lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 13 Feb 2008 11:17:37 +1100 From: Nick Piggin <nickpiggin@...oo.com.au> To: Alexey Dobriyan <adobriyan@...il.com> Cc: Andrew Morton <akpm@...ux-foundation.org>, linux-kernel@...r.kernel.org Subject: Re: 2.6.24-sha1: RIP [<ffffffff802596c8>] iov_iter_advance+0x38/0x70 On Wednesday 13 February 2008 09:27, Alexey Dobriyan wrote: > On Tue, Feb 12, 2008 at 02:04:30PM -0800, Andrew Morton wrote: > > On Sun, 10 Feb 2008 17:00:31 +0300 > > > > Alexey Dobriyan <adobriyan@...il.com> wrote: > > > This happened during LTP. FWIW, modprobe/rmmod trivial empty module > > > together with cat /proc/*/wchan and cat /proc/modules were also > > > running. > > > > > > Box is E6400, much debugging is on, config below. > > > > > > > > > [ 4057.310000] BUG: unable to handle kernel paging request at > > > ffff810101dbc008 [ 4057.310000] IP: [<ffffffff802596c8>] > > > iov_iter_advance+0x38/0x70 [ 4057.310000] PGD 8063 PUD c063 PMD > > > 153baa163 PTE 8000000101dbc160 [ 4057.310000] Oops: 0000 [1] SMP > > > DEBUG_PAGEALLOC > > > [ 4057.310000] CPU 0 > > > [ 4057.310000] Modules linked in: [last unloaded: foo] > > > > what is this foo.ko of which you speak, and did it wreck your kernel? > > It's a trivial dumb module which does nothing but loads and unloads. > I redid ftest03 later without any suspicious activity and it oopsed the > same way. Ah crap. Hmm, maybe I didn't consider all cases with my last patch to that code... is there an easy way to get the ftest03 source and run it? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists