lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 9 Jun 2008 14:48:34 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Mariusz Kozlowski <m.kozlowski@...land.pl>
Cc:	balbir@...ux.vnet.ibm.com, linux-kernel@...r.kernel.org,
	linux-mm@...ck.org
Subject: Re: 2.6.26-rc5-mm1

On Mon, 9 Jun 2008 21:14:54 +0200
Mariusz Kozlowski <m.kozlowski@...land.pl> wrote:

> Hello Balbir,
> 
> > Andrew Morton wrote:
> > > Temporarily at
> > > 
> > >   http://userweb.kernel.org/~akpm/2.6.26-rc5-mm1/
> > > 
> > 
> > I've hit a segfault, the last few lines on my console are
> > 
> > 
> > Testing -fstack-protector-all feature
> > registered taskstats version 1
> > debug: unmapping init memory ffffffff80c03000..ffffffff80dd8000
> > init[1]: segfault at 7fff701fe880 ip 7fff701fee5e sp 7fff7006e6d0 error 7
> > 
> > With absolutely no stack trace. I'll dig deeper.
> 
> Hey, I see something similar and I actually have a stack trace. Here it goes:
> 
> bash[498] segfault at ffffffff80868b58 ip ffffffffff600412 sp 7fffa3d010f0 error 7
> init[1] segfault at ffffffff80868b58 ip ffffffffff600412 sp 7fff9e97f640 error 7
> init[1] segfault at ffffffff80868b58 ip ffffffffff600412 sp 7fff9e97eed0 error 7
> Kernel panic - not syncing: Attemted to kill init!
> Pid 1, comm: init Not tainted 2.6.26-rc5-mm1 #1
> 
> Call Trace:
> [<ffffffff80254632>] panic+0xe2/0x260
> [<ffffffff802fa8ba>] ? __slab_free+0x10a/0x630
> [<ffffffff80265a8e>] ? __sigqueue_free+0x5e/0x70
> [<ffffffff802851eb>] ? trace_hardirqs_off+0x1b/0x30
> [<ffffffff802851eb>] ? trace_hardirqs_off+0x1b/0x30
> [<ffffffff80259b54>] do_exit+0xb84/0xc30
> [<ffffffff80259c5a>] do_group_exit+0x5a/0x110
> [<ffffffff8026a3b5>] get_signal_to_deliver+0x2c5/0x620
> [<ffffffff8020bb3b>] do_notify_resume+0x11b/0xd10
> [<ffffffff8028da5b>] ? trace_hardirqs_on+0x1b/0x30
> [<ffffffff805cd0f3>] ? _spin_unlock_irqrestore+0x93/0x130
> [<ffffffff8026865c>] ? force_sig_info+0x10c/0x130
> [<ffffffff8022fb9c>] ? force_sig_info_fault+0x2c/0x40
> [<ffffffff802dd7dd>] ? print_vma_addr+0x10d/0x1d0
> [<ffffffff805cbb67>] ? trace_hardirqs_on_thunk+0x3a/0x3f
> [<ffffffff8028d8da>] ? trace_hardirqs_on_caller+0x15a/0x2c0
> [<ffffffff8020d4c9>] retint_signal+0x46/0x8d
> 
> This was copied manually so typos are possible.
> 

Thanks.  Could someone send a config please?  Or a bisection result ;)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ