lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Wed, 24 Jun 2015 09:10:32 +0800
From:	Huang Ying <ying.huang@...el.com>
To:	Gavin Guo <gavin.guo@...onical.com>
Cc:	Michael Ellerman <mpe@...erman.id.au>,
	LKML <linux-kernel@...r.kernel.org>, LKP ML <lkp@...org>
Subject: [lkp] [mm/slab_common] 3fdc20bb788:

FYI, we noticed the below changes on

git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
commit 3fdc20bb7880ce3611f0709ed857b98f7d689437 ("mm/slab_common: support the slub_debug boot option on specific object size")


[    0.000000] ------------[ cut here ]------------
[    0.000000] kernel BUG at mm/slab.c:2276!
[    0.000000] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC 
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.1.0-rc8-00065-g2e27f90 #1
[    0.000000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.7.5-20140531_083030-gandalf 04/01/2014
[    0.000000] task: c1da4580 ti: c1d9c000 task.ti: c1d9c000
[    0.000000] EIP: 0060:[<c10e34ba>] EFLAGS: 00210087 CPU: 0
[    0.000000] EIP is at __kmem_cache_create+0x2e0/0x31c
[    0.000000] EAX: 00000000 EBX: d4400100 ECX: 00000000 EDX: 00000000
[    0.000000] ESI: 00000002 EDI: 80002800 EBP: c1d9df80 ESP: c1d9df40
[    0.000000]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[    0.000000] CR0: 80050033 CR2: ffbff000 CR3: 02103000 CR4: 000406b0
[    0.000000] Stack:
[    0.000000]  00000000 00001002 00000001 00000800 c10e1311 0000003f 00000000 00001000
[    0.000000]  00000000 ffffffc0 00000001 00001000 00000040 d4400100 000000c0 c1c6573e
[    0.000000]  c1d9df94 c204a571 d4400100 c1c6573e 000000c0 c1d9dfb0 c204a5cc 00002000
[    0.000000] Call Trace:
[    0.000000]  [<c10e1311>] ? poison_obj+0xa/0x26
[    0.000000]  [<c204a571>] create_boot_cache+0x2f/0x4f
[    0.000000]  [<c204a5cc>] create_kmalloc_cache+0x3b/0x67
[    0.000000]  [<c204a63e>] create_kmalloc_caches+0x2c/0xcb
[    0.000000]  [<c204c2a7>] kmem_cache_init+0xec/0xef
[    0.000000]  [<c202f931>] start_kernel+0x202/0x3e0
[    0.000000]  [<c202f2d6>] i386_start_kernel+0x84/0x88
[    0.000000] Code: 00 00 89 43 28 8b 45 ec 89 43 10 e8 d2 c2 21 00 85 ff 89 43 14 89 53 18 79 13 31 d2 89 f0 e8 78 6f fe ff 83 f8 10 89 43 34 77 02 <0f> 0b 8b 55 d8 89 d8 e8 a8 98 80 00 89 c6 31 c0 85 f6 74 20 89
[    0.000000] EIP: [<c10e34ba>] __kmem_cache_create+0x2e0/0x31c SS:ESP 0068:c1d9df40
[    0.000000] ---[ end trace 94e86ae5381ce19f ]---
[    0.000000] Kernel panic - not syncing: Fatal exception


Thanks,
Ying Huang

View attachment "config-4.1.0-rc8-00060-g3fdc20b" of type "text/plain" (95551 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (3468 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ