lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <200705292258.27890.d_baron@012.net.il>
Date:	Tue, 29 May 2007 22:58:27 +0300
From:	David Baron <d_baron@....net.il>
To:	linux-kernel@...r.kernel.org
Subject: Re: [LAU] 2.6.21-rt7 Oopses, More

On Di, 29.05.07 21:37 David Baron <d_baron@....net.il> wrote:

> >Ran for nearly two hours with none. Nada.
> 
> >Then they started up again. What triggered them?
> 
> >The only thing in the logcheck at the same time as the first outputs
> >was a pptp connect after the original connection fell. Relevant?
> 
> The offending functions are icmp_.... functions, most likely the more
> used ipv4 flavor of icmp.c.
> 
> Example:
> BUG: using smp_processor_id() in preemptible [00000000] code:
> IRQ-9/1110 caller is icmp_xmit_unlock+0xb/0x30
>  [<c01faab9>] debug_smp_processor_id+0xa9/0xb0
>  [<c02e531b>] icmp_xmit_unlock+0xb/0x30
>  [<c02e598e>] icmp_send+0x11e/0x3f0
> ....

Could you please

a) add a Re: to the subject before answering yourself, so this gets a
thread, instead of single mails.

and b) maybe CC linux-kernel@...r.kernel.org as I do not think Ingo
Molnar is subscribed to this list here, but it would be good if he also
gets your reports in order to fix it.

Thanks.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ