On Wed, May 14, 2014 at 12:32:26PM -0400, Sasha Levin wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 05/14/2014 12:29 PM, Peter Zijlstra wrote:
> > On Mon, May 12, 2014 at 11:42:33AM -0400, Sasha Levin wrote:
> >> Hi all,
> >> 
> >> While fuzzing with trinity inside a KVM tools guest running the latest 
> >> -next kernel I've stumbled on the following spew. Maybe related to the 
> >> very recent change in freeing on task exit?
> >> 
> >> [ 2509.827261] general protection fault: 0000 [#1] PREEMPT SMP 
> >> DEBUG_PAGEALLOC [ 2509.830379] Dumping ftrace buffer: [ 2509.830379]    
> >> (ftrace buffer empty) [ 2509.830379] Modules linked in: [ 2509.830379] 
> >> CPU: 47 PID: 43306 Comm: trinity-c126 Tainted: G        W     
> >> 3.15.0-rc5-next-20140512-sasha-00019-ga20bc00-dirty #456
> > 
> > Any particular trinity setup? And would you happen to have the seed of that 
> > run?
> 
> Nothing special about trinity options. 400 threads and blacklisting some of 
> the
> destructive syscalls (umount, reboot, etc).
> 
> I don't have the seed, but that problem did reproduce again tonight so I can 
> test
> out debug code if you have something in mind.

Nah, I drew a pretty big blank, which is why I wanted to see if I could
reproduce. If you could share your trinity cmdline I'd be much obliged.
While I did manage to clone (the repo moved since last time) and build
it, I'm not really that handy with it and want to avoid destroying my
machine if possible ;-)

Attachment: pgpJY4NKwK_Rx.pgp
Description: PGP signature

Reply via email to