lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 6 Jul 2012 07:17:33 +0300 From: Or Gerlitz <ogerlitz@...lanox.com> To: David Miller <davem@...emloft.net> CC: <netdev@...r.kernel.org>, Shlomo Pongratz <shlomop@...lanox.com> Subject: Re: net-next warning at kernel/softirq.c:159 local_bh_enable FWIW - I've updated my net-next clone to the lastest and still see this, even after the IPv6 related fix. Or. IPv6: ADDRCONF(NETDEV_UP): ib0: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): ib0: link becomes ready ------------[ cut here ]------------ WARNING: at kernel/softirq.c:159 local_bh_enable+0x45/0xc2() Hardware name: X7DWU Modules linked in: ib_ipoib ib_cm ib_sa ib_uverbs netconsole nfs lockd auth_rpcgss nfs_acl autofs4 sunrpc fcoe libfcoe libfc scsi_transport_fc 8021q ipmi_devintf ipmi_si ipmi_msghandler ipv6 dm_mirror dm_region_hash dm_log uinput igb ptp pps_core mlx4_ib ib_mad ib_core mlx4_en mlx4_core sg kvm_intel kvm microcode pcspkr rng_core ioatdma dca dm_mod shpchp button sr_mod ext3 jbd usb_storage sd_mod ata_piix libata scsi_mod ehci_hcd uhci_hcd floppy [last unloaded: scsi_wait_scan] Pid: 0, comm: swapper/0 Not tainted 3.5.0-rc5-12501-g1405080-dirty #86 Call Trace: <IRQ> [<ffffffff81027f1d>] warn_slowpath_common+0x80/0x98 [<ffffffffa0245266>] ? ip6_neigh_lookup+0x157/0x187 [ipv6] [<ffffffff81027f4a>] warn_slowpath_null+0x15/0x17 [<ffffffff8102f56a>] local_bh_enable+0x45/0xc2 [<ffffffffa0245266>] ip6_neigh_lookup+0x157/0x187 [ipv6] [<ffffffffa0245168>] ? ip6_neigh_lookup+0x59/0x187 [ipv6] [<ffffffffa030895d>] ipoib_mcast_send+0x375/0x48b [ib_ipoib] [<ffffffffa0308908>] ? ipoib_mcast_send+0x320/0x48b [ib_ipoib] [<ffffffff8102f5e2>] ? local_bh_enable+0xbd/0xc2 [<ffffffffa030494f>] ipoib_path_lookup+0x2f3/0x331 [ib_ipoib] [<ffffffffa0245168>] ? ip6_neigh_lookup+0x59/0x187 [ipv6] [<ffffffffa0304b4d>] ipoib_start_xmit+0x1c0/0x54f [ib_ipoib] [<ffffffffa030498d>] ? ipoib_path_lookup+0x331/0x331 [ib_ipoib] [<ffffffff812c1be3>] dev_hard_start_xmit+0x449/0x60e [<ffffffff812c1804>] ? dev_hard_start_xmit+0x6a/0x60e [<ffffffff812d95b9>] sch_direct_xmit+0x72/0x201 [<ffffffff812c2221>] dev_queue_xmit+0x479/0x70e [<ffffffff812c1da8>] ? dev_hard_start_xmit+0x60e/0x60e [<ffffffff812ca20e>] neigh_connected_output+0xb6/0xd4 [<ffffffffa023c85b>] ip6_finish_output2+0x304/0x38e [ipv6] [<ffffffffa023c777>] ? ip6_finish_output2+0x220/0x38e [ipv6] [<ffffffffa0245057>] ? ip6_mtu+0x88/0xa1 [ipv6] [<ffffffffa023ca29>] ip6_finish_output+0x144/0x149 [ipv6] [<ffffffffa023cb41>] ip6_output+0x113/0x11c [ipv6] [<ffffffffa024c51f>] ndisc_send_skb+0x176/0x200 [ipv6] [<ffffffffa024c413>] ? ndisc_send_skb+0x6a/0x200 [ipv6] [<ffffffff81065350>] ? mark_held_locks+0xcd/0xf5 [<ffffffffa024ce1a>] __ndisc_send+0x51/0x5d [ipv6] [<ffffffffa024e4a0>] ndisc_send_ns+0x75/0x82 [ipv6] [<ffffffffa02413ee>] addrconf_dad_timer+0x118/0x136 [ipv6] [<ffffffff8103547a>] run_timer_softirq+0x27a/0x38b [<ffffffff810353b5>] ? run_timer_softirq+0x1b5/0x38b [<ffffffffa02412d6>] ? addrconf_rs_timer+0xf2/0xf2 [ipv6] [<ffffffff8102f746>] __do_softirq+0xff/0x1de [<ffffffff81362dcc>] call_softirq+0x1c/0x26 [<ffffffff81003090>] do_softirq+0x38/0x80 [<ffffffff8102f41f>] irq_exit+0x4e/0x83 [<ffffffff81019d2e>] smp_apic_timer_interrupt+0x86/0x94 [<ffffffff8136255c>] apic_timer_interrupt+0x6c/0x80 <EOI> [<ffffffff810083ec>] ? mwait_idle+0x13c/0x208 [<ffffffff810083e3>] ? mwait_idle+0x133/0x208 [<ffffffff810088d1>] cpu_idle+0x6e/0xab [<ffffffff81343a23>] rest_init+0xc7/0xce [<ffffffff8134395c>] ? csum_partial_copy_generic+0x16c/0x16c [<ffffffff8167fbf3>] start_kernel+0x332/0x33f [<ffffffff8167f6f6>] ? kernel_init+0x19d/0x19d [<ffffffff8167f2b4>] x86_64_start_reservations+0xb8/0xbd [<ffffffff8167f3a6>] x86_64_start_kernel+0xed/0xf4 ---[ end trace f71d7a59b646ab87 ]--- -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists