lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131012174206.GD18437@gmail.com>
Date:	Sat, 12 Oct 2013 19:42:06 +0200
From:	Ingo Molnar <mingo@...nel.org>
To:	"H. Peter Anvin" <hpa@...or.com>
Cc:	linux-kernel@...r.kernel.org, tglx@...utronix.de,
	d.hatayama@...fujitsu.com, hpa@...ux.intel.com,
	linux-tip-commits@...r.kernel.org
Subject: Re: [tip:x86/bsp-hotplug] x86, apic: Disable BSP if boot cpu is AP


* H. Peter Anvin <hpa@...or.com> wrote:

> On 10/09/2013 04:16 PM, tip-bot for HATAYAMA Daisuke wrote:
> > Commit-ID:  1d79e607332d67d9132c176d99b5e7fabe1b6b7f
> > Gitweb:     http://git.kernel.org/tip/1d79e607332d67d9132c176d99b5e7fabe1b6b7f
> > Author:     HATAYAMA Daisuke <d.hatayama@...fujitsu.com>
> > AuthorDate: Thu, 29 Aug 2013 18:28:04 +0900
> > Committer:  H. Peter Anvin <hpa@...ux.intel.com>
> > CommitDate: Wed, 9 Oct 2013 15:41:11 -0700
> > 
> > x86, apic: Disable BSP if boot cpu is AP
> 
> This patch seems to trigger build failures in some configurations.
> Specifically:
> 
> (.init.text+0x1307): undefined reference to `boot_cpu_is_bsp_init'
> 
> Unfortunately I don't have the specific configuration which triggers the 
> failure, as this was discovered by Fengguang's robot.

I have triggered that too and have such a config, it's attached.

Thanks,

	Ingo

View attachment "config-Fri_Oct_11_09_03_41_CEST_2013.bad" of type "text/plain" (99894 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ