lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 30 Oct 2006 19:08:52 -0500
From:	Mark Lord <lkml@....ca>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Subject: 2.6.19-rc3-git7: Oops on shutdown: do_remount_sb (reiserfs)

The system is a Core2duo with SATA drives, with a SLES10 install,
and a linux-2.6.19-rc3-git7 kernel.  All I did was a fresh boot to
the gdm prompt, and then selected "reboot" from the menu.

Just as it was closing up shop, an Oops appeared on the screen.
I took a photo of it, and transcribed this portion (below).
The photograph is available on request.

devpts unmounted
sysfs unmounted
BUG: unable to handle kernel paging request at virtual address 3a4e5355
 printing eip:
c0177ebc
*pde = 00000000
Oops: 0000 [#1]
SMP
Modules linked in: cpufreq_ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table button battery ac dm_mod ahci edd fan thermal processor
CPU:    0
EIP:    0060:[<c0177ebc>]       Not tainted VLI
EFLAGS: 00010213   (2.6.19-rc3-git7-ml #7)
EIP is at shrink_dcache_sb+0x3c/0x100
...
Process umount (pid ... )
...
Call Trace:
[<c0167d69>] do_remount_sb+0x29/0x160
[<c017d22e>] sys_umount+0x20e/0x220
[<c017d259>] sys_oldumount+0x19/0x20
[<c0102f4d>] sysenter_past_esp+0x56/0x8d
[<b7f4e410>] 0xb7f4e410
Code: e8 ca 6b 1e 00 a1 ...
EIP: [<c0177ebc>] shrink_dcache_sb+0x3c/0x100 SS:ESP 0068:f68e3efc
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ