lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 03 Jul 2013 07:46:07 -0400 From: Steven Rostedt <rostedt@...dmis.org> To: Dave Jones <davej@...hat.com> Cc: linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...nel.org>, Seiji Aguchi <saguchi@...hat.com>, "H. Peter Anvin" <hpa@...ux.intel.com>, Thomas Gleixner <tglx@...utronix.de> Subject: Re: arch/x86/include/asm/trace/irq_vectors.h:50 suspicious rcu_dereference_check() usage! On Wed, 2013-07-03 at 01:28 -0400, Dave Jones wrote: > [ 3206.433900] =============================== > [ 3206.434449] [ INFO: suspicious RCU usage. ] > [ 3206.434999] 3.10.0+ #40 Not tainted > [ 3206.435468] ------------------------------- > [ 3206.436018] /home/davej/src/linux-dj/arch/x86/include/asm/trace/irq_vectors.h:50 suspicious rcu_dereference_check() usage! > [ 3206.437383] > other info that might help us debug this: > This has been fixed by Seiji and sent to Ingo: https://lkml.org/lkml/2013/6/28/459 Ingo or Peter, can you pull in his patch. Thanks, -- Steve > [ 3206.438388] > RCU used illegally from idle CPU! > rcu_scheduler_active = 1, debug_locks = 0 > [ 3206.439733] RCU used illegally from extended quiescent state! > [ 3206.440474] no locks held by trinity-child1/31470. > [ 3206.441096] > stack backtrace: > [ 3206.441667] CPU: 3 PID: 31470 Comm: trinity-child1 Not tainted 3.10.0+ #40 > [ 3206.445412] 0000000000000000 ffff880244e03f60 ffffffff816ec1a2 ffff880244e03f90 > [ 3206.447288] ffffffff810b8b07 ffff88022e069890 ffff880207809f58 0000000000000006 > [ 3206.449335] 0000003e127b97d8 ffff880244e03fa8 ffffffff8102629e 0000000000000282 > [ 3206.451405] Call Trace: > [ 3206.452676] <IRQ> [<ffffffff816ec1a2>] dump_stack+0x19/0x1b > [ 3206.454390] [<ffffffff810b8b07>] lockdep_rcu_suspicious+0xe7/0x120 > [ 3206.456086] [<ffffffff8102629e>] smp_trace_reschedule_interrupt+0x17e/0x290 > [ 3206.457876] [<ffffffff8170022f>] trace_reschedule_interrupt+0x6f/0x80 > [ 3206.459593] <EOI> [<ffffffff8114a847>] ? user_enter+0x87/0xd0 > [ 3206.461279] [<ffffffff816fa6c5>] do_page_fault+0x45/0x50 > [ 3206.462872] [<ffffffff816f6fe2>] page_fault+0x22/0x30 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists