lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 25 Mar 2013 13:30:27 +0000
From:	Mark Jackson <mpfj-list@...c.co.uk>
To:	"linux-omap@...r.kernel.org" <linux-omap@...r.kernel.org>
CC:	lkml <linux-kernel@...r.kernel.org>
Subject: 3.9.0-rc3: BUG: Bad page state in process

On our custom AM335x cpu board, I have had several kernel crashes via my userspace program.

Any ideas what might be the culprit ?
Anything I can test ?

My config is also attached.

[25579.068861] BUG: Bad page state in process rdserver  pfn:8fd29
[25579.075103] page:c0cbc520 count:0 mapcount:0 mapping:ce847264 index:0x14f
[25579.082238] page flags: 0xc(referenced|uptodate)
[25579.087157] [<c00190c0>] (unwind_backtrace+0x0/0xf8) from [<c0097dc8>] (bad_page+0xa8/0x108)
[25579.096038] [<c0097dc8>] (bad_page+0xa8/0x108) from [<c0097f24>] (free_pages_prepare+0xfc/0x108)
[25579.105278] [<c0097f24>] (free_pages_prepare+0xfc/0x108) from [<c00987e8>] (free_hot_cold_page+0x18/0x144)
[25579.115429] [<c00987e8>] (free_hot_cold_page+0x18/0x144) from [<c0098ad4>] (free_hot_cold_page_list+0x2c/0x48)
[25579.125946] [<c0098ad4>] (free_hot_cold_page_list+0x2c/0x48) from [<c009d440>] (release_pages+0x1d0/0x20c)
[25579.136098] [<c009d440>] (release_pages+0x1d0/0x20c) from [<c00be4dc>] (free_pages_and_swap_cache+0xac/0xbc)
[25579.146431] [<c00be4dc>] (free_pages_and_swap_cache+0xac/0xbc) from [<c00adc20>] (free_pgd_range+0x1f8/0x27c)
[25579.156850] [<c00adc20>] (free_pgd_range+0x1f8/0x27c) from [<c00add68>] (free_pgtables+0xc4/0xc8)
[25579.166176] [<c00add68>] (free_pgtables+0xc4/0xc8) from [<c00b5688>] (exit_mmap+0xe4/0x1f4)
[25579.174961] [<c00b5688>] (exit_mmap+0xe4/0x1f4) from [<c00364b8>] (mmput+0x34/0xb8)
[25579.183017] [<c00364b8>] (mmput+0x34/0xb8) from [<c00ccb18>] (flush_old_exec+0x240/0x4c8)
[25579.191617] [<c00ccb18>] (flush_old_exec+0x240/0x4c8) from [<c010a5f0>] (load_elf_binary+0x23c/0x11b0)
[25579.201399] [<c010a5f0>] (load_elf_binary+0x23c/0x11b0) from [<c00cd1cc>] (search_binary_handler+0xe4/0x1f0)
[25579.211764] [<c00cd1cc>] (search_binary_handler+0xe4/0x1f0) from [<c00cd71c>] (do_execve+0x444/0x4fc)
[25579.221464] [<c00cd71c>] (do_execve+0x444/0x4fc) from [<c00cda24>] (sys_execve+0x30/0x44)
[25579.230067] [<c00cda24>] (sys_execve+0x30/0x44) from [<c00137c0>] (ret_fast_syscall+0x0/0x3c)

Cheers
Mark J.

View attachment ".config" of type "text/plain" (57771 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ