lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 6 Jul 2009 17:05:48 -0400 (EDT)
From:	Pete Clements <clem@...m.clem-digital.net>
To:	linux-kernel@...r.kernel.org (linux-kernel)
Subject: 2.6.31-rc1/rc2 oops tty-layer -- dead network

Fyi. Got this with rc2 (similiar with rc1) kills ppp, console, and
networking.

BUG: scheduling while atomic: pppoe/1535/0x00000500
Modules linked in: ppp_deflate zlib_deflate zlib_inflate bsd_comp xt_tcpudp ipt_REJECT ipt_LOG iptable_filter ip_tables x_tables ipv6

Pid: 1535, comm: pppoe Not tainted (2.6.31-rc2 #1) 
EIP: 0060:[<c1106baf>] EFLAGS: 00000282 CPU: 0
EIP is at tty_ldisc_deref+0x1f/0x60
EAX: 00000000 EBX: c7a4ea80 ECX: 00000001 EDX: 00000000
ESI: 00000282 EDI: 00000000 EBP: 00001000 ESP: c7ae1ed0
 DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
CR0: 8005003b CR2: b7fab000 CR3: 07aa8000 CR4: 00000010
DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
DR6: ffff0ff0 DR7: 00000400
Call Trace:
 [<c11011e7>] ? tty_wakeup+0x47/0x50
 [<c1107d32>] ? pty_unthrottle+0x12/0x30
 [<c11055cc>] ? tty_unthrottle+0x2c/0x40
 [<c1103c57>] ? n_tty_read+0x4b7/0x720
 [<c1012190>] ? default_wake_function+0x0/0x10
 [<c10fff0a>] ? tty_read+0x6a/0xa0
 [<c11037a0>] ? n_tty_read+0x0/0x720
 [<c10ffea0>] ? tty_read+0x0/0xa0
 [<c1059cd0>] ? vfs_read+0x80/0x100
 [<c1059dfc>] ? sys_read+0x3c/0x70
 [<c1002a85>] ? syscall_call+0x7/0xb

-- 
Pete Clements 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ