lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 29 Mar 2014 20:05:46 +0100
From:	Matthias Beyer <mail@...ermatthias.de>
To:	Ed Tomlinson <edt@....ca>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [BUG] 3.14-rc6 at mousedev_open_device+0x77/0x100

Hi,

I want to add that my suspend is broken too. And I don't know if this has
any to do with the reported issues.

On 29-03-2014 12:15:35, Matthias Beyer wrote:
> Hi,
> 
> I got this error with 3.13.7, which I just installed:
> 
> ---
> 
> Mär 29 11:53:05 fu kernel: BUG: unable to handle kernel NULL pointer dereference at           (null)
> Mär 29 11:53:05 fu kernel: IP: [<ffffffffa01f8317>] mousedev_open_device+0x77/0x100 [mousedev]
> Mär 29 11:53:05 fu kernel: PGD 400853067 PUD 400852067 PMD 0 
> Mär 29 11:53:05 fu kernel: Oops: 0000 [#1] PREEMPT SMP 
> Mär 29 11:53:05 fu kernel: Modules linked in: mousedev(+) btusb bluetooth intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm btrfs iTCO_wdt iTCO_vendor_support snd_hda_codec_hdmi snd_hda_codec_conexant raid6_pq libcrc32c xor nls_cp437 vfat fat arc4 iwldvm mac80211 microcode evdev pcspkr psmouse se
> Mär 29 11:53:05 fu kernel:  crc32c_intel ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ehci_pci sdhci_pci ehci_hcd sdhci scsi_mod mmc_core usbcore usb_common i8042 serio
> Mär 29 11:53:05 fu kernel: CPU: 2 PID: 764 Comm: acpid Tainted: G           O 3.13.7-1-ARCH #1
> Mär 29 11:53:05 fu kernel: Hardware name: LENOVO 4290A11/4290A11, BIOS 8DET66WW (1.36 ) 10/22/2012
> Mär 29 11:53:05 fu kernel: task: ffff8804068c2400 ti: ffff88007fc62000 task.ti: ffff88007fc62000
> Mär 29 11:53:05 fu kernel: RIP: 0010:[<ffffffffa01f8317>]  [<ffffffffa01f8317>] mousedev_open_device+0x77/0x100 [mousedev]
> Mär 29 11:53:05 fu kernel: RSP: 0018:ffff88007fc63c10  EFLAGS: 00010202
> Mär 29 11:53:05 fu kernel: RAX: 0000000000000000 RBX: ffff880406ded000 RCX: ffff880406ded068
> Mär 29 11:53:05 fu kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000246
> Mär 29 11:53:05 fu kernel: RBP: ffff88007fc63c28 R08: 0000000000000000 R09: ffff88040d803600
> Mär 29 11:53:05 fu kernel: R10: 0000000000000000 R11: 0000000000000004 R12: 0000000000000000
> Mär 29 11:53:05 fu kernel: R13: ffff880406ded080 R14: ffff880400607238 R15: ffff880405e16f00
> Mär 29 11:53:05 fu kernel: FS:  00007f0469f18700(0000) GS:ffff88041e280000(0000) knlGS:0000000000000000
> Mär 29 11:53:05 fu kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> Mär 29 11:53:05 fu kernel: CR2: 0000000000000000 CR3: 00000000d9926000 CR4: 00000000000407e0
> Mär 29 11:53:05 fu kernel: Stack:
> Mär 29 11:53:05 fu kernel:  ffff880405c7fa00 ffff880406ded000 ffff880406ded078 ffff88007fc63c60
> Mär 29 11:53:05 fu kernel:  ffffffffa01f90cc ffff880406ded348 ffff880400607238 ffff880405e16f00
> Mär 29 11:53:05 fu kernel:  ffffffffa01f9e80 ffff880405e16f10 ffff88007fc63c98 ffffffff811a843f
> Mär 29 11:53:05 fu kernel: Call Trace:
> Mär 29 11:53:05 fu kernel:  [<ffffffffa01f90cc>] mousedev_open+0xcc/0x150 [mousedev]
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a843f>] chrdev_open+0x9f/0x1d0
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a1ad7>] do_dentry_open+0x1b7/0x2c0
> Mär 29 11:53:05 fu kernel:  [<ffffffff811aeeb1>] ? __inode_permission+0x41/0xb0
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a83a0>] ? cdev_put+0x30/0x30
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a1ef1>] finish_open+0x31/0x40
> Mär 29 11:53:05 fu kernel:  [<ffffffff811b1ce2>] do_last+0x572/0xe90
> Mär 29 11:53:05 fu kernel:  [<ffffffff811af1a6>] ? link_path_walk+0x236/0x8d0
> Mär 29 11:53:05 fu kernel:  [<ffffffff81135cf3>] ? unlock_page+0x23/0x30
> Mär 29 11:53:05 fu kernel:  [<ffffffff811b26bb>] path_openat+0xbb/0x6b0
> Mär 29 11:53:05 fu kernel:  [<ffffffff81161084>] ? handle_mm_fault+0x264/0xed0
> Mär 29 11:53:05 fu kernel:  [<ffffffff811b3dca>] do_filp_open+0x3a/0x90
> Mär 29 11:53:05 fu kernel:  [<ffffffff811c0677>] ? __alloc_fd+0xa7/0x130
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a30c4>] do_sys_open+0x124/0x220
> Mär 29 11:53:05 fu kernel:  [<ffffffff811a31de>] SyS_open+0x1e/0x20
> Mär 29 11:53:05 fu kernel:  [<ffffffff81521b6d>] system_call_fastpath+0x1a/0x1f
> Mär 29 11:53:05 fu kernel: Code: e0 05 32 e1 5b 44 89 e0 41 5c 41 5d 5d c3 66 0f 1f 44 00 00 4c 89 ef 41 bc ed ff ff ff e8 c2 05 32 e1 eb e0 48 8b 15 c9 21 00 00 <8b> 02 8d 48 01 85 c0 89 0a 75 c6 48 8b 05 37 1f 00 00 48 3d 60 
> Mär 29 11:53:05 fu kernel: RIP  [<ffffffffa01f8317>] mousedev_open_device+0x77/0x100 [mousedev]
> Mär 29 11:53:05 fu kernel:  RSP <ffff88007fc63c10>
> Mär 29 11:53:05 fu kernel: CR2: 0000000000000000
> Mär 29 11:53:05 fu kernel: ---[ end trace cea09d6c5d332dfc ]---
> 
> ---
> 
> I am on Archlinux, on a Thinkpad x220, if that matters. I will also
> write a message to the bugtracker as soon as my email addr gets
> verified.
> 
> Regards!
> 


-- 
Mit freundlichen Grüßen,
Kind regards,
Matthias Beyer

Proudly sent with mutt.
Happily signed with gnupg.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ