lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20250116193821.2e12e728@kernel.org>
Date: Thu, 16 Jan 2025 19:38:21 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: torvalds@...ux-foundation.org
Cc: davem@...emloft.net, netdev@...r.kernel.org,
 linux-kernel@...r.kernel.org, pabeni@...hat.com, Catalin Marinas
 <catalin.marinas@....com>, Guo Weikang <guoweikang.kernel@...il.com>,
 Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [GIT PULL] Networking for v6.13-rc7

On Thu, 09 Jan 2025 23:21:07 +0000 pr-tracker-bot@...nel.org wrote:
> The pull request you sent on Thu,  9 Jan 2025 10:29:53 -0800:
> 
> > git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-6.13-rc7  
> 
> has been merged into torvalds/linux.git:
> https://git.kernel.org/torvalds/c/c77cd47cee041bc1664b8e5fcd23036e5aab8e2a

Hi Linus!

After 76d5d4c53e68 ("mm/kmemleak: fix percpu memory leak detection
failure") we get this on every instance of our testing VMs:

unreferenced object 0x00042aa0 (size 64):
  comm "swapper/0", pid 0, jiffies 4294667296
  hex dump (first 32 bytes on cpu 2):
    00 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4ad/0xab0
    setup_zone_pageset+0x30/0x290
    setup_per_cpu_pageset+0x6a/0x1f0
    start_kernel+0x2a4/0x410
    x86_64_start_reservations+0x18/0x30
    x86_64_start_kernel+0xba/0x110
    common_startup_64+0x12c/0x138
unreferenced object 0x00042b00 (size 320):
  comm "swapper/0", pid 0, jiffies 4294667296
  hex dump (first 32 bytes on cpu 2):
    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........
    ff ff ff ff ff ff ff ff c0 74 78 98 ff ff ff ff  .........tx.....
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4ad/0xab0
    setup_zone_pageset+0x6e/0x290
    setup_per_cpu_pageset+0x6a/0x1f0
    start_kernel+0x2a4/0x410
    x86_64_start_reservations+0x18/0x30
    x86_64_start_kernel+0xba/0x110
    common_startup_64+0x12c/0x138
unreferenced object 0x00042dc0 (size 48):
  comm "swapper/0", pid 0, jiffies 4294667296
  hex dump (first 32 bytes on cpu 2):
    18 07 01 0b f3 00 00 ea 00 00 00 00 00 00 00 00  ................
    00 00 09 09 17 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4ad/0xab0
    setup_per_cpu_pageset+0xd2/0x1f0
    start_kernel+0x2a4/0x410
    x86_64_start_reservations+0x18/0x30
    x86_64_start_kernel+0xba/0x110
    common_startup_64+0x12c/0x138

This is unlikely to be important, but I'm not getting any hits on lore
so I figured better safe than sorry...

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ