lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 21 Nov 2007 04:45:10 +0100 (CET)
From:	Tomasz Kłoczko <kloczek@...y.mif.pg.gda.pl>
To:	Greg Kroah-Hartman <gregkh@...e.de>
cc:	linux-kernel@...r.kernel.org, stable@...nel.org
Subject: null pointer dereference during restart autofs (was: Linux 2.6.22.12)


BUG: unable to handle kernel NULL pointer dereference at virtual address 00000014
  printing eip:
c047102c
*pdpt = 0000000024e2c001
*pde = 0000000000000000
Oops: 0002 [#1]
SMP
Modules linked in: nfsd exportfs iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 ipt_LOG ipt_connlimit nf_conntrack nfnetlink xt_tcpudp iptable_filter ip_tables x_tables nfs lockd nfs_acl ipv6 autofs4 sunrpc binfmt_misc quota_v2 dm_mirror dm_mod video sbs button dock battery ac parport_pc lp parport floppy nvram sr_mod cdrom joydev ata_generic sg e752x_edac edac_mc ata_piix pata_sil680 ehci_hcd libata iTCO_wdt iTCO_vendor_support e1000 uhci_hcd rtc_cmos rtc_core serio_raw rtc_lib scsi_wait_scan megaraid_mbox megaraid_mm sd_mod scsi_mod ext3 jbd mbcache
CPU:    1
EIP:    0060:[<c047102c>]    Not tainted VLI
EFLAGS: 00010246   (2.6.22.12-1 #1)
EIP is at fput+0x2/0x15
eax: 00000000   ebx: 00000000   ecx: 00009362   edx: 00000000
esi: 00000000   edi: cc6c0dc0   ebp: e342b480   esp: cf231f30
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process automount (pid: 15112, ti=cf230000 task=dff84870 task.ti=cf230000)
Stack: f8b60885 80049370 00000000 00000000 cc6c0dc0 f8b5f99f f625f588 f8b5f896
        e342b480 f8b5f896 00000000 c047a48f 00000000 00000000 00000000 00009362
        00000000 e342b480 00000000 00000004 c047a6de 00000002 c047a014 00000000
Call Trace:
  [<f8b60885>] autofs4_catatonic_mode+0x5a/0x66 [autofs4]
  [<f8b5f99f>] autofs4_root_ioctl+0x109/0x226 [autofs4]
  [<f8b5f896>] autofs4_root_ioctl+0x0/0x226 [autofs4]
  [<f8b5f896>] autofs4_root_ioctl+0x0/0x226 [autofs4]
  [<c047a48f>] do_ioctl+0x87/0x9f
  [<c047a6de>] vfs_ioctl+0x237/0x249
  [<c047a014>] do_fcntl+0xd2/0x249
  [<c047a73c>] sys_ioctl+0x4c/0x64
  [<c0404cc2>] sysenter_past_esp+0x5f/0x85
  =======================
Code: 7c 24 08 00 74 1b 8b 44 24 08 c7 40 64 00 00 00 00 8b 44 24 08 83 c4 
0c 5b 5e 5f 5d e9 7c 16 01 00 83 c4 0c 5b 5e 5f 5d c3 89 c2 <f0> ff 48 14 
0f 94 c0 84 c0 74 07 89 d0 e9 9c fe ff ff c3 56 85
EIP: [<c047102c>] fput+0x2/0x15 SS:ESP 0068:cf231f30

kloczek
-- 
-----------------------------------------------------------
*Ludzie nie mają problemów, tylko sobie sami je stwarzają*
-----------------------------------------------------------
Tomasz Kłoczko | *e-mail: kloczek@...y.mif.pg.gda.pl*

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ