lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 6 Jun 2012 17:45:50 +0200
From:	Ingo Molnar <mingo@...nel.org>
To:	Don Zickus <dzickus@...hat.com>
Cc:	Jan Beulich <JBeulich@...e.com>, x86@...nel.org,
	zhong@...ux.vnet.ibm.com, LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] x86,nmi: Fix section mismatch warnings on 32-bit


btw., to hijack a NMI watchdog thread, I'm sometimes getting 
these:

initcall flow_cache_init_global+0x0/0x17a returned 0 after 346 usecs
calling  pg_init+0x0/0x31b @ 1
pktgen: Packet Generator for packet performance testing. Version: 2.74
hub 2-0:1.0: state 7 ports 10 chg 0000 evt 0000
------------[ cut here ]------------
WARNING: at kernel/watchdog.c:242 watchdog_overflow_callback+0xa4/0xd0()
Watchdog detected hard LOCKUP on cpu 1Pid: 93, comm: kworker/u:1 Not tainted 3.5.0-rc1-01411-gb2f5ce5-dirty #188912
Call Trace:
 <NMI>  [<ffffffff810ada34>] ? watchdog_overflow_callback+0xa4/0xd0
 [<ffffffff8104a09b>] warn_slowpath_common+0x6b/0x90
 [<ffffffff8104a126>] warn_slowpath_fmt+0x46/0x50
 [<ffffffff810ad990>] ? proc_dohung_task_timeout_secs+0x40/0x40
 [<ffffffff810ada34>] watchdog_overflow_callback+0xa4/0xd0
 [<ffffffff810e0bb8>] __perf_event_overflow+0x158/0x240
 [<ffffffff810de220>] ? perf_event_task_disable+0x90/0x90
 [<ffffffff810e1624>] perf_event_overflow+0x14/0x20
 [<ffffffff810142a3>] x86_pmu_handle_irq+0xe3/0x130
 [<ffffffff81012749>] perf_event_nmi_handler+0x19/0x20
 [<ffffffff81006539>] nmi_handle.isra.1+0x89/0xd0
 [<ffffffff810064b0>] ? die+0x80/0x80
 [<ffffffff81006b51>] do_nmi+0x331/0x350
 [<ffffffff81ca7c62>] end_repeat_nmi+0x1a/0x1e
 [<ffffffff8102250c>] ? early_serial_putc+0x2c/0x50
 [<ffffffff8102250c>] ? early_serial_putc+0x2c/0x50
 [<ffffffff8102250c>] ? early_serial_putc+0x2c/0x50
 <<EOE>>  [<ffffffff8102256c>] early_serial_write+0x3c/0x50
 [<ffffffff8104b8b7>] console_unlock+0x267/0x360
 [<ffffffff8104bf13>] vprintk_emit+0x533/0x540
 [<ffffffff81c8dab3>] printk+0x4d/0x4f
 [<ffffffff81794bf0>] ? ata_port_probe+0x40/0x40
 [<ffffffff810751f9>] async_run_entry_fn+0x99/0x160
 [<ffffffff81065621>] process_one_work+0x2c1/0x550
 [<ffffffff81065570>] ? process_one_work+0x210/0x550
 [<ffffffff81097eee>] ? put_lock_stats.isra.16+0xe/0x40
 [<ffffffff81075160>] ? __async_schedule+0x180/0x180
 [<ffffffff81065d3a>] worker_thread+0x18a/0x290
 [<ffffffff81065bb0>] ? rescuer_thread+0x2c0/0x2c0
 [<ffffffff8106c002>] kthread+0xb2/0xc0
 [<ffffffff81ca9154>] kernel_thread_helper+0x4/0x10
 [<ffffffff8106bf50>] ? kthread_flush_work_fn+0x20/0x20
 [<ffffffff81ca9150>] ? gs_change+0xb/0xb
---[ end trace 34a2acc48c10e4d7 ]---
initcall pg_init+0x0/0x31b returned 0 after 49580351 usecs
calling  init_net_drop_monitor+0x0/0x164 @ 1
drop_monitor: Initializing network drop monitor service
initcall init_net_drop_monitor+0x0/0x164 returned 0 after 96956 usecs
ata1.00: ATA-6: HDS722525VLAT80, V36OA60A, max UDMA/100
calling  llc_init+0x0/0x20 @ 1

Which I suspect is the pg_init() in net/core/pktgen.c.

So it does its performance testing with all irqs disabled?

Thanks,

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists