lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46BB3A2A.9010703@googlemail.com>
Date:	Thu, 09 Aug 2007 18:00:42 +0200
From:	Michal Piotrowski <michal.k.k.piotrowski@...il.com>
To:	Hugh Dickins <hugh@...itas.com>
CC:	Mariusz Kozlowski <m.kozlowski@...land.pl>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Nick Piggin <npiggin@...e.de>, linux-kernel@...r.kernel.org
Subject: Re: 2.6.23-rc2-mm1: kernel BUG at mm/swap_state.c:78!

Hugh Dickins pisze:
> On Thu, 9 Aug 2007, Mariusz Kozlowski wrote:
>> Hello,
>>
>> 	Nothing unusual happening, allmodconfig compiling etc.
>> Not sure why it says kernel was tainted though ... hmmm.
>>
>> ------------[ cut here ]------------
>> kernel BUG at mm/swap_state.c:78!
>> invalid opcode: 0000 [#1]
>> PREEMPT 
>> Modules linked in: orinoco_cs orinoco hermes pl2303 usbserial pcmcia 8250_pci 8250 serial_core yenta_socket rsrc_nonstatic pcmcia_core 8139too
>> CPU:    0
>> EIP:    0060:[<c01504b7>]    Tainted: P        VLI
>> EFLAGS: 00010246   (2.6.23-rc2-mm1 #1)
>> EIP is at __add_to_swap_cache+0xc6/0xd7
>> eax: 40000000   ebx: c11285c0   ecx: 000000d0   edx: 00000283
>> esi: c11285c0   edi: 00000283   ebp: c1858f90   esp: c1858f84
>> ds: 007b   es: 007b   fs: 0000  gs: 0000  ss: 0068
>> Process kprefetchd (pid: 236, ti=c1858000 task=c18d14d0 task.ti=c1858000)
>> Stack: 00000283 c11285c0 c3d5a3c8 c1858fa0 c01504ea c11285c0 00000000 c1858fcc 
>>        c015307c 00000001 00000007 00000002 00000002 00000283 00000000 fffffffc 
>>        00000000 c0152d5c c1858fe0 c0127f2e c0127ef8 00000000 00000000 00000000 
>> Call Trace:
>>  [<c010456a>] show_trace_log_lvl+0x1a/0x30
>>  [<c0104629>] show_stack_log_lvl+0xa9/0xd5
>>  [<c010486e>] show_registers+0x219/0x38d
>>  [<c0104ae6>] die+0x104/0x23e
>>  [<c0419bd3>] do_trap+0x83/0xad
>>  [<c0104edf>] do_invalid_op+0x88/0x92
>>  [<c04199b2>] error_code+0x6a/0x70
>>  [<c01504ea>] add_to_swap_cache+0x22/0x58
>>  [<c015307c>] kprefetchd+0x320/0x364
>>  [<c0127f2e>] kthread+0x36/0x58
>>  [<c0104233>] kernel_thread_helper+0x7/0x14
>>  =======================
>> INFO: lockdep is turned off.
>> Code: 0f 89 7b 0c 83 05 fc c9 53 c0 01 8b 13 c1 ea 1e 8d 04 12 01 d0 c1 e0 03 29 d0 c1 e0 05 ff 80 b8 c0 53 c0 ff 05 34 1d 68 c0 eb 96 <0f> 0b eb fe 0f 0b eb fe 0f 0b eb fe 8b 53 0c eb be 55 89 e5 56 
>> EIP: [<c01504b7>] __add_to_swap_cache+0xc6/0xd7 SS:ESP 0068:c1858f84
> 

The same issue here.

> Don't worry about reproducing untainted, I got the same earlier
> and was just preparing and testing the hotfix: here it is...
> 

Thanks for the patch.

Regards,
Michal

-- 
LOG
http://www.stardust.webpages.pl/log/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ