lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 20 Sep 2006 15:33:01 -0500
From:	"K.R. Foley" <kr@...sft.com>
To:	Ingo Molnar <mingo@...e.hu>
CC:	linux-kernel@...r.kernel.org, Thomas Gleixner <tglx@...utronix.de>,
	John Stultz <johnstul@...ibm.com>,
	"Paul E. McKenney" <paulmck@...ibm.com>,
	Dipankar Sarma <dipankar@...ibm.com>,
	Arjan van de Ven <arjan@...radead.org>
Subject: Re: 2.6.18-rt1

Ingo Molnar wrote:
> * K.R. Foley <kr@...sft.com> wrote:
> 
>> Ingo Molnar wrote:
>>> I'm pleased to announce the 2.6.18-rt1 tree, which can be downloaded 
>>> from the usual place:
>>>
>>>    http://redhat.com/~mingo/realtime-preempt/
>>>
>> I got the following oops when trying to boot the above. Config is attached.
> 
> maybe it's not the right kernel image (2.6.17):
> 
>> EFLAGS: 00010297   (2.6.17-rt8 #4)
> 
> mixed with 2.6.18 modules?
> 
> 	Ingo
> 

DOH! The log had two different boots in it. :( Let's try this again. By
the way, you may notice from my screw up that this is pretty much the
same oops that I got with 2.6.17-rt*. I have been getting this on all of
my SMP systems since we went past 2.6.16.

EXT3-fs: mounted filesystem with ordered data mode.
BUG: unable to handle kernel paging request at virtual address f3010000
 printing eip:
*pde = 00000000
Oops: 0000 [#1]
PREEMPT SMP
Modules linked in:
CPU:    1
EIP:    0060:[<c0131e02>]    Not tainted VLI
EFLAGS: 00010283   (2.6.18-rt2 #4)
EIP is at lookup_symbol+0x11/0x35
eax: 00000001   ebx: e0830e08   ecx: c036ff60   edx: c036dd94
esi: f3010000   edi: e0830e08   ebp: df657e74   esp: df657e68
ds: 007b   es: 007b   ss: 0068   preempt: 00000001
Process modprobe (pid: 1366, ti=df656000 task=dfc68e90 task.ti=df656000)
Stack: e083c780 00000c00 e0830e08 df657e90 c0131e6f df657ea8 df657ea4
e083c780
       00000c00 e0830e08 df657eb8 c0132c21 00000001 00000012 e082d074
00000000
       df657ecc e083a434 00000c00 e082d074 df657edc c0133188 e083c780
00000000
Call Trace:
 [<c01037a1>] show_stack_log_lvl+0x87/0x8f
 [<c010391b>] show_registers+0x12f/0x198
 [<c0103b0c>] die+0x114/0x1c6
 [<c0111196>] do_page_fault+0x3f2/0x4c8
 [<c0103481>] error_code+0x39/0x40
 [<c0131e6f>] __find_symbol+0x25/0x2a5
 [<c0132c21>] resolve_symbol+0x27/0x5f
 [<c0133188>] simplify_symbols+0x83/0xf3
 [<c0133e65>] load_module+0x720/0xbb8
 [<c013435f>] sys_init_module+0x3f/0x1b5
 [<c0102969>] sysenter_past_esp+0x56/0x79
Code: eb 11 8b 75 f0 41 83 c2 28 0f b7 46 30 39 c1 72 c9 31 c0 5a 59 5b
5e 5f 5d c3 55 89 e5 57 56 53 89 c3 39 ca 73 22 8b 72 04 89 df <ac> ae
75 08 84 c0 75 f8 31 c0 eb 04 19 c0 0c 01 85 c0 75 04 89
EIP: [<c0131e02>] lookup_symbol+0x11/0x35 SS:ESP 0068:df657e68


-- 
   kr

View attachment "config-2.6.18-rt2" of type "text/plain" (39836 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ