lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100810140748.GA29878@fancy-poultry.org>
Date:	Tue, 10 Aug 2010 16:07:48 +0200
From:	Heinz Diehl <htd@...cy-poultry.org>
To:	linux-kernel@...r.kernel.org
Subject: Re: BUG: scheduling while atomic: swapper/0/0x10000002

+1

[....]
ACPI: Core revision 20100702
BUG: scheduling while atomic: swapper/0/0x10000002
Modules linked in:
Pid: 0, comm: swapper Not tainted 2.6.35-git8 #1
Call Trace:
[<ffffffff81441be8>] ? schedule+0x518/0x9a0
[<ffffffff812e4262>] ? acpi_os_release_object+0x9/0xd
[<ffffffff8103dcfd>] ? __cond_resched+0x1d/0x30
[<ffffffff814421dd>] ? _cond_resched+0x2d/0x40
[<ffffffff81300ca0>] ? acpi_ps_complete_op+0x24c/0x260
[<ffffffff813014c9>] ? acpi_ps_parse_loop+0x815/0x970
[<ffffffff813005d8>] ? acpi_ps_parse_aml+0x8f/0x2aa
[<ffffffff812fee85>] ? acpi_ns_one_complete_parse+0xfd/0x118
[<ffffffff812feeba>] ? acpi_ns_parse_table+0x1a/0x34
[<ffffffff812fc685>] ? acpi_ns_load_table+0x3d/0x7c
[<ffffffff81303321>] ? acpi_load_tables+0x9b/0x156
[<ffffffff81798d87>] ? acpi_early_init+0x6c/0xf7
[<ffffffff81771cf5>] ? start_kernel+0x368/0x436
[<ffffffff81771382>] ? x86_64_start_kernel+0xe1/0xf2
[....]

htd@...sel:~> uname -a
Linux liesel 2.6.35-git8 #1 SMP PREEMPT Mon Aug 9 10:53:49 CEST 2010 x86_64 x86_ 64 x86_64 GNU/Linux

.config and dmesg output is attached.


Download attachment "config.txt.bz2" of type "application/octet-stream" (19105 bytes)

Download attachment "dmesg.txt.bz2" of type "application/octet-stream" (12183 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ