lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160624155022.GF1868@techsingularity.net>
Date:	Fri, 24 Jun 2016 16:50:22 +0100
From:	Mel Gorman <mgorman@...hsingularity.net>
To:	Guenter Roeck <linux@...ck-us.net>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org, Vlastimil Babka <vbabka@...e.cz>
Subject: Re: Crashes in -next due to 'mm, page_alloc: remove fair zone
 allocation policy'

On Fri, Jun 24, 2016 at 06:40:03AM -0700, Guenter Roeck wrote:
> Hi Mel,
> 
> On 06/24/2016 01:39 AM, Mel Gorman wrote:
> >On Thu, Jun 23, 2016 at 11:05:33PM -0700, Guenter Roeck wrote:
> >>Hi,
> >>
> >>I see a lot of crashes with various architectures in next-20160623.
> >>I bisected mips and sh; both bisect log point to the same patch.
> >>Bisect log is attached. arm, ppc, and x86 images crash as well,
> >>but I did not confirm if the same patch is the culprit there.
> >>
> >
> >The series has been dropped. Due to conflicts with other patches, there
> >were a few bugs introduced, one which potentially corrupted memory. Just
> >to be sure though, what sort of workload crashed just in case I need to
> >adjust the test coverage?
> >
> 
> This is just a basic qemu boot test. No workload at all.

Ok, is there any chance you could test the mm-vmscan-node-lru-v8r12
branch from git://git.kernel.org/pub/scm/linux/kernel/git/mel/linux.git
please?

If not, I'll work on replicating it some time next week before the
series is reposted.

-- 
Mel Gorman
SUSE Labs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ