lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <2198383E1141814486F0B881B3260CF501D6B58D@daebe103.NOE.Nokia.com>
Date:	Thu, 3 Jan 2008 17:59:50 -0600
From:	<Jayakrishnan.Chathu@...ia.com>
To:	<linux-kernel@...r.kernel.org>
Subject: kernel BUG at fs/buffer.c:1245!


Hi

I am running 2.6.23 kernel on i386. Sometimes during reboot or file read
write
I get this kernel crash. .config attached. 

kernel BUG at fs/buffer.c:1245!
invalid opcode: 0000 [#1]
SMP
Modules linked in: sfpacket(PF) e1000 adm1026 hwmon_vid noksf pld_drv
CPU:    2
EIP:    0060:[<c0186a86>]    Tainted: PF       VLI
EFLAGS: 00010002   (2.6.23.IPSO-LX-7.2-ALPHA05 #1)
EIP is at lookup_bh_lru+0x21/0x88
Dec 14 04:00:55 eax: 00000001   ebx: 00001000   ecx: 00000000   edx:
00038025
esi: 00038025   edi: 00038025   ebp: 00000000   esp: f7691e18
ds: 007b   es: 007b   fs: 00d8  gs: 0000  ss: 0068
Process httpd (pid: 3955, ti=f7690000 task=f64df500 task.ti=f7690000)
Stack: 00000000 f7e961c0 00001000 00038025 00000000 f7e961c0 c0186b06
00001000
       00001000 00038025 00000000 f7e961c0 c0186b4b 00001000 00001000
00000000
       f7660bd8 00000001 c01c8f83 00001000 00000001 00000002 00000001
00000000
Call Trace:
 [<c0186b06>] __find_get_block+0x19/0x45
 [<c0186b4b>] __getblk+0x19/0x40
 [<c01c8f83>] __ext3_get_inode_loc+0x52/0x223
 localhost [emer[<c01c99d2>] ext3_reserve_inode_write+0x19/0x5d
 [<c01cc6e2>] ext3_orphan_del+0x73/0x14b
 [<c01d3e72>] journal_start+0x86/0xb2
 [<c0186316>] invalidate_inode_buffers+0xe/0x99
 [<c01c67e0>] ext3_delete_inode+0x0/0xc1
 [<c01c6861>] ext3_delete_inode+0x81/0xc1
 [<c01c67e0>] ext3_delete_inode+0x0/0xc1
 [<c017b7e1>] generic_delete_inode+0x5b/0xc0
 [<c017b9cb>] iput+0x5b/0x5d
 [<c0178eaf>] d_kill+0x2d/0x41
 [<c0178fa2>] dput+0xdf/0xeb
 [<c016c17c>] __fput+0x12a/0x152
 [<c016ac19>] filp_close+0x4d/0x54
 [<c0129777>] close_files+0x46/0x5a
 [<c01297c4>] put_files_struct+0x15/0x3d
 [<c012a11d>] do_exit+0x1ee/0x35d
 [<c012a318>] sys_exit_group+0x0/0xd
 [<c0104e0e>] syscall_call+0x7/0xb
 [<c03f0000>] svcauth_unix_info_release+0x2/0x28
 =======================
Code: ff ff 83 c4 24 5b 5e 5f 5d c3 55 57 89 d7 56 53 55 55 89 cd 89 44
24 04 c7 04 24 00 00 00 00 9c 58 c1 e8 09 83 f0 01 a8 01 74 04 <0f> 0b
eb fe fa b8 20 63 60 c0 31 db 64 8b 15 04 51 60 c0 8d 34
EIP: [<c0186a86>] lookup_bh_lru+0x21/0x88 SS:ESP 0068:f7691e18

Entering kdb (current=0xf64df500, pid 3955) on processor 2 Oops: invalid
opcode
due to oops @ 0xc0186a86
eax = 0x00000001 ebx = 0x00001000 ecx = 0x00000000 edx = 0x00038025
esi = 0x00038025 edi = 0x00038025 esp = 0xf7691e18 eip = 0xc0186a86
ebp = 0x00000000 xss = 0xc0380068 xcs = 0x00000060 eflags = 0x00010002
xds = 0x1bbe007b xes = 0x0000007b origeax = 0xffffffff &regs =
0xf7691de0
[2]kdb> bt
Stack traceback for pid 3955
0xf64df500     3955     3784  1    2   R  0xf64df6e0 *httpd
esp        eip        Function (args)
kdb_bb: address 0xffffffff not recognised
Using old style backtrace, unreliable with no arguments
esp        eip        Function (args)
0xf7691e0c 0xc0186a86 lookup_bh_lru+0x21
0xf7691e30 0xc0186b06 __find_get_block+0x19
0xf7691e48 0xc0186b4b __getblk+0x19
0xf7691e60 0xc01c8f83 __ext3_get_inode_loc+0x52
0xf7691e9c 0xc01c99d2 ext3_reserve_inode_write+0x19
0xf7691eb0 0xc01cc6e2 ext3_orphan_del+0x73
0xf7691ec0 0xc01d3e72 journal_start+0x86
0xf7691ec8 0xc0186316 invalidate_inode_buffers+0xe
0xf7691ed8 0xc01c67e0 ext3_delete_inode
0xf7691eec 0xc01c6861 ext3_delete_inode+0x81
0xf7691ef0 0xc01c67e0 ext3_delete_inode
0xf7691efc 0xc017b7e1 generic_delete_inode+0x5b
0xf7691f08 0xc017b9cb iput+0x5b
0xf7691f10 0xc0178eaf d_kill+0x2d
0xf7691f1c 0xc0178fa2 dput+0xdf
0xf7691f24 0xc016c17c __fput+0x12a
[2]more>
0xf7691f4c 0xc016ac19 filp_close+0x4d
0xf7691f60 0xc0129777 close_files+0x46
0xf7691f78 0xc01297c4 put_files_struct+0x15
0xf7691f84 0xc012a11d do_exit+0x1ee
0xf7691fa4 0xc012a318 sys_exit_group
[2]kdb>


Thanks
Jayakrishnan Chathu

Download attachment "config" of type "application/octet-stream" (41411 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ