lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 19 Dec 2013 13:00:45 -0500
From:	Valdis Kletnieks <Valdis.Kletnieks@...edu>
To:	linux-kernel@...r.kernel.org
Subject: next-20131218 - BUG: spinlock wrong CPU on CPU#3, mount/563

Saw this while booting latest linux-next.  I've only triggered it once,
so I suspect a race condition of some sort that I don't always hit.

[   18.248796] SELinux: initialized (dev autofs, type autofs), uses genfs_contexts
[   18.267473] BUG: spinlock wrong CPU on CPU#3, mount/563
[   18.267476]  lock: 0xffff880124c3c4a8, .magic: dead4ead, .owner: mount/563, .owner_cpu: 35
[   18.267478] CPU: 3 PID: 563 Comm: mount Not tainted 3.13.0-rc4-next-20131218 #129
[   18.267480] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A11 03/12/2013
[   18.267484]  0000000000000000 ffff880124815cd8 ffffffff8164c74f ffff88012486e590
[   18.267487]  ffff880124815cf8 ffffffff8107901b ffff880124c3c4a8 0000000000000001
[   18.267491]  ffff880124815d18 ffffffff81079046 ffff880124c3c4a8 ffffffff81a9fb92
[   18.267491] Call Trace:
[   18.267497]  [<ffffffff8164c74f>] dump_stack+0x4f/0xa2
[   18.267501]  [<ffffffff8107901b>] spin_dump+0x8c/0x91
[   18.267504]  [<ffffffff81079046>] spin_bug+0x26/0x28
[   18.267506]  [<ffffffff8107934d>] do_raw_spin_unlock+0xdc/0xf3
[   18.267509]  [<ffffffff81656575>] _raw_spin_unlock_irqrestore+0x27/0x83
[   18.267512]  [<ffffffff81070c0d>] __wake_up+0x3f/0x46
[   18.267516]  [<ffffffff8115e334>] fsnotify_add_notify_event+0xba/0xdf
[   18.267519]  [<ffffffff811612e9>] ? SyS_inotify_rm_watch+0xf3/0xf3
[   18.267522]  [<ffffffff811614f6>] fanotify_handle_event+0x16f/0x256
[   18.267525]  [<ffffffff816571e0>] ? retint_restore_args+0xe/0xe
[   18.267528]  [<ffffffff8115dba9>] send_to_group.isra.1+0x114/0x123
[   18.267531]  [<ffffffff8115deb7>] fsnotify+0x2dd/0x41d
[   18.267533]  [<ffffffff8165650a>] ? _raw_spin_unlock+0x5b/0x67
[   18.267537]  [<ffffffff811257b8>] do_sys_open+0x109/0x12e
[   18.267540]  [<ffffffff811257f6>] SyS_open+0x19/0x1b
[   18.267543]  [<ffffffff8165d722>] system_call_fastpath+0x16/0x1b
[   18.371071] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[   18.371564] SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses transition SIDs


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ