lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFLxGvy0PHZHVL9rZx_0oFGobKftPBc0EN3VEyzNqvg13FUEfw@mail.gmail.com>
Date:	Wed, 9 May 2012 14:37:31 +0200
From:	richard -rw- weinberger <richard.weinberger@...il.com>
To:	LKML <linux-kernel@...r.kernel.org>
Cc:	linux-mm@...ck.org, Andrew Morton <akpm@...ux-foundation.org>,
	cl@...ux.com
Subject: BUG at mm/slub.c:374

A few minutes ago I saw this BUG within one of my KVM machines.
Config is attached.
There are a few UBI related commits on top of this Kernel but UBI was disabled
while this BUG occurred.

------------[ cut here ]------------
[   50.245008] kernel BUG at mm/slub.c:374!
[   50.245008] invalid opcode: 0000 [#1] SMP
[   50.245008] CPU 0
[   50.245008] Pid: 944, comm: udevd Not tainted 3.4.0-rc5+ #40 Bochs Bochs
[   50.245008] RIP: 0010:[<ffffffff8110e2db>]  [<ffffffff8110e2db>]
deactivate_slab+0x58b/0x5f0
[   50.245008] RSP: 0018:ffff88001e3d7b20  EFLAGS: 00010202
[   50.245008] RAX: 0000000000000282 RBX: ffff88001d9da370 RCX: 0000000180170016
[   50.245008] RDX: 0000000180170017 RSI: 0000000000000000 RDI: ffff88001f80ec00
[   50.245008] RBP: ffff88001e3d7c20 R08: 0000000000000003 R09: 0000000000000000
[   50.245008] R10: 0000000000000002 R11: 0000000000013340 R12: ffffea0000767680
[   50.245008] R13: ffff88001f80ec00 R14: 0000000000000000 R15: ffff88001d9da420
[   50.245008] FS:  00007f59f9dea7a0(0000) GS:ffff88001fc00000(0000)
knlGS:0000000000000000
[   50.245008] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   50.245008] CR2: ffff88001f83ac0c CR3: 000000001e3b8000 CR4: 00000000000006f0
[   50.245008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   50.245008] DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000400
[   50.245008] Process udevd (pid: 944, threadinfo ffff88001e3d6000,
task ffff88001e2457c0)
[   50.245008] Stack:
[   50.245008]  ffff88001d9d9e70 ffff88001e3d7c20 ffffffff8173fe6f
ffff88001d9d9e70
[   50.245008]  ffff88001d9d9f20 ffff88001d9d9000 0000000000000001
0000000f1fc13590
[   50.245008]  ffff88001f80ec00 ffff88001f801a00 00000000ffffffff
ffff88001e3d7d10
[   50.245008] Call Trace:
[   50.245008]  [<ffffffff8173fe6f>] ? page_fault+0x1f/0x30
[   50.245008]  [<ffffffff8173fe6f>] ? page_fault+0x1f/0x30
[   50.245008]  [<ffffffff81735c48>] __slab_alloc+0x32a/0x404
[   50.245008]  [<ffffffff81034e50>] ? dup_mm+0x1a0/0x470
[   50.245008]  [<ffffffff81034e50>] ? dup_mm+0x1a0/0x470
[   50.245008]  [<ffffffff8110f315>] kmem_cache_alloc+0x1a5/0x1b0
[   50.245008]  [<ffffffff81034e50>] dup_mm+0x1a0/0x470
[   50.245008]  [<ffffffff81035df7>] copy_process+0xc97/0x13b0
[   50.245008]  [<ffffffff810365f4>] do_fork+0xb4/0x340
[   50.245008]  [<ffffffff81132587>] ? mntput_no_expire+0x27/0x120
[   50.245008]  [<ffffffff81132f4c>] ? mntput+0xc/0x30
[   50.245008]  [<ffffffff8111aec9>] ? vfs_lstat+0x19/0x20
[   50.245008]  [<ffffffff8111afa5>] ? sys_newlstat+0x15/0x30
[   50.245008]  [<ffffffff8100b7c3>] sys_clone+0x23/0x30
[   50.245008]  [<ffffffff81740633>] stub_clone+0x13/0x20
[   50.245008]  [<ffffffff81740362>] ? system_call_fastpath+0x16/0x1b
[   50.245008] Code: 41 0f ba 34 24 00 e9 e0 fd ff ff 4c 89 e6 4c 89
ef e8 aa f7 ff ff e9 e9 fd ff ff 48 89 f2 48 8b 76 18 48 83 c2 10 e9
0d ff ff ff <0f> 0b e8 cc 6f 62 00 0f 0b 45 85 c9 74 11 41 bf 02 00 00
00 41
[   50.245008] RIP  [<ffffffff8110e2db>] deactivate_slab+0x58b/0x5f0
[   50.245008]  RSP <ffff88001e3d7b20>
[   50.278832] ---[ end trace d3b788000806d6dd ]---

-- 
Thanks,
//richard

Download attachment "config" of type "application/octet-stream" (83746 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ