lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <95753bcf-0944-4766-a882-bdccb46dded2@v15g2000yqn.googlegroups.com>
Date:	Mon, 20 Apr 2009 06:32:37 -0700 (PDT)
From:	Stephane Couture <muscou@...il.com>
To:	Thomas Gleixner <tglx@...utronix.de>
Cc:	linux-kernel@...r.kernel.org, linuxppc-dev@...abs.org
Subject: Re: [Announce] 2.6.29.1-rt8

With  PREEMPT_RT and HIGHMEM on ppc32  (8572ds eval board), there is a
lot of coredumps (data access, 0x300)  very early in the boot
process.  There is no problem when using only one of PREEMPT_RT or
HIGHMEM.

I also tried rt1 and rt7 and it's the same behavior.

Ccing linuxppc-dev  in case someone already  tried this configuration.

backtrace and registers dump:

(no debugging symbols found)
(no debugging symbols found)
Core was generated by `sed s/\/.*//'.
Program terminated with signal 11, Segmentation fault.
[New process 2189]
#0  0x10089fa8 in ?? ()
(gdb) bt
#0  0x10089fa8 in ?? ()
#1  0x10089f90 in ?? ()
#2  0x1006975c in ?? ()
#3  0x1005ceec in ?? ()
#4  0x1005d190 in ?? ()
#5  0x1005dd64 in ?? ()
#6  0x10000560 in ?? ()
#7  0x10000590 in ?? ()
#8  0x10000888 in ?? ()
#9  0x1009894c in ?? ()
#10 0x00000000 in ?? ()
(gdb) info register
r0             0x1      1
r1             0xbfc609e0       3217426912
r2             0x0      0
r3             0xd      13
r4             0x1009a0bc       269066428
r5             0x20082044       537403460
r6             0xd      13
r7             0x1007ccd4       268946644
r8             0x2d000  184320
r9             0x0      0
r10            0x0      0
r11            0xeee1df40       4007780160
r12            0xeee1c000       4007772160
r13            0x100cf11c       269283612
r14            0xbfd9cdb0       3218722224
r15            0xbfd9cda0       3218722208
r16            0x0      0
r17            0x0      0
r18            0x100aa854       269133908
r19            0x100a3aed       269105901
r20            0x0      0
r21            0x100d61ac       269312428
r22            0xbfd9c1c8       3218719176
r23            0x10000824       268437540
r24            0x0      0
r25            0xbfc60a38       3217427000
r26            0x0      0
r27            0x0      0
r28            0x0      0
r29            0x100c69a8       269248936
r30            0x100c7110       269250832
r31            0x100c69a8       269248936
pc             0x10089fa8       0x10089fa8
msr            0x2d900  186624
cr             0x40082044       1074274372
lr             0x10089f90       0x10089f90
ctr            0xc00feff0       3222269936
xer            0x20000000       536870912
orig_r3        0x0      0
trap           0x300    768

Thanks.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ