lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Nov 2013 14:57:36 +0000
From: Christoph Lameter <cl@...ux.com>
To: Sander Eikelenboom <linux@...elenboom.it>
cc: Pekka Enberg <penberg@...nel.org>, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org, eric.dumazet@...il.com
Subject: Re: kernel BUG at mm/slub.c:3338! RIP [<ffffffff8117912c>]
kfree+0x20c/0x210
On Sat, 9 Nov 2013, Sander Eikelenboom wrote:
> This VM got quite some I/O and network load, it got a lot of large files
> transferred to Samba and the files are stored on a glusterfs volume (by
> tcp/ip).
That looks like its related to networking. CCing netdev.
>
>
> [34856.970314] =============================================================================
> [34856.970332] BUG kmalloc-2048 (Not tainted): Poison overwritten
> [34856.970339] -----------------------------------------------------------------------------
> [34856.970339]
> [34856.970350] Disabling lock debugging due to kernel taint
> [34856.970357] INFO: 0xffff88001b36099b-0xffff88001b36099b. First byte 0x6a instead of 0x6b
> [34856.970371] INFO: Allocated in __alloc_skb+0x82/0x290 age=2 cpu=0 pid=2818
> [34856.970381] __slab_alloc.isra.57+0x61e/0x6d6
> [34856.970389] __kmalloc_node_track_caller+0xc9/0x1b0
> [34856.970396] __kmalloc_reserve.isra.49+0x37/0xa0
> [34856.970402] __alloc_skb+0x82/0x290
> [34856.970408] sk_stream_alloc_skb+0x3f/0x120
> [34856.970414] tcp_sendmsg+0x615/0xe20
> [34856.970419] inet_sendmsg+0xa6/0x100
> [34856.970426] sock_aio_write+0xc2/0xe0
> [34856.970433] do_sync_readv_writev+0x4e/0x80
> [34856.970439] do_readv_writev+0xe8/0x270
> [34856.970444] vfs_writev+0x30/0x60
> [34856.970449] SyS_writev+0x54/0xd0
> [34856.970454] system_call_fastpath+0x16/0x1b
> [34856.970461] INFO: Freed in skb_free_head+0x64/0x70 age=2 cpu=0 pid=0
> [34856.970468] __slab_free+0x30/0x561
> [34856.970474] kfree+0x1fd/0x210
> [34856.970479] skb_free_head+0x64/0x70
> [34856.970484] skb_release_data+0xf3/0x100
> [34856.970492] skb_release_all+0x23/0x30
> [34856.970497] __kfree_skb+0x11/0xa0
> [34856.970503] tcp_ack+0x64a/0xf20
> [34856.970509] tcp_rcv_established+0xe2/0x5c0
> [34856.970515] tcp_v4_do_rcv+0x14e/0x4a0
> [34856.970520] tcp_v4_rcv+0x8f2/0x9c0
> [34856.970527] ip_local_deliver_finish+0xd8/0x1d0
> [34856.970533] ip_local_deliver+0x34/0x90
> [34856.970539] ip_rcv_finish+0x150/0x660
> [34856.970544] ip_rcv+0x22b/0x370
> [34856.970551] __netif_receive_skb_core+0x6e2/0x8b0
> [34856.970557] __netif_receive_skb+0x1c/0x70
> [34856.970563] INFO: Slab 0xffffea00006cd800 objects=13 used=13 fp=0x (null) flags=0x40000000004080
> [34856.970572] INFO: Object 0xffff88001b360948 @offset=2376 fp=0xffff88001b3637b0
> [34856.970572]
>
> The rest is in the attached dmesg.
>
> attached: dmesg-oops-3.12.0-20131104.txt
> --
> Sander
View attachment "dmesg-oops-3.12.0-20131104.txt" of type "TEXT/PLAIN" (47098 bytes)
Powered by blists - more mailing lists