lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <7376333.hxgVlQxPiE@merkaba>
Date:	Sat, 28 Nov 2015 12:38:46 +0100
From:	Martin Steigerwald <martin@...htvoll.de>
To:	linux-kernel@...r.kernel.org
Subject: [4.4-rc2] regresstion: ksoftirqd/2 Fatal exception in interrupt pids.freepids.uncharge.constprop

Hi!

I saw this with 4.4-rc2 twice on boot:

pids.freepids.uncharge.constprop
cgroup_free

RIP pids.cancel.constprop.

I think somewhat after systemd mounted cgroup filesystems.

Had no digital camera at hand and I am on the go, so just these few pointers 
at the moment.

martin@...kaba:~> phoronix-test-suite system-info

Phoronix Test Suite v5.2.1
System Information

Hardware:
Processor: Intel Core i5-2520M @ 3.20GHz (4 Cores), Motherboard: LENOVO 
42433WG, Chipset: Intel 2nd Generation Core Family DRAM, Memory: 16384MB, 
Disk: 300GB INTEL SSDSA2CW30 + 480GB Crucial_CT480M50, Graphics: Intel HD 3000 
(1300MHz), Audio: Conexant CX20590, Network: Intel 82579LM Gigabit Connection 
+ Intel Centrino Advanced-N 6205

Software:
OS: Debian unstable, Kernel: 4.4.0-rc2-tp520+ (x86_64), Desktop: KDE 
Frameworks 5, Display Server: X Server 1.17.3, Display Driver: intel 2.99.917, 
OpenGL: 3.3 Mesa 11.0.5, Compiler: GCC 5.2.1 20151121, File-System: btrfs, 
Screen Resolution: 1920x1080

kernel config attached.

One change I made to kernel config that I enabled NUMA awareness. I think as 
this ThinkPad T520 only has a Intel Core i5 (not i7) it may not be able to 
make use of this.

Thanks,
-- 
Martin
Download attachment "config-4.4.0-rc2-tp520+.xz" of type "application/x-xz" (29960 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ