lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080418005733.aa3e8250.akpm@linux-foundation.org>
Date:	Fri, 18 Apr 2008 00:57:33 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Ingo Molnar <mingo@...e.hu>, Thomas Gleixner <tglx@...utronix.de>,
	Pekka Enberg <penberg@...helsinki.fi>,
	linux-usb@...r.kernel.org, linux-kernel@...r.kernel.org,
	linux-mm@...ck.org, James Morris <jmorris@...ei.org>,
	Stephen Smalley <sds@...ho.nsa.gov>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	linux-pm@...ts.linux-foundation.org, Greg KH <greg@...ah.com>,
	"Rafael J. Wysocki" <rjw@...k.pl>, Pavel Machek <pavel@....cz>
Subject: Re: 2.6.25-mm1: not looking good

On Fri, 18 Apr 2008 00:53:23 -0700 Andrew Morton <akpm@...ux-foundation.org> wrote:

> oop, there's more:

I found another machine!  This one's an old 4-way Nocona (x86_64)

http://userweb.kernel.org/~akpm/config-x.txt
http://userweb.kernel.org/~akpm/dmesg-x.txt



CPU: Physical Processor ID: 0
CPU: Processor Core ID: 0
CPU0: Thermal monitoring enabled (TM1)
ACPI: Core revision 20080321
Parsing all Control Methods:
Table [DSDT](id 0001) - 461 Objects with 50 Devices 130 Methods 11 Regions
 tbxface-0598 [00] tb_load_namespace     : ACPI Tables successfully acquired
evxfevnt-0091 [00] enable                : Transition to ACPI mode successful
------------[ cut here ]------------
WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x31/0x67()
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.25-mm1 #16

Call Trace:
 [<ffffffff8025272f>] ? print_modules+0x88/0x8f
 [<ffffffff80233493>] warn_on_slowpath+0x58/0x81
 [<ffffffff80351ceb>] ? debug_spin_lock_after+0x18/0x1f
 [<ffffffff8035217a>] ? _raw_spin_lock+0x116/0x120
 [<ffffffff80228398>] ? sub_preempt_count+0x6d/0x74
 [<ffffffff804e9ba3>] ? _spin_unlock_irqrestore+0x33/0x40
 [<ffffffff803523e6>] ? debug_smp_processor_id+0x32/0xc4
 [<ffffffff8021ede5>] read_apic_id+0x31/0x67
 [<ffffffff8066f7f2>] verify_local_APIC+0xa7/0x163
 [<ffffffff8066e837>] native_smp_prepare_cpus+0x1ed/0x301
 [<ffffffff80669ab2>] kernel_init+0x5a/0x276
 [<ffffffff804e9a1e>] ? _spin_unlock_irq+0x2a/0x35
 [<ffffffff8022b7c2>] ? finish_task_switch+0x68/0x7f
 [<ffffffff8020c1d8>] child_rip+0xa/0x12
 [<ffffffff80669a58>] ? kernel_init+0x0/0x276
 [<ffffffff8020c1ce>] ? child_rip+0x0/0x12

---[ end trace 4eaa2a86a8e2da22 ]---
------------[ cut here ]------------
WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x31/0x67()
Modules linked in:
Pid: 1, comm: swapper Tainted: G        W 2.6.25-mm1 #16

Call Trace:
 [<ffffffff8025272f>] ? print_modules+0x88/0x8f
 [<ffffffff80233493>] warn_on_slowpath+0x58/0x81
 [<ffffffff80351ceb>] ? debug_spin_lock_after+0x18/0x1f
 [<ffffffff8035217a>] ? _raw_spin_lock+0x116/0x120
 [<ffffffff80228398>] ? sub_preempt_count+0x6d/0x74
 [<ffffffff804e9ba3>] ? _spin_unlock_irqrestore+0x33/0x40
 [<ffffffff803523e6>] ? debug_smp_processor_id+0x32/0xc4
 [<ffffffff8021ede5>] read_apic_id+0x31/0x67
 [<ffffffff8066f829>] verify_local_APIC+0xde/0x163
 [<ffffffff8066e837>] native_smp_prepare_cpus+0x1ed/0x301
 [<ffffffff80669ab2>] kernel_init+0x5a/0x276
 [<ffffffff804e9a1e>] ? _spin_unlock_irq+0x2a/0x35
 [<ffffffff8022b7c2>] ? finish_task_switch+0x68/0x7f
 [<ffffffff8020c1d8>] child_rip+0xa/0x12
 [<ffffffff80669a58>] ? kernel_init+0x0/0x276
 [<ffffffff8020c1ce>] ? child_rip+0x0/0x12

---[ end trace 4eaa2a86a8e2da22 ]---

That's

	WARN_ON(preemptible());

in read_apic_id().


Now I'll release it all.  heh.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ