lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 11 Jun 2011 18:15:27 +0200
From:	wzab <wzab@....pw.edu.pl>
To:	wzab <wzab@....pw.edu.pl>
CC:	linux-kernel@...r.kernel.org
Subject: Re: kmemcheck error and panic when booting 2.6.39.1 , however acpi=off
 allows to boot

W dniu 11.06.2011 17:23, wzab pisze:
>
> Only with "acpi=off" the system started completely, and I was able to 
> log in
> into gdm, and later switch it off in normal way (crash8.txt).
> With other parameters kernel panicked during the boot.
>
Of course I've mistaken.
The log from correct booting and shutdown is crash9.txt, not crash8.txt

However even in this run there is yet another kmemcheck error:

[  369.213324] ERROR: kmemcheck: Fatal error
[  369.217356]
[  369.218847] Pid: 1125, comm: udevd Tainted: G        W   2.6.39.1 
#3                  /D865GBF
[  369.229624] EIP: 0060:[<c0295950>] EFLAGS: 00010146 CPU: 0
[  369.235130] EIP is at strncpy+0x20/0x40
[  369.238983] EAX: eeff9a00 EBX: eeff9ae8 ECX: 00000005 EDX: eef79254
[  369.245257] ESI: eef7925a EDI: eeff9af3 EBP: eef7bcec ESP: c083528c
[  369.251533]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[  369.256941] CR0: 8005003b CR2: f5cb98d8 CR3: 2eff3000 CR4: 000006d0
[  369.263217] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[  369.269493] DR6: ffff4ff0 DR7: 00000400
[  369.273340]  [<c0128417>] kmemcheck_error_save_bug+0x57/0x90
[  369.279035]  [<c0128a34>] kmemcheck_show+0x64/0x70
[  369.283869]  [<c0128cad>] kmemcheck_fault+0x6d/0xc0
[  369.288776]  [<c0124480>] do_page_fault+0x270/0x440
[  369.293702]  [<c04663f3>] error_code+0x5f/0x64
[  369.298182]  [<c01c687a>] create_object+0xda/0x230
[  369.303001]  [<c04543a7>] kmemleak_alloc+0x27/0x50
[  369.307838]  [<c01c3b79>] kmem_cache_alloc+0xc9/0x110
[  369.312924]  [<c02a5ed8>] __debug_object_init+0x318/0x330
[  369.318378]  [<c02a5f07>] debug_object_init+0x17/0x20
[  369.323466]  [<c01567c2>] rcuhead_fixup_activate+0x82/0xa0
[  369.328987]  [<c02a6037>] debug_object_activate+0x107/0x120
[  369.334603]  [<c01883a9>] __call_rcu+0x19/0x140
[  369.339173]  [<c01884dd>] call_rcu+0xd/0x10
[  369.343401]  [<c01c52c4>] put_object+0x24/0x40
[  369.347875]  [<c01c554d>] delete_object_full+0x1d/0x30
[  369.353040]  [<c0454280>] kmemleak_free+0x20/0x50
[  369.357789]  [<c01c3457>] kmem_cache_free+0x97/0xc0
[  369.362694]  [<c01b959f>] anon_vma_chain_free+0xf/0x20
[  369.367877]  [<c01ba8b6>] unlink_anon_vmas+0x36/0xa0
[  369.372871]  [<c01b1414>] free_pgtables+0x64/0xc0
[  369.377620]  [<c01b7df5>] exit_mmap+0xf5/0x180
[  369.382093]  [<c013be6c>] mmput+0x4c/0xc0
[  369.386128]  [<c01cf346>] exec_mmap+0x126/0x360
[  369.390708]  [<c01cffd5>] flush_old_exec+0x55/0x90
[  369.395526]  [<c020888c>] load_elf_binary+0x20c/0x9f0
[  369.400621]  [<c01cecd1>] search_binary_handler+0xe1/0x2b0
[  369.406134]  [<c01d08c7>] do_execve+0x1d7/0x250
[  369.410710]  [<c010ab22>] sys_execve+0x32/0x70
[  369.415189]  [<c0466706>] ptregs_execve+0x12/0x18
[  369.419922]  [<ffffffff>] 0xffffffff
[  369.423556] WARNING: kmemcheck: Caught 32-bit read from uninitialized 
memory (eeff9a70)
[  369.431562] 
5c9affee649affee649affee349bffeeb076ffeec776ffee0101010101010101
[  369.439186]  i i i i i i i i i i i i i i i i u u u u u u u u u u u u 
u u u u
[  369.446832]                                  ^
[  369.451287]
[  369.452777] Pid: 1125, comm: udevd Tainted: G        W   2.6.39.1 
#3                  /D865GBF
[  369.463563] EIP: 0060:[<c028f6e9>] EFLAGS: 00010046 CPU: 0
[  369.469061] EIP is at prio_tree_insert+0xd9/0x190
[  369.473783] EAX: eeff7698 EBX: 00000000 ECX: eeff9a64 EDX: eeff9a64
[  369.480057] ESI: eeff76af EDI: c0d7b1fc EBP: eef7bcec ESP: c08353b0
[  369.486333]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[  369.491743] CR0: 8005003b CR2: f5cb98d8 CR3: 2eff3000 CR4: 000006d0
[  369.498019] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[  369.504295] DR6: ffff4ff0 DR7: 00000400
[  369.508141]  [<c01c68e0>] create_object+0x140/0x230
[  369.513046]  [<c04543a7>] kmemleak_alloc+0x27/0x50
[  369.517885]  [<c01c3b79>] kmem_cache_alloc+0xc9/0x110
[  369.522963]  [<c02a5ed8>] __debug_object_init+0x318/0x330
[  369.528408]  [<c02a5f07>] debug_object_init+0x17/0x20
[  369.533487]  [<c01567c2>] rcuhead_fixup_activate+0x82/0xa0
[  369.539000]  [<c02a6037>] debug_object_activate+0x107/0x120
[  369.544617]  [<c01883a9>] __call_rcu+0x19/0x140
[  369.549177]  [<c01884dd>] call_rcu+0xd/0x10
[  369.553408]  [<c01c52c4>] put_object+0x24/0x40
[  369.557879]  [<c01c554d>] delete_object_full+0x1d/0x30
[  369.563047]  [<c0454280>] kmemleak_free+0x20/0x50
[  369.567796]  [<c01c3457>] kmem_cache_free+0x97/0xc0
[  369.572709]  [<c01b959f>] anon_vma_chain_free+0xf/0x20
[  369.577893]  [<c01ba8b6>] unlink_anon_vmas+0x36/0xa0
[  369.582884]  [<c01b1414>] free_pgtables+0x64/0xc0
[  369.587633]  [<c01b7df5>] exit_mmap+0xf5/0x180
[  369.592104]  [<c013be6c>] mmput+0x4c/0xc0
[  369.596141]  [<c01cf346>] exec_mmap+0x126/0x360
[  369.600719]  [<c01cffd5>] flush_old_exec+0x55/0x90
[  369.605537]  [<c020888c>] load_elf_binary+0x20c/0x9f0
[  369.610634]  [<c01cecd1>] search_binary_handler+0xe1/0x2b0
[  369.616144]  [<c01d08c7>] do_execve+0x1d7/0x250
[  369.620720]  [<c010ab22>] sys_execve+0x32/0x70
[  369.625202]  [<c0466706>] ptregs_execve+0x12/0x18
[  369.629933]  [<ffffffff>] 0xffffffff
done.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ