lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sat, 11 Oct 2014 13:16:27 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	Jiang Liu <jiang.liu@...ux.intel.com>
Cc:	LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [x86, PCI, ACPI] WARNING: CPU: 0 PID: 3 at kernel/rcu/tree.c:2360
 rcu_process_callbacks+0x43f/0x531()

Hi Jiang,

FYI, we noticed the below changes on

https://github.com/jiangliu/linux.git ioapic/hotplug_v6
commit e96f3bd3186db57bbde9f4e5c57d8328f7f0ec79 ("x86, PCI, ACPI: Kill private function resource_to_addr() in arch/x86/pci/acpi.c")


+------------------------------------------------------+------------+------------+
|                                                      | 452b6361c4 | e96f3bd318 |
+------------------------------------------------------+------------+------------+
| boot_successes                                       | 20         | 13         |
| boot_failures                                        | 0          | 6          |
| WARNING:at_kernel/rcu/tree.c:rcu_process_callbacks() | 0          | 6          |
| backtrace:smpboot_thread_fn                          | 0          | 4          |
| page_allocation_failure:order:,mode                  | 0          | 1          |
| backtrace:cpu_startup_entry                          | 0          | 1          |
| backtrace:vmalloc                                    | 0          | 1          |
| backtrace:SyS_init_module                            | 0          | 1          |
| backtrace:acpi_bus_scan                              | 0          | 1          |
| backtrace:acpi_scan_init                             | 0          | 1          |
| backtrace:acpi_init                                  | 0          | 1          |
| backtrace:kernel_init_freeable                       | 0          | 1          |
+------------------------------------------------------+------------+------------+


[    1.323479] PCI: CLS 0 bytes, default 64
[    1.325701] Trying to unpack rootfs image as initramfs...
[    1.852166] ------------[ cut here ]------------
[    1.853652] WARNING: CPU: 0 PID: 3 at kernel/rcu/tree.c:2360 rcu_process_callbacks+0x43f/0x531()
[    1.856015] Modules linked in:
[    1.856015] CPU: 0 PID: 3 Comm: ksoftirqd/0 Not tainted 3.17.0-rc6-00063-g1e527ce #1
[    1.856015] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[    1.856015]  0000000000000000 ffff8800136efd58 ffffffff819d5e8b 0000000000000000
[    1.856015]  ffff8800136efd90 ffffffff810e7670 ffffffff8112f441 ffffffff82057400
[    1.856015]  0000000000000004 0000000000000000 0000000000000246 ffff8800136efda0
[    1.856015] Call Trace:
[    1.856015]  [<ffffffff819d5e8b>] dump_stack+0x4d/0x66
[    1.856015]  [<ffffffff810e7670>] warn_slowpath_common+0x7f/0x98
[    1.856015]  [<ffffffff8112f441>] ? rcu_process_callbacks+0x43f/0x531
[    1.856015]  [<ffffffff810e773c>] warn_slowpath_null+0x1a/0x1c
[    1.856015]  [<ffffffff8112f441>] rcu_process_callbacks+0x43f/0x531
[    1.856015]  [<ffffffff810eac98>] __do_softirq+0x131/0x2e4
[    1.856015]  [<ffffffff810eae74>] run_ksoftirqd+0x29/0x65
[    1.856015]  [<ffffffff81102c0a>] smpboot_thread_fn+0x194/0x1b2
[    1.856015]  [<ffffffff81102a76>] ? SyS_setgroups+0x106/0x106
[    1.856015]  [<ffffffff810ffd7b>] kthread+0xe4/0xec
[    1.856015]  [<ffffffff810ffc97>] ? kthread_create_on_node+0x18c/0x18c
[    1.856015]  [<ffffffff819dd27c>] ret_from_fork+0x7c/0xb0
[    1.856015]  [<ffffffff810ffc97>] ? kthread_create_on_node+0x18c/0x18c
[    1.856015] ---[ end trace c038ce2226e5515b ]---
[    2.010076] Freeing initrd memory: 4692K (ffff880013b5b000 - ffff880013ff0000)



Thanks,
Fengguang
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ