lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20060820170717.e6f98f23.akpm@osdl.org>
Date:	Sun, 20 Aug 2006 17:07:17 -0700
From:	Andrew Morton <akpm@...l.org>
To:	Stephan von Krawczynski <skraw@...net.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Bug Report 2.6.17.8

On Sun, 20 Aug 2006 13:40:22 +0200
Stephan von Krawczynski <skraw@...net.com> wrote:

> Hello,
> 
> in case of additional questions feel free to ask. 
> 
> -- 
> Regards,
> Stephan
> 
> Aug 20 03:43:11 a01 kernel: BUG: unable to handle kernel paging request at virtual address 02000044
> Aug 20 03:43:11 a01 kernel:  printing eip:
> Aug 20 03:43:11 a01 kernel: c0176356
> Aug 20 03:43:11 a01 kernel: *pde = 00000000
> Aug 20 03:43:11 a01 kernel: Oops: 0000 [#1]
> Aug 20 03:43:11 a01 kernel: Modules linked in: speedstep_lib freq_table ipv6 intel_agp agpgart hw_random nfs lockd sunrpc e100 mii e1000
> Aug 20 03:43:11 a01 kernel: CPU:    0
> Aug 20 03:43:11 a01 kernel: EIP:    0060:[dqput+14/338]    Not tainted VLI
> Aug 20 03:43:11 a01 kernel: EIP:    0060:[<c0176356>]    Not tainted VLI
> Aug 20 03:43:11 a01 kernel: EFLAGS: 00010206   (2.6.17.8 #1)
> Aug 20 03:43:11 a01 kernel: EIP is at dqput+0xe/0x152
> Aug 20 03:43:11 a01 kernel: eax: 02000000   ebx: 02000000   ecx: f5fd0c00   edx: 00000000

Looks like a single-bit error.  Try running memtest86 for 24 hours?
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ