lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090223151331.033e0bf5.akpm@linux-foundation.org>
Date:	Mon, 23 Feb 2009 15:13:31 -0800
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Tilman Schmidt <t.schmidt@...enixsoftware.de>
Cc:	linux-kernel@...r.kernel.org, stable@...nel.org,
	Jeremy Fitzhardinge <jeremy@...source.com>,
	Ingo Molnar <mingo@...e.hu>
Subject: Re: [2.6.28.7] BUG: using smp_processor_id() in preemptible
 [00000000] code: pageattr-test/207

On Mon, 23 Feb 2009 19:37:41 +0100
Tilman Schmidt <t.schmidt@...enixsoftware.de> wrote:

> Booting the most recent stable kernel 2.6.28.7 on my workhorse machine
> (Pentium D, openSUSE 10.3 32 bit userspace) produces rather a lot of
> the following BUG messages:
> 
> <3>BUG: using smp_processor_id() in preemptible [00000000] code: pageattr-test/207
> <4>caller is paravirt_get_lazy_mode+0xe/0x1b
> <4>Pid: 207, comm: pageattr-test Not tainted 2.6.28.7-testing #1
> <4>Call Trace:
> <4> [<c0204760>] debug_smp_processor_id+0xac/0xc0
> <4> [<c011ad90>] paravirt_get_lazy_mode+0xe/0x1b
> <4> [<c011c925>] arch_flush_lazy_mmu_mode+0x8/0x19
> <4> [<c011d07c>] change_page_attr_set_clr+0x283/0x28e
> <4> [<c011d152>] change_page_attr_set+0xf/0x11
> <4> [<c011d347>] do_pageattr_test+0x1f3/0x3e3
> <4> [<c01247f1>] ? finish_task_switch+0xa0/0xa8
> <4> [<c032f799>] ? schedule+0x462/0x472
> <4> [<c0331353>] ? _spin_unlock_irqrestore+0x40/0x74
> <4> [<c011d154>] ? do_pageattr_test+0x0/0x3e3
> <4> [<c0139f1d>] kthread+0x3b/0x62 
> <4> [<c0139ee2>] ? kthread+0x0/0x62
> <4> [<c0104a43>] kernel_thread_helper+0x7/0x10
> 
> They occur regularly in bursts of ten, separated by 30 second break.
> The previous kernel:
> 
> ts@...on:~> uname -a
> Linux xenon 2.6.28.6-testing #1 SMP PREEMPT Wed Feb 18 21:05:30 CET 2009 i686 i686 i386 GNU/Linux
> 
> with identical config and userspace (double-checked this time ;-)
> runs quite BUG-free.
> 

A 2.6.28.6 -> 2.6.28.7 regressionlet.

This, I bet:

commit 2cf155b300c4839a7238b825c7c5f417e9d7cc68
Author: Jeremy Fitzhardinge <jeremy@...p.org>
Date:   Wed Feb 11 09:32:19 2009 -0800

    x86/cpa: make sure cpa is safe to call in lazy mmu mode
    
    commit 4f06b0436b2ddbd3b67b10e77098a6862787b3eb upstream.
    
    Impact: fix race leading to crash under KVM and Xen
    
    The CPA code may be called while we're in lazy mmu update mode - for
    example, when using DEBUG_PAGE_ALLOC and doing a slab allocation
    in an interrupt handler which interrupted a lazy mmu update.  In this
    case, the in-memory pagetable state may be out of date due to pending
    queued updates.  We need to flush any pending updates before inspecting
    the page table.  Similarly, we must explicitly flush any modifications
    CPA may have made (which comes down to flushing queued operations when
    flushing the TLB).
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ