lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <12959.1480440324@turing-police.cc.vt.edu>
Date:   Tue, 29 Nov 2016 12:25:24 -0500
From:   Valdis Kletnieks <Valdis.Kletnieks@...edu>
To:     linux-mm@...ck.org
Cc:     linux-kernel@...r.kernel.org
Subject: linux-next 20161129 - BUG: sleeping function called from invalid context at mm/page_alloc.c:3775

Seeing this same BUG all over the place at boot - some 30 times just getting
to a single-user prompt and saving a dmesg.  Everything from netlink to execve
to ext4 file I/O to process exit time.

[    3.746004] BUG: sleeping function called from invalid context at mm/page_alloc.c:3775
[    3.746091] in_atomic(): 1, irqs_disabled(): 0, pid: 385, name: systemd-vconsol
[    3.746162] 2 locks held by systemd-vconsol/385:
[    3.746164]  #0:
[    3.746166]  (
[    3.746167] &sig->cred_guard_mutex
[    3.746169] ){+.+.+.}
[    3.746170] , at:
[    3.746175] [<ffffffffa93ebc58>] prepare_bprm_creds+0x38/0xf0
[    3.746177]  #1:
[    3.746178]  (
[    3.746179] &(ptlock_ptr(page))->rlock
[    3.746181] #2
[    3.746182] ){+.+...}
[    3.746184] , at:
[    3.746189] [<ffffffffa9352949>] unmap_page_range+0x479/0x1280
[    3.746193] CPU: 2 PID: 385 Comm: systemd-vconsol Tainted: G        W       4.9.0-rc7-next-20161129-dirty #361
[    3.746194] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015
[    3.746196] Call Trace:
[    3.746202]  dump_stack+0x7b/0xd1
[    3.746206]  ___might_sleep+0x194/0x300
[    3.746210]  __alloc_pages_nodemask+0x13f/0x730
[    3.746213]  __get_free_pages+0x18/0x60
[    3.746217]  __tlb_remove_page_size+0x8b/0x120
[    3.746221]  unmap_page_range+0x866/0x1280
[    3.746224]  ? release_pages+0x158/0x750
[    3.746229]  unmap_single_vma+0x13b/0x180
[    3.746232]  unmap_vmas+0x37/0x60
[    3.746235]  exit_mmap+0x8f/0x190
[    3.746240]  mmput+0x9c/0x250
[    3.746243]  flush_old_exec+0x559/0xf40
[    3.746247]  load_elf_binary+0x35d/0x1930
[    3.746251]  ? preempt_count_sub+0x4a/0x90
[    3.746255]  search_binary_handler+0xbc/0x260
[    3.746258]  do_execveat_common.isra.30+0x9dd/0x1270
[    3.746261]  ? do_execveat_common.isra.30+0x905/0x1270
[    3.746264]  SyS_execve+0x3a/0x50
[    3.746267]  do_syscall_64+0x8c/0x290
[    3.746271]  entry_SYSCALL64_slow_path+0x25/0x25
[    3.746273] RIP: 0033:0x7f33befaac47
[    3.746275] RSP: 002b:00007ffd24cea888 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
[    3.746279] RAX: ffffffffffffffda RBX: 00005585dae94ea4 RCX: 00007f33befaac47
[    3.746281] RDX: 00007ffd24ceaab8 RSI: 00007ffd24cea930 RDI: 00005585dae94fd4
[    3.746283] RBP: 00007ffd24cea9c0 R08: 0000000000000000 R09: 0000000000000000
[    3.746285] R10: 0000000000000008 R11: 0000000000000202 R12: 00005585dae94801
[    3.746287] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd24cea8d0


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ