lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4B697E8A.9000806@mandriva.org>
Date:	Wed, 03 Feb 2010 15:47:54 +0200
From:	Thomas Backlund <tmb@...driva.org>
To:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
CC:	linux-acpi@...r.kernel.org, venkatesh.pallipadi@...el.com
Subject: Re: WARNING: at arch/x86/kernel/hpet.c:404 hpet_next_event+0x7d/0x90()

02.02.2010 17:35, Thomas Backlund skrev:
> This is still happening on 2.6.33-rc6-git1 running x86_64 kernel
>
> HW is a Core i7-860 on an ASUS P7P55D Deluxe m/b
>
> I've seen this since atleast 2.6.31 series kernels...
>
> I seem to have seen other reports about this, and some errata fix &
> patch for this, but I cant find it right now...
>

Hi Venki,

Since this issue is the same as reported here:
http://marc.info/?l=linux-kernel&m=125769096017449&w=2
[2.6.31.4: WARNING: at arch/x86/kernel/hpet.c:390]

and you stated here:
http://marc.info/?l=linux-kernel&m=125849385330302&w=2

that you didn't have a ETA for the errata to be published...

Now, it's about 2.5 months later, and the warning is still there,
so... Is there any updates to this, or should I just silence the
warning with the patch you posted for test...

--
Thomas

>> [ 11.668507] ------------[ cut here ]------------
>> [ 11.668514] WARNING: at arch/x86/kernel/hpet.c:404
>> hpet_next_event+0x7d/0x90()
>> [ 11.668516] Hardware name: System Product Name
>> [ 11.668517] hpet: compare register read back failed.
>> [ 11.668518] Modules linked in: processor(+) iTCO_vendor_support
>> button pata_jmicron dm_snapshot dm_zero dm_mirror dm_region_hash
>> dm_log dm_mod ata_piix ahci libata sd_mod scsi_mod crc_t10dif ext4
>> jbd2 crc16 uhci_hcd ohci_hcd ehci_hcd usbhid hid usbcore
>> [ 11.668530] Pid: 0, comm: swapper Not tainted
>> 2.6.33-tmb-desktop-0.rc6.1.2mdv #1
>> [ 11.668532] Call Trace:
>> [ 11.668536] [<ffffffff810400a8>] warn_slowpath_common+0x78/0xb0
>> [ 11.668538] [<ffffffff8104013c>] warn_slowpath_fmt+0x3c/0x40
>> [ 11.668541] [<ffffffff81022b5d>] hpet_next_event+0x7d/0x90
>> [ 11.668543] [<ffffffff81022b8b>] hpet_legacy_next_event+0xb/0x10
>> [ 11.668547] [<ffffffff810642d9>] clockevents_program_event+0x59/0xa0
>> [ 11.668549] [<ffffffff81065740>] tick_dev_program_event+0x40/0xd0
>> [ 11.668553] [<ffffffff810650c6>]
>> tick_broadcast_oneshot_control+0x116/0x120
>> [ 11.668556] [<ffffffff810648f5>] tick_notify+0x315/0x450
>> [ 11.668560] [<ffffffff811d537c>] ? acpi_hw_read+0x51/0x58
>> [ 11.668563] [<ffffffff8105ce57>] notifier_call_chain+0x47/0x90
>> [ 11.668566] [<ffffffff8105cf41>] raw_notifier_call_chain+0x11/0x20
>> [ 11.668569] [<ffffffff810640e2>] clockevents_notify+0x32/0x170
>> [ 11.668575] [<ffffffffa0196f28>]
>> lapic_timer_state_broadcast+0x41/0x43 [processor]
>> [ 11.668580] [<ffffffffa0197436>] acpi_idle_enter_bm+0x15c/0x28a
>> [processor]
>> [ 11.668585] [<ffffffff8125bccb>] cpuidle_idle_call+0x9b/0x100
>> [ 11.668589] [<ffffffff81001933>] cpu_idle+0x63/0xc0
>> [ 11.668592] [<ffffffff8130a47d>] start_secondary+0x18b/0x18f
>> [ 11.668595] ---[ end trace 34f793092b044afa ]---
>
> --
> Thomas
>

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ