lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 29 Sep 2008 13:13:14 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Vegard Nossum <vegard.nossum@...il.com>
Cc:	Pekka Enberg <penberg@...helsinki.fi>, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] kmemcheck fixlets (for -tip)


got another type of warning:

PM: Adding info for No Bus:vcs1
PM: Adding info for No Bus:vcsa1
------------[ cut here ]------------
WARNING: at kernel/smp.c:331 smp_call_function_mask+0x182/0x190()
Modules linked in:
Pid: 1261, comm: gzip Not tainted 2.6.27-rc7-tip-00980-g072062d-dirty #37099
 [<c012cdb4>] warn_on_slowpath+0x54/0x70
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011e744>] ? kmemcheck_show_addr+0x44/0x60
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011e6e4>] ? kmemcheck_hide_addr+0x44/0x60
 [<c011e9df>] ? kmemcheck_hide+0x8f/0x120
 [<c011eb68>] ? kmemcheck_trap+0x88/0xd0
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c014cff2>] smp_call_function_mask+0x182/0x190
 [<c0113360>] ? do_flush_tlb_all+0x0/0x50
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011e744>] ? kmemcheck_show_addr+0x44/0x60
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c01199c8>] ? default_spin_lock_flags+0x8/0x10
 [<c0113360>] ? do_flush_tlb_all+0x0/0x50
 [<c014d017>] smp_call_function+0x17/0x20
 [<c01319da>] on_each_cpu+0x1a/0x50
 [<c0113314>] flush_tlb_all+0x14/0x20
 [<c016ac05>] flush_all_zero_pkmaps+0xb5/0xd0
 [<c016ac32>] kmap_flush_unused+0x12/0x20
 [<c011b6b7>] change_page_attr_set_clr+0x57/0x320
 [<c0162eee>] ? __alloc_pages_internal+0x9e/0x400
 [<c011b9aa>] set_memory_4k+0x2a/0x30
 [<c011ec3b>] kmemcheck_hide_pages+0x1b/0xc0
 [<c011e9df>] ? kmemcheck_hide+0x8f/0x120
 [<c01802da>] kmemcheck_alloc_shadow+0x6a/0xc0
 [<c017eaef>] __slab_alloc+0x12f/0x3d0
 [<c017ee6b>] kmem_cache_alloc+0xbb/0xc0
 [<c016003e>] ? mempool_alloc_slab+0xe/0x10
 [<c016003e>] mempool_alloc_slab+0xe/0x10
 [<c016013c>] mempool_alloc+0x2c/0xd0
 [<c01a6d71>] bvec_alloc_bs+0x51/0xf0
 [<c01a70c5>] bio_alloc_bioset+0x45/0x80
 [<c01a710e>] bio_alloc+0xe/0x20
 [<c01aac50>] mpage_alloc+0x20/0x80
 [<c01ab5e2>] do_mpage_readpage+0x292/0x4f0
 [<c015da6c>] ? add_to_page_cache_lru+0x2c/0x40
 [<c01ab98c>] mpage_readpages+0x9c/0xd0
 [<c01e3d40>] ? ext3_get_block+0x0/0x100
 [<c0801097>] ? debug_stack_correct+0x27/0x2c
 [<c01e30e0>] ? ext3_readpages+0x0/0x20
 [<c01e30f9>] ext3_readpages+0x19/0x20
 [<c01e3d40>] ? ext3_get_block+0x0/0x100
 [<c0165279>] __do_page_cache_readahead+0x129/0x1f0
 [<c01656cb>] do_page_cache_readahead+0x4b/0x70
 [<c015fe0b>] filemap_fault+0x2fb/0x420
 [<c016b63b>] __do_fault+0x3b/0x3b0
 [<c011d046>] ? pte_alloc_one+0x36/0x40
 [<c016cead>] handle_mm_fault+0x16d/0x730
 [<c0105129>] ? do_debug+0x39/0x110
 [<c011a14e>] do_page_fault+0x10e/0x720
 [<c017084f>] ? vma_link+0x5f/0xf0
 [<c011a040>] ? do_page_fault+0x0/0x720
 [<c080104a>] error_code+0x72/0x78
 [<c03a5132>] ? clear_user+0x32/0x50
 [<c01afc6f>] padzero+0x1f/0x30
 [<c01b14ab>] load_elf_binary+0x86b/0x18f0
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011ef72>] ? kmemcheck_shadow_lookup+0x32/0x50
 [<c011ae3f>] ? lookup_address+0x7f/0xa0
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011e744>] ? kmemcheck_show_addr+0x44/0x60
 [<c011eebe>] ? kmemcheck_pte_lookup+0xe/0x30
 [<c011e6e4>] ? kmemcheck_hide_addr+0x44/0x60
 [<c011e9df>] ? kmemcheck_hide+0x8f/0x120
 [<c011eb68>] ? kmemcheck_trap+0x88/0xd0
 [<c0105129>] ? do_debug+0x39/0x110
 [<c01199c8>] ? default_spin_lock_flags+0x8/0x10
 [<c0800d42>] ? _spin_lock_irqsave+0x32/0x50
 [<c01b0c40>] ? load_elf_binary+0x0/0x18f0
 [<c0186172>] search_binary_handler+0x92/0x220
 [<c0187e36>] do_execve+0x1a6/0x1e0
 [<c010177e>] sys_execve+0x2e/0x60
 [<c010347b>] sysenter_do_call+0x12/0x33
 =======================
---[ end trace c278bda428fc5127 ]---
------------[ cut here ]------------
WARNING: at kernel/smp.c:331 smp_call_function_mask+0x182/0x190()

config attached.

	Ingo

View attachment "config" of type "text/plain" (60035 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ