lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <200607141328.40680.martin@mrvanes.com>
Date:	Fri, 14 Jul 2006 13:28:40 +0200
From:	Martin van Es <martin@...anes.com>
To:	Alexey Dobriyan <adobriyan@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Kernel 2.6.17.1 bug/oops in snd_usb_audio subsystem

On Friday 14 July 2006 12:54, Alexey Dobriyan wrote:
> On Fri, Jul 14, 2006 at 11:54:36AM +0200, Martin van Es wrote:
> > I already sent this mail to perex@...e.cz a couple of days ago since I
> > thought that was the closest match in the MAINTAINERS list for this oops.
> > Since I didn't receive any reply
>
> Your kernel is tainted. Please complain to kqemu developers. Don't waste
> Jaroslav's time.

Thank you Alexey for pointing out I reported this oops while running a tainted 
kernel (kqemu was indeed tainting it). I interpreted the reply as a request 
for reproducing the oops on a untainted version of the Kernel of which I'll 
post the dmesg output below.

Hope this helps.
Is there anything else I can do to contribute?

BUG: unable to handle kernel NULL pointer dereference at virtual address 
000001b8
 printing eip:
dea9a514
*pde = 00000000
Oops: 0002 [#1]
Modules linked in: snd_usb_audio snd_usb_lib pwc snd_rawmidi snd_hwdep 
videodev v4l2_common capability commoncap ipw2200
CPU:    0
EIP:    0060:[<dea9a514>]    Not tainted VLI
EFLAGS: 00210202   (2.6.17.1 #5)
EIP is at snd_usb_pcm_open+0x34/0x4d0 [snd_usb_audio]
eax: d681e9c0   ebx: 00000000   ecx: 0000000e   edx: 000001a8
esi: deaa8d20   edi: ca6a7e50   ebp: c8f5afc0   esp: ca6a7d9c
ds: 007b   es: 007b   ss: 0068
Process ffmpeg (pid: 4793, threadinfo=ca6a6000 task=caf275b0)
Stack: 00000020 ca6a7dd8 00000000 cedf1c00 00000010 c8f5afc0 c030f7f4 cedf1c00
       00000000 00000010 cedf1c00 000001a8 00000011 0000000b ffffffff d3eaba00
       00000000 0000000d ca6a7e50 c8f5afc0 c030fb17 d681e9c0 00000001 c8edeb00
Call Trace:
 <c030f7f4> snd_pcm_hw_constraints_init+0x704/0x790  <c030fb17> 
snd_pcm_open_substream+0x57/0xb0
 <c031df41> snd_pcm_oss_open+0x221/0x4a0  <c0163800> 
generic_permission+0x110/0x120
 <c02126c7> kobject_get+0x17/0x20  <c01185c0> default_wake_function+0x0/0x20
 <c030482d> soundcore_open+0x8d/0x1c0  <c015e826> chrdev_open+0x76/0x160
 <c015e7b0> chrdev_open+0x0/0x160  <c0153aeb> __dentry_open+0xbb/0x200
 <c0153d4c> do_filp_open+0x5c/0x70  <c01539cb> get_unused_fd+0x5b/0xc0
 <c0153db3> do_sys_open+0x53/0x100  <c0153eb7> sys_open+0x27/0x30
 <c0102f47> syscall_call+0x7/0xb
Code: 8b 48 5c 8d 14 52 fc 89 4c 24 28 89 d1 c1 e1 04 01 ca b9 0e 00 00 00 8d 
14 d5 10 00 00 00 89 54 24 2c 8b 58 08 01 da 89 54 24 2c <c7> 42 10 ff ff ff 
ff c7 42 24 00 00 00 00 8b 7c 24 28 81 c7 d0
EIP: [<dea9a514>] snd_usb_pcm_open+0x34/0x4d0 [snd_usb_audio] SS:ESP 
0068:ca6a7d9c

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ