To: linux-kernel@...r.kernel.org
>
>
> copied from the screen:
>
> ...
> proc on /proc type proc (rw)
> sysfs on /sys type sysfs (rw)
> Starting udevd: /sbin/udevd -- daemon
> ------------[cut here]-------------------
> Kernel BUG at mm/slub.c:2401!

That's ksize(invalid_address) -- when the address belongs to an
!PageSlab page.

> Invalid opcode: 0000[#1]
> SMP
> Modules linked in:
> CPU: 0
> EIP: 0060: [<c0174ec0>]   Not tainted VLI
> EFLAGS:  00010046  (2.6.22-git13-i486-1mn #1)

Why is the kernel called -git13-i486-1mn (the -1mn part)?

Is this a pure vanilla kernel or do you have additional patches
applied on top of that?

> EIP is at ksize + 0x40/0x50

Hmm. This could be from krealloc(), but that's just a wild guess.

>   .....

Please send us the entire oops log (including the registers contents,
stack backtrace, "Code:" thing, et al.) -- it's *impossible* to debug
this case, otherwise.

> Obs:  With 2.6.22-git11 that problem didnt occur
>
> Werner Landgraf
> werner@...aya.yi.org


Thanks,

Satyam
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ