lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080419232543.6f0dc3ab.diegocg@gmail.com>
Date:	Sat, 19 Apr 2008 23:25:43 +0200
From:	Diego Calleja <diegocg@...il.com>
To:	Alexey Dobriyan <adobriyan@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: 2.6.25-$SHA1: WARNING: at arch/x86/kernel/genapic_64.c:86
 read_apic_id+0x78/0x80()

El Sat, 19 Apr 2008 02:39:45 +0400, Alexey Dobriyan <adobriyan@...il.com> escribió:

> ------------[ cut here ]------------
> WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x78/0x80()
> Modules linked in:
> Pid: 1, comm: swapper Not tainted 2.6.25-2cca775baecbfede2fec20c99add709232311fe7 #3
> 
> Call Trace:
>  [<ffffffff8023150f>] warn_on_slowpath+0x5f/0x80
>  [<ffffffff80299e9e>] ? open_namei+0x4e/0x6b0
>  [<ffffffff804594e5>] ? _spin_unlock_irqrestore+0x65/0x80
>  [<ffffffff80254105>] ? trace_hardirqs_on+0xd5/0x160
>  [<ffffffff804594c2>] ? _spin_unlock_irqrestore+0x42/0x80
>  [<ffffffff8021ed28>] read_apic_id+0x78/0x80
>  [<ffffffff805e7332>] verify_local_APIC+0xb2/0x1a0
>  [<ffffffff805e6193>] native_smp_prepare_cpus+0x1a3/0x390
>  [<ffffffff805e0713>] kernel_init+0x53/0x340
>  [<ffffffff80459536>] ? _spin_unlock_irq+0x36/0x60
>  [<ffffffff80458a92>] ? trace_hardirqs_on_thunk+0x35/0x3a
>  [<ffffffff80254105>] ? trace_hardirqs_on+0xd5/0x160
>  [<ffffffff8020c4b8>] child_rip+0xa/0x12
>  [<ffffffff8020bba3>] ? restore_args+0x0/0x30
>  [<ffffffff805e06c0>] ? kernel_init+0x0/0x340
>  [<ffffffff8020c4ae>] ? child_rip+0x0/0x12

I'm getting exactly the same backtrace (it's also a Intel Core 2 machine)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ