lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20061001161020.20e941c6@localhost>
Date:	Sun, 1 Oct 2006 16:10:20 +0200
From:	Paolo Ornati <ornati@...twebnet.it>
To:	Alan Stern <stern@...land.harvard.edu>
Cc:	Arkadiusz JaƂowiec <ajalowiec@...eria.pl>,
	<linux-kernel@...r.kernel.org>,
	<linux-usb-users@...ts.sourceforge.net>
Subject: Re: [Linux-usb-users] PROBLEM: Kernel 2.6.x freeze

On Sat, 30 Sep 2006 11:49:52 -0400 (EDT)
Alan Stern <stern@...land.harvard.edu> wrote:

> The alternative is that something caused a jump directly to the byte at 
> 2b.  Maybe a return address got corrupted on the stack; obviously there 
> aren't any direct jumps to that location.  I don't have a clue how to 
> track this any further.
> 
> We can rule out the possibility that the kernel's object code was
> corrupted.  The dump in the oops message agrees exactly with the objdump
> output.
> 
> The simplest answer is that Arkadiusz's CPU is a little flakey.  But 
> that would be too easy.


Another crazy theory (based on my horrible experience with a
defective memory module):

There is an hard to trigger single bit error not detected by memtest
near (physical) memory address 6b79f00(ESP) (where the EIP has been
retrived causing the Oops).

In this case the physical address (at Kb 110055) can be skipped with
"memmap=1K$110055K" kernel boot option.


Arkadiusz, can you try to add that option to kernel command line (in
lilo or grub config)? You can check if you've done it right with
	"dmesg | less"

At the begin there is the memory map provided by BIOS:

[    0.000000] BIOS-provided physical RAM map:
[    0.000000]  BIOS-e820: 0000000000000000 - 000000000009fc00 (usable)
[    0.000000]  BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved)
[    0.000000]  BIOS-e820: 00000000000e4000 - 0000000000100000 (reserved)
[    0.000000]  BIOS-e820: 0000000000100000 - 000000001ff30000 (usable)
[    0.000000]  BIOS-e820: 000000001ff30000 - 000000001ff40000 (ACPI data)
[    0.000000]  BIOS-e820: 000000001ff40000 - 000000001fff0000 (ACPI NVS)
[    0.000000]  BIOS-e820: 000000001fff0000 - 0000000020000000 (reserved)
[    0.000000]  BIOS-e820: 00000000fff80000 - 0000000100000000 (reserved)


Just after that there should be another memory map with an additional
line that marks the memory region [06B79C00 - 06B7A000] as reserved.

Then you can try again to make 2.6.18 crash.


And if the problem is still here I think that another kernel Oops text
can be useful: it can show if there is a common pattern (if you have a
digital camera you can take a screenshot of the screen avoiding the
hand-copy).

-- 
	Paolo Ornati
	Linux 2.6.18 on x86_64
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ