lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3af253ac-a884-c76a-2ed6-789203fb4be3@linux.ee>
Date:   Fri, 23 Nov 2018 10:41:12 +0200
From:   Meelis Roos <mroos@...ux.ee>
To:     Mike Rapoport <rppt@...ux.ibm.com>
Cc:     LKML <linux-kernel@...r.kernel.org>, linux-alpha@...r.kernel.org
Subject: Re: NO_BOOTMEM breaks alpha pc164

There was actually more this time, after 27s:

[   35.310528] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper:0]
[   35.310528] Modules linked in:
[   35.310528] CPU: 0 PID: 0 Comm: swapper Not tainted 4.19.0-06942-g6471f52af786 #114
[   35.310528] pc = [<fffffc000085ee10>]  ra = [<fffffc000085eda4>]  ps = 0000    Not tainted
[   35.310528] pc is at _etext+0xb0/0x360
[   35.310528] ra is at _etext+0x44/0x360
[   35.310528] v0 = 0000000000000007  t0 = fffffc0000a776c8  t1 = fffffc0000aa5448
[   35.310528] t2 = 000000000000000a  t3 = 0000000000200102  t4 = fffffc0000a75270
[   35.310528] t5 = 00000000fffb721e  t6 = 0000000000003503  t7 = fffffc0000a48000
[   35.310528] a0 = 0000000000000000  a1 = 0000000000000001  a2 = 0000000000000000
[   35.310528] a3 = fffffc0000a590b8  a4 = 0000000000000000  a5 = fffffc00005bd6e0
[   35.310528] t8 = 0000000000000000  t9 = 00006dc5acff0000  t10= 00000000d40d303b
[   35.310528] t11= 0003ba1a0002641d  pv = fffffc000036e070  at = 0000000000000000
[   35.310528] gp = fffffc0000a976c8  sp = 00000000af7577de
[   62.227507] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper:0]
[   62.227507] Modules linked in:
[   62.227507] CPU: 0 PID: 0 Comm: swapper Tainted: G             L    4.19.0-06942-g6471f52af786 #114
[   62.227507] pc = [<fffffc000085ee10>]  ra = [<fffffc000085eda4>]  ps = 0000    Tainted: G             L
[   62.227507] pc is at _etext+0xb0/0x360
[   62.227507] ra is at _etext+0x44/0x360
[   62.227507] v0 = 0000000000000007  t0 = fffffc0000a776c8  t1 = fffffc0000aa5448
[   62.227507] t2 = 000000000000000a  t3 = 0000000000200102  t4 = fffffc0000a75270
[   62.227507] t5 = 00000000fffb721e  t6 = 0000000000003503  t7 = fffffc0000a48000
[   62.227507] a0 = 0000000000000000  a1 = 0000000000000001  a2 = 0000000000000000
[   62.227507] a3 = fffffc0000a590b8  a4 = 0000000000000000  a5 = fffffc00005bd6e0
[   62.227507] t8 = 0000000000000000  t9 = 00006dc5acff0000  t10= 00000000d40d303b
[   62.227507] t11= 0003ba1a0002641d  pv = fffffc000036e070  at = 0000000000000000
[   62.227507] gp = fffffc0000a976c8  sp = 00000000af7577de
[   89.111282] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper:0]
[   89.111282] Modules linked in:
[   89.111282] CPU: 0 PID: 0 Comm: swapper Tainted: G             L    4.19.0-06942-g6471f52af786 #114
[   89.111282] pc = [<fffffc000085ee10>]  ra = [<fffffc000085eda4>]  ps = 0000    Tainted: G             L
[   89.111282] pc is at _etext+0xb0/0x360
[   89.111282] ra is at _etext+0x44/0x360
[   89.111282] v0 = 0000000000000007  t0 = fffffc0000a776c8  t1 = fffffc0000aa5448
[   89.111282] t2 = 000000000000000a  t3 = 0000000000200102  t4 = fffffc0000a75270
[   89.111282] t5 = 00000000fffb721e  t6 = 0000000000003503  t7 = fffffc0000a48000
[   89.111282] a0 = 0000000000000000  a1 = 0000000000000001  a2 = 0000000000000000
[   89.111282] a3 = fffffc0000a590b8  a4 = 0000000000000000  a5 = fffffc00005bd6e0
[   89.111282] t8 = 0000000000000000  t9 = 00006dc5acff0000  t10= 00000000d40d303b
[   89.111282] t11= 0003ba1a0002641d  pv = fffffc000036e070  at = 0000000000000000
[   89.111282] gp = fffffc0000a976c8  sp = 00000000af7577de

and so on, repeating itself.

-- 
Meelis Roos <mroos@...ux.ee>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ