lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 10 Oct 2012 00:26:56 -0400
From:	Dave Jones <davej@...hat.com>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Cc:	Jiri Slaby <jslaby@...e.cz>, Alan Cox <alan@...rguk.ukuu.org.uk>
Subject: ODEBUG: free active (active state 0) object type: work_struct hint:
 flush_to_ldisc+0x0/0x1a0

Just hit this..

WARNING: at lib/debugobjects.c:261 debug_print_object+0x8c/0xb0()
ODEBUG: free active (active state 0) object type: work_struct hint: flush_to_ldisc+0x0/0x1a0
Modules linked in: fuse ipt_ULOG nfnetlink tun binfmt_misc nfc caif_socket caif phonet can llc2 pppoe pppox ppp_generic slhc irda crc_ccitt rds af_key decnet rose x25 atm netrom appletalk ipx p8023 psnap p8022 llc ax25 lockd sunrpc bluetooth rfkill ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables kvm_intel usb_debug kvm crc32c_intel ghash_clmulni_intel microcode pcspkr i2c_i801 e1000e uinput i915 video i2c_algo_bit drm_kms_helper drm i2c_core
Pid: 23707, comm: kworker/3:0 Not tainted 3.6.0+ #26
Call Trace:
 [<ffffffff8107005f>] warn_slowpath_common+0x7f/0xc0
 [<ffffffff81070156>] warn_slowpath_fmt+0x46/0x50
 [<ffffffff813728fc>] debug_print_object+0x8c/0xb0
 [<ffffffff8141c200>] ? tty_insert_flip_string_fixed_flag+0x100/0x100
 [<ffffffff81373699>] debug_check_no_obj_freed+0x119/0x210
 [<ffffffff814122c6>] ? free_tty_struct+0x46/0x50
 [<ffffffff811cd166>] kfree+0xe6/0x340
 [<ffffffff814122c6>] free_tty_struct+0x46/0x50
 [<ffffffff81412377>] release_one_tty+0xa7/0xc0
 [<ffffffff81094bc7>] process_one_work+0x207/0x770
 [<ffffffff81094b57>] ? process_one_work+0x197/0x770
 [<ffffffff814122d0>] ? free_tty_struct+0x50/0x50
 [<ffffffff8109550e>] worker_thread+0x15e/0x440
 [<ffffffff810953b0>] ? rescuer_thread+0x240/0x240
 [<ffffffff8109c25d>] kthread+0xed/0x100
 [<ffffffff816bdcd9>] ? sub_preempt_count+0x79/0xd0
 [<ffffffff816c34a4>] kernel_thread_helper+0x4/0x10
 [<ffffffff810aa29c>] ? finish_task_switch+0x7c/0x120
 [<ffffffff816b92bb>] ? _raw_spin_unlock_irq+0x4b/0x80
 [<ffffffff816b9d37>] ? retint_restore_args+0x13/0x13
 [<ffffffff8109c170>] ? kthread_create_on_node+0x160/0x160
 [<ffffffff816c34a0>] ? gs_change+0x13/0x13
---[ end trace fbabf37a8756c1c9 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ