lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 08 Oct 2010 00:06:49 +0200 From: Jiri Slaby <jirislaby@...il.com> To: linux-kernel@...r.kernel.org CC: akpm@...ux-foundation.org, mm-commits@...r.kernel.org, ML netdev <netdev@...r.kernel.org>, "David S. Miller" <davem@...emloft.net> Subject: IPv4: sysctl table check failed [was: mmotm 2010-10-07-14-08 uploaded] On 10/07/2010 11:08 PM, akpm@...ux-foundation.org wrote: > The mm-of-the-moment snapshot 2010-10-07-14-08 has been uploaded to Hi, I got bunch of "sysctl table check failed" below. All seem to be related to ipv4: sysctl table check failed: /net/ipv4/tcp_mem No min Pid: 1, comm: swapper Not tainted 2.6.36-rc7-mm1_64+ #1285 Call Trace: [<ffffffff8108d444>] set_fail+0xa4/0xf0 [<ffffffff8108d736>] sysctl_check_table+0x2a6/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff81072204>] __register_sysctl_paths+0xf4/0x320 [<ffffffff815c1232>] ? printk+0x3c/0x42 [<ffffffff8115d3bc>] ? sysfs_add_file+0xc/0x10 [<ffffffff818b18bd>] ? sysctl_ipv4_init+0x0/0x87 [<ffffffff81072456>] register_sysctl_paths+0x26/0x30 [<ffffffff818b18fd>] sysctl_ipv4_init+0x40/0x87 [<ffffffff810002df>] do_one_initcall+0x3f/0x170 [<ffffffff81884d44>] kernel_init+0x158/0x1e2 [<ffffffff8102fb54>] kernel_thread_helper+0x4/0x10 [<ffffffff81884bec>] ? kernel_init+0x0/0x1e2 [<ffffffff8102fb50>] ? kernel_thread_helper+0x0/0x10 sysctl table check failed: /net/ipv4/tcp_mem No max Pid: 1, comm: swapper Not tainted 2.6.36-rc7-mm1_64+ #1285 Call Trace: [<ffffffff8108d444>] set_fail+0xa4/0xf0 [<ffffffff8108d4da>] sysctl_check_table+0x4a/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff81072204>] __register_sysctl_paths+0xf4/0x320 [<ffffffff815c1232>] ? printk+0x3c/0x42 [<ffffffff8115d3bc>] ? sysfs_add_file+0xc/0x10 [<ffffffff818b18bd>] ? sysctl_ipv4_init+0x0/0x87 [<ffffffff81072456>] register_sysctl_paths+0x26/0x30 [<ffffffff818b18fd>] sysctl_ipv4_init+0x40/0x87 [<ffffffff810002df>] do_one_initcall+0x3f/0x170 [<ffffffff81884d44>] kernel_init+0x158/0x1e2 [<ffffffff8102fb54>] kernel_thread_helper+0x4/0x10 [<ffffffff81884bec>] ? kernel_init+0x0/0x1e2 [<ffffffff8102fb50>] ? kernel_thread_helper+0x0/0x10 sysctl table check failed: /net/ipv4/udp_mem No min Pid: 1, comm: swapper Not tainted 2.6.36-rc7-mm1_64+ #1285 Call Trace: [<ffffffff8108d444>] set_fail+0xa4/0xf0 [<ffffffff8108d736>] sysctl_check_table+0x2a6/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff81072204>] __register_sysctl_paths+0xf4/0x320 [<ffffffff815c1232>] ? printk+0x3c/0x42 [<ffffffff8115d3bc>] ? sysfs_add_file+0xc/0x10 [<ffffffff818b18bd>] ? sysctl_ipv4_init+0x0/0x87 [<ffffffff81072456>] register_sysctl_paths+0x26/0x30 [<ffffffff818b18fd>] sysctl_ipv4_init+0x40/0x87 [<ffffffff810002df>] do_one_initcall+0x3f/0x170 [<ffffffff81884d44>] kernel_init+0x158/0x1e2 [<ffffffff8102fb54>] kernel_thread_helper+0x4/0x10 [<ffffffff81884bec>] ? kernel_init+0x0/0x1e2 [<ffffffff8102fb50>] ? kernel_thread_helper+0x0/0x10 sysctl table check failed: /net/ipv4/udp_mem No max Pid: 1, comm: swapper Not tainted 2.6.36-rc7-mm1_64+ #1285 Call Trace: [<ffffffff8108d444>] set_fail+0xa4/0xf0 [<ffffffff8108d4da>] sysctl_check_table+0x4a/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff8108d4eb>] sysctl_check_table+0x5b/0x310 [<ffffffff81072204>] __register_sysctl_paths+0xf4/0x320 [<ffffffff815c1232>] ? printk+0x3c/0x42 [<ffffffff8115d3bc>] ? sysfs_add_file+0xc/0x10 [<ffffffff818b18bd>] ? sysctl_ipv4_init+0x0/0x87 [<ffffffff81072456>] register_sysctl_paths+0x26/0x30 [<ffffffff818b18fd>] sysctl_ipv4_init+0x40/0x87 [<ffffffff810002df>] do_one_initcall+0x3f/0x170 [<ffffffff81884d44>] kernel_init+0x158/0x1e2 [<ffffffff8102fb54>] kernel_thread_helper+0x4/0x10 [<ffffffff81884bec>] ? kernel_init+0x0/0x1e2 [<ffffffff8102fb50>] ? kernel_thread_helper+0x0/0x10 regards, -- js -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists