lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 13 Nov 2006 20:34:43 +0100
From:	Martin Lorenz <martin@...enz.eu.org>
To:	linux-thinkpad@...ux-thinkpad.org
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [ltp] Re: paging request BUG in 2.6.19-rc5 on resume - X60s

On Mon, Nov 13, 2006 at 02:55:18PM +0100, Mike Galbraith wrote:
> 
> Per ksymoops, that code is:
>    0:   ba 03 00 00 00            mov    $0x3,%edx
>    5:   e9 ee fc fb ff            jmp    fffbfcf8 <_EIP+0xfffbfcf8>
>    a:   83 a0 2c 01 00 00 b7      andl   $0xffffffb7,0x12c(%eax)
>   11:   e9 00 00 00 00            jmp    16 <_EIP+0x16>
> 
> There is no such andl with an offset of 0x12c and that mask (I_LOCK|
> I_NEW?) anywhere in my kernel or modules.  How about yours?

$ objdump -D vmlinux | grep -5 'andl   $0xffffffb7,0x12c'
c016ff87:       05 2c 01 00 00          add    $0x12c,%eax
c016ff8c:       ba 03 00 00 00          mov    $0x3,%edx
c016ff91:       e9 ee fc fb ff          jmp    c012fc84 <wake_up_bit>

c016ff96 <unlock_new_inode>:
c016ff96:       83 a0 2c 01 00 00 b7    andl   $0xffffffb7,0x12c(%eax)
c016ff9d:       e9 e0 ff ff ff          jmp    c016ff82 <wake_up_inode>

c016ffa2 <inode_wait>:
c016ffa2:       e8 d1 3e 17 00          call   c02e3e78 <schedule>
c016ffa7:       31 c0                   xor    %eax,%eax

gruss
  mlo
--
Dipl.-Ing. Martin Lorenz

            They that can give up essential liberty 
	    to obtain a little temporary safety 
	    deserve neither liberty nor safety.
                                   Benjamin Franklin

please encrypt your mail to me
GnuPG key-ID: F1AAD37D
get it here:
http://blackhole.pca.dfn.de:11371/pks/lookup?op=get&search=0xF1AAD37D

ICQ UIN: 33588107
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ