lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <84144f020910181935q4aed9f0dx7a8a149d8b8743c7@mail.gmail.com>
Date:	Mon, 19 Oct 2009 05:35:20 +0300
From:	Pekka Enberg <penberg@...helsinki.fi>
To:	Yinghai Lu <yhlu.kernel@...il.com>
Cc:	Ingo Molnar <mingo@...e.hu>, David Miller <davem@...emloft.net>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: nfs mount fail

Hi,

On Sun, Oct 18, 2009 at 4:25 AM, Yinghai Lu <yhlu.kernel@...il.com> wrote:
> mpk12-3214-189-144:~ # cat x
> mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
>
> mpk12-3214-189-144:~ # sh x
>
> [  278.734149] ------------[ cut here ]------------
> [  278.739620] kernel BUG at mm/slub.c:2969!

So this means that someone is passing a pointer to kfree() that did
not come from kmalloc(). Which tree are you testing?

> [  278.743056] invalid opcode: 0000 [#1] SMP
> [  278.750365] last sysfs file: /sys/devices/virtual/net/sit0/type
> [  278.755898] CPU 0
> [  278.758637] Modules linked in:
> [  278.770030] Pid: 2594, comm: rpciod/0 Not tainted
> 2.6.32-rc5-tip-01483-ga166936-dirty #651
> [  278.788458] RIP: 0010:[<ffffffff81174437>]  [<ffffffff81174437>]
> kfree+0x96/0x14a
> [  278.797545] RSP: 0018:ffff88087b9fdc50  EFLAGS: 00010246
> [  278.810035] RAX: 0a00000000000000 RBX: 0000000000037803 RCX: ffff880854828018
> [  278.815372] RDX: ffffea0000000000 RSI: 0000000000000378 RDI: ffff881800706475
> [  278.832711] RBP: ffff88087b9fdc90 R08: ffff88084d37ce80 R09: 00000000e3115a3e
> [  278.848764] R10: 00000000ffffe0be R11: 0000000000000000 R12: ffffea009c02da70
> [  278.852385] R13: ffff881800706475 R14: ffff88084439d680 R15: 0000000000000001
> [  278.872750] FS:  0000000000000000(0000) GS:ffff88003fc00000(0000)
> knlGS:0000000000000000
> [  278.889379] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
> [  278.895226] CR2: 00007fcb2369c000 CR3: 0000000848df0000 CR4: 00000000000026f0
> [  278.911157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  278.916692] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [  278.934540] Process rpciod/0 (pid: 2594, threadinfo
> ffff88087b9fc000, task ffff88087bdc2370)
> [  278.950913] Stack:
> [  278.952455]  ffff88087913e934 ffff88087747e048 00000000e3115a3e
> 0000000000037803
> [  278.969335] <0> ffff880854828000 ffff88084d37ce80 ffff88084439d680
> 0000000000000001
> [  278.976115] <0> ffff88087b9fdcc0 ffffffff81dae6d8 ffffffff81dbb5d5
> 00000000e3115a3e
> [  278.995869] Call Trace:
> [  278.997442]  [<ffffffff81dae6d8>] xs_set_port+0x73/0xa3
> [  279.011219]  [<ffffffff81dbb5d5>] ? rpcb_dec_getport+0x0/0xc2
> [  279.016461]  [<ffffffff81dbb4ac>] rpcb_getport_done+0x80/0xdb
> [  279.030585]  [<ffffffff81db1cbf>] rpc_exit_task+0x3b/0x7f
> [  279.033790]  [<ffffffff81db24a9>] __rpc_execute+0x97/0x251
> [  279.051120]  [<ffffffff81db26e2>] rpc_async_schedule+0x28/0x3e
> [  279.057205]  [<ffffffff810bbe9c>] worker_thread+0x1fa/0x317
> [  279.071181]  [<ffffffff810bbe42>] ? worker_thread+0x1a0/0x317
> [  279.075343]  [<ffffffff81db26ba>] ? rpc_async_schedule+0x0/0x3e
> [  279.092033]  [<ffffffff810c26c8>] ? autoremove_wake_function+0x0/0x63
> [  279.100028]  [<ffffffff810bbca2>] ? worker_thread+0x0/0x317
> [  279.112094]  [<ffffffff810c2277>] kthread+0x9d/0xa5
> [  279.116720]  [<ffffffff8104205a>] child_rip+0xa/0x20
> [  279.133457]  [<ffffffff810419fc>] ? restore_args+0x0/0x30
> [  279.137271]  [<ffffffff810c21da>] ? kthread+0x0/0xa5
> [  279.149933]  [<ffffffff81042050>] ? child_rip+0x0/0x20
> [  279.154086] Code: 00 00 00 00 00 ea ff ff 48 6b c0 68 4c 8d 24 10
> 66 41 83 3c 24 00 79 05 4d 8b 64 24 10 49 8b 04 24 84 c0 78 17 66 a9
> 00 c0 75 04 <0f> 0b eb fe 4c 89 e7 e8 87 b8 fc ff e9 80 00 00 00 48 8b
> 45 08
> [  279.198800] RIP  [<ffffffff81174437>] kfree+0x96/0x14a
> [  279.204063]  RSP <ffff88087b9fdc50>
> [  279.210307] ---[ end trace 52f0b2ff8e4dec91 ]---
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  278.734149] ------------[ cut here ]------------
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  278.743056] invalid opcode: 0000 [#1] SMP
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  278.750365] last sysfs file:
> /sys/devices/virtual/net/sit0/type
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  278.950913] Stack:
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  278.995869] Call Trace:
>
> Message from syslogd@...12-3214-189-144 at Sat Oct 17 18:23:40 2009 ...
> mpk12-3214-189-144 kernel: [  279.154086] Code: 00 00 00 00 00 ea ff
> ff 48 6b c0 68 4c 8d 24 10 66 41 83 3c 24 00 79 05 4d 8b 64 24 10 49
> 8b 04 24 84 c0 78 17 66 a9 00 c0 75 04 <0f> 0b eb fe 4c 89 e7 e8 87 b8
> fc ff e9 80 00 00 00 48 8b 45 08
>
> mount.nfs: mount system call failed
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ