lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140107022559.GE14055@localhost>
Date:	Tue, 7 Jan 2014 10:25:59 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	Grygorii Strashko <grygorii.strashko@...com>,
	Santosh Shilimkar <santosh.shilimkar@...com>
Cc:	Stephen Rothwell <sfr@...b.auug.org.au>, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org
Subject: [setup_bios_corruption_check] WARNING: CPU: 0 PID: 0 at
 mm/memblock.c:789 __next_free_mem_range+0x82/0x261()

Hi all,

Here is another call trace triggered by debug patch 68abcdf547
("mm/memblock: use WARN_ONCE when MAX_NUMNODES passed as input
parameter"):

[    0.000000] found SMP MP-table at [mem 0x000fdab0-0x000fdabf] mapped at [c00fdab0]
[    0.000000]   mpc: fdac0-fdbe4
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at mm/memblock.c:789 __next_free_mem_range+0x82/0x261()
[    0.000000] Usage of MAX_NUMNODES is deprecated. Use NUMA_NO_NODE instead
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 3.13.0-rc7-next-20140106-07462-gb4a839b #4
[    0.000000] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[    0.000000]  c1b8fea0 c1b8fea0 c1b8fe60 c180425f c1b8fe90 c103af65 c1ab8db8 c1b8febc
[    0.000000]  00000000 c1ab8d54 00000315 c1e51e3d c1e51e3d 00000000 00000001 00000001
[    0.000000]  c1b8fea8 c103afd3 00000009 c1b8fea0 c1ab8db8 c1b8febc c1b8ff08 c1e51e3d
[    0.000000] Call Trace:
[    0.000000]  [<c180425f>] dump_stack+0x16/0x18
[    0.000000]  [<c103af65>] warn_slowpath_common+0x75/0x90
[    0.000000]  [<c1e51e3d>] ? __next_free_mem_range+0x82/0x261
[    0.000000]  [<c1e51e3d>] ? __next_free_mem_range+0x82/0x261
[    0.000000]  [<c103afd3>] warn_slowpath_fmt+0x33/0x40
[    0.000000]  [<c1e51e3d>] __next_free_mem_range+0x82/0x261
[    0.000000]  [<c1e023f5>] setup_bios_corruption_check+0x78/0x1ee
[    0.000000]  [<c1df7bad>] ? memblock_x86_fill+0x5f/0x74
[    0.000000]  [<c1df5792>] setup_arch+0x703/0xbef
[    0.000000]  [<c1df2771>] start_kernel+0x75/0x447
[    0.000000]  [<c1df23be>] ? reserve_ebda_region+0x63/0x68
[    0.000000]  [<c1df2358>] i386_start_kernel+0x12e/0x131
[    0.000000] ---[ end trace ee1eeac2e47ba743 ]---
[    0.000000] Scanning 1 areas for low memory corruption

Full dmesg and kconfig attached.

Thanks,
Fengguang

View attachment "dmesg-yocto-waimea-8:20140107090354:i386-randconfig-nh1-01070835:3.13.0-rc7-next-20140106-07462-gb4a839b:4" of type "text/plain" (93113 bytes)

View attachment "config-3.13.0-rc7-next-20140106-07462-gb4a839b" of type "text/plain" (85108 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ