lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090915183647.GA11628@elte.hu>
Date:	Tue, 15 Sep 2009 20:36:47 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	David Miller <davem@...emloft.net>
Cc:	torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
	netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [crash] kernel BUG at net/core/pktgen.c:3503!


not sure which merge caused this, but i got this boot crash with latest 
-git:

calling  flow_cache_init+0x0/0x1b9 @ 1
initcall flow_cache_init+0x0/0x1b9 returned 0 after 64 usecs
calling  pg_init+0x0/0x37c @ 1
pktgen 2.72: Packet Generator for packet performance testing.
------------[ cut here ]------------
kernel BUG at net/core/pktgen.c:3503!
invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file: 

Pid: 3110, comm: kpktgend_0 Not tainted (2.6.31-tip-05508-g491ae8e-dirty #14761) System Product Name
EIP: 0060:[<c1cd7e68>] EFLAGS: 00010202 CPU: 1
EIP is at pktgen_thread_worker+0x1b88/0x1d10
EAX: 00000001 EBX: 00000000 ECX: 00000002 EDX: 00000003
ESI: 00000001 EDI: f6ba5500 EBP: f6a4bf98 ESP: f6a4be74
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process kpktgend_0 (pid: 3110, ti=f6a4b000 task=f6ba5500 task.ti=f6a4b000)
Stack:
 00000000 f6a4be8c f6ba5500 c2ad7440 00000000 c10b87de f6a4be94 c10b881d
<0> f6a4bea8 c10b88df f6ba5500 f6b85000 f6ba5500 f6ba5500 c1ef0b07 c250b760
<0> f6a4bec4 c10bab64 c414b3šPress any key to enter the menu

config attached.

	Ingo

View attachment "config" of type "text/plain" (70968 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ