lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 31 Aug 2009 22:43:49 +0200
From:	Jens Axboe <jens.axboe@...cle.com>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Subject: WARNING: at arch/x86/kernel/smp.c:117
	native_smp_send_reschedule+0x51/0x60()

Hi,

I get this on every reboot/kexec/halt:

WARNING: at arch/x86/kernel/smp.c:117 native_smp_send_reschedule+0x51/0x60()
Modules linked in: raid0 md_mod loop hid_apple usbhid mptsas mptscsih
mptbase scsi_transport_sas ehci_hcd uhci_hcd usbcore nls_base igb sg
sr_mod cdrom
Pid: 6998, comm: halt Not tainted 2.6.31-rc8 #105
Call Trace:
 <IRQ>  [<ffffffff81023d38>] ? lapic_next_event+0x18/0x20
 [<ffffffff810233e1>] ? native_smp_send_reschedule+0x51/0x60
 [<ffffffff8104e7e8>] warn_slowpath_common+0x78/0xd0
 [<ffffffff8104e84f>] warn_slowpath_null+0xf/0x20
 [<ffffffff810233e1>] native_smp_send_reschedule+0x51/0x60
 [<ffffffff81037ae8>] resched_task+0x68/0x80
 [<ffffffff81041165>] resched_cpu+0x75/0x90
 [<ffffffff8104a1db>] scheduler_tick+0x25b/0x290
 [<ffffffff8105b8b6>] update_process_times+0x56/0x70
 [<ffffffff81076cb6>] tick_sched_timer+0x66/0xc0
 [<ffffffff81076c50>] ? tick_sched_timer+0x0/0xc0
 [<ffffffff8106c351>] __run_hrtimer+0x51/0xc0
 [<ffffffff8106d0a5>] hrtimer_interrupt+0xd5/0x1c0
 [<ffffffff81024938>] smp_apic_timer_interrupt+0x68/0xa0
 [<ffffffff8100ca23>] apic_timer_interrupt+0x13/0x20
 <EOI>  [<ffffffff81028ffb>] ? x2apic_send_IPI_allbutself+0x9b/0xb0
 [<ffffffff810234ac>] ? native_smp_send_stop+0x4c/0x90
 [<ffffffff81022dfe>] ? native_machine_shutdown+0x5e/0x90
 [<ffffffff81022a66>] ? native_machine_power_off+0x26/0x30
 [<ffffffff81022a7a>] ? machine_power_off+0xa/0x10
 [<ffffffff810619d4>] ? kernel_power_off+0x34/0x40
 [<ffffffff81061cba>] ? sys_reboot+0x13a/0x210
 [<ffffffff8105e83e>] ? group_send_sig_info+0x6e/0x90
 [<ffffffff8105e8b0>] ? kill_pid_info+0x50/0xa0
 [<ffffffff8105eb95>] ? sys_kill+0xa5/0x200
 [<ffffffff8106d289>] ? up_read+0x9/0x10
 [<ffffffff8102ede9>] ? do_page_fault+0x1a9/0x310
 [<ffffffff8100bf6b>] ? system_call_fastpath+0x16/0x1b


-- 
Jens Axboe

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ