lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 18 Jan 2008 20:55:29 -0800 (PST) From: Christoph Lameter <clameter@....com> To: Olaf Hering <olaf@...fle.de> cc: Pekka Enberg <penberg@...helsinki.fi>, linux-kernel@...r.kernel.org, linuxppc-dev@...abs.org, Linux MM <linux-mm@...ck.org> Subject: Re: crash in kmem_cache_init On Fri, 18 Jan 2008, Olaf Hering wrote: > calls cache_grow with nodeid 0 > > [c00000000075bbd0] [c0000000000f82d0] .cache_alloc_refill+0x234/0x2c0 > calls cache_grow with nodeid 0 > > [c00000000075bbe0] [c0000000000f7f38] .____cache_alloc_node+0x17c/0x1e8 > > calls cache_grow with nodeid 1 > > [c00000000075bbe0] [c0000000000f7d68] .fallback_alloc+0x1a0/0x1f4 Okay that makes sense. You have no node 0 with normal memory but the node assigned to the executing processor is zero (correct?). Thus it needs to fallback to node 1 and that is not possible during bootstrap. You need to run kmem_cache_init() on a cpu on a processor with memory. Or we need to revert the patch which would allocate control structures again for all online nodes regardless if they have memory or not. Does reverting 04231b3002ac53f8a64a7bd142fde3fa4b6808c6 change the situation? (However, we tried this on the other thread without success). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists