lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <472F1F4C.3010507@linux.vnet.ibm.com>
Date:	Mon, 05 Nov 2007 19:19:00 +0530
From:	Vaidyanathan Srinivasan <svaidy@...ux.vnet.ibm.com>
To:	lkml <linux-kernel@...r.kernel.org>
CC:	linuxppc <linuxppc-dev@...abs.org>
Subject: 2.6.24-rc1 on PPC64: machine check exception

Hi,

I got the following exception on a 128-way PPC64 machine while running
ebizzy-0.2 benchmark.

cpu 0x48: Vector: 200 (Machine Check) at [c000006df1bb37c0]
    pc: c00000000007a26c: .exit_robust_list+0x78/0x228
    lr: c00000000007a240: .exit_robust_list+0x4c/0x228
    sp: c000006df1bb3a40
   msr: 8000000000109032
  current = 0xc000006df1725120
  paca    = 0xc0000000006f4000
    pid   = 5950, comm = ebizzy
cpu 0x78: Vector: 200 (Machine Check) at [c000000e21bd37c0]
    pc: c00000000007a26c: .exit_robust_list+0x78/0x228
    lr: c00000000007a240: .exit_robust_list+0x4c/0x228
    sp: c000000e21bd3a40
   msr: 8000000000109032
  current = 0xc00e pa  paca    = 0xc0000000006fb800
cid    pid   = 5941, comm = ebizzy
   = 5941,[c000006df1bb3b10] c0000000000578a8 .do_exit+0x260/0x7fc
[c000006df1bb3bc0] c000000000057ef8 .sys_exit_group+0x0/0x8
[c000006df1bb3c50] c0000000000636e0 .get_signal_to_deliver+0x45c/0x4ac
[c000006df1bb3d00] c000000000011d44 .do_signal+0x68/0x2e4
[c000006df1bb3e30] c000000000008ae8 do_work+0x28/0x2c
--- Exception: 500 (Hardware Interrupt) at 0000000010007698
SP (40016601610) is in userspace

Config file attached. I did not see any similar failure reported with
2.6.24-rc1.

--Vaidy

View attachment "myconfig" of type "text/plain" (36024 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ