lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 30 Jan 2007 15:30:30 +0100
From:	"Remy Bohmer" <l.pinguin@...il.com>
To:	linux-kernel@...r.kernel.org
Cc:	"Ingo Molnar" <mingo@...e.hu>
Subject: [OOPS] on 2.6.20-rc5-rt10

Hello All,

Once in a while we see the following stacktrace.
We do not know yet the exact condition that generates this, but is
there anyone that recognises this oops?

Kind Regards,

Remy Bohmer


Jan 30 14:09:20 localhost kernel: BUG: unable to handle kernel paging
request at virtual address 2e3277e5
Jan 30 14:09:20 localhost kernel:  printing eip:
Jan 30 14:09:20 localhost kernel: c0140214
Jan 30 14:09:20 localhost kernel: *pde = 00000000
Jan 30 14:09:20 localhost kernel: stopped custom tracer.
Jan 30 14:09:20 localhost kernel: Oops: 0002 [#1]
Jan 30 14:09:20 localhost kernel: PREEMPT SMP
Jan 30 14:09:20 localhost kernel: Modules linked in: cap_over
commoncap i2c_dev uhci_hcd i2c_i801 i2c_core ehci_hcd
Jan 30 14:09:20 localhost kernel: CPU:    0
Jan 30 14:09:20 localhost kernel: EIP:    0060:[<c0140214>]    Not tainted VLI
Jan 30 14:09:20 localhost kernel: EFLAGS: 00010246   (2.6.20-rc5-rt10 #1)
Jan 30 14:09:20 localhost kernel: EIP is at module_put+0x24/0x60
Jan 30 14:09:20 localhost kernel: eax: 2e3277e5   ebx: f774da00   ecx:
c1df40a0   edx: 2e327665
Jan 30 14:09:20 localhost kernel: esi: f6e93af0   edi: 2e327665   ebp:
f4a1bf40   esp: f4a1bf40
Jan 30 14:09:20 localhost kernel: ds: 007b   es: 007b   ss: 0068
preempt: 00000002
Jan 30 14:09:20 localhost kernel: Process udevd (pid: 11594,
ti=f4a1a000 task=f6014710 task.ti=f4a1a000)
Jan 30 14:09:20 localhost kernel: Stack: f4a1bf54 c01a360e 00000010
f5882ac0 f7e3f9c4 f4a1bf78 c01684f1 00000000
Jan 30 14:09:20 localhost kernel:        00000000 f43d5c14 f7dc3c40
f5882ac0 c1f60680 00000000 f4a1bf80 c0168629
Jan 30 14:09:20 localhost kernel:        f4a1bf98 c01656f7 f4a1bfb0
c1f60680 c1f60700 00000003 f4a1bfb0 c01669d9
Jan 30 14:09:20 localhost kernel: Call Trace:
Jan 30 14:09:20 localhost kernel:  [<c01054ca>] show_trace_log_lvl+0x1a/0x30
Jan 30 14:09:20 localhost kernel:  [<c010559b>] show_stack_log_lvl+0xbb/0x100
Jan 30 14:09:20 localhost kernel:  [<c01057c0>] show_registers+0x1e0/0x300
Jan 30 14:09:20 localhost kernel:  [<c0105a05>] die+0x125/0x250
Jan 30 14:09:20 localhost kernel:  [<c0115b75>] do_page_fault+0x145/0x610
Jan 30 14:09:20 localhost kernel:  [<c03ee69c>] error_code+0x7c/0x84
Jan 30 14:09:20 localhost kernel:  [<c01a360e>] sysfs_release+0x3e/0x70
Jan 30 14:09:20 localhost kernel:  [<c01684f1>] __fput+0xa1/0x170
Jan 30 14:09:20 localhost kernel:  [<c0168629>] fput+0x19/0x20
Jan 30 14:09:20 localhost kernel:  [<c01656f7>] filp_close+0x47/0x70
Jan 30 14:09:20 localhost kernel:  [<c01669d9>] sys_close+0x69/0xc0
Jan 30 14:09:20 localhost kernel:  [<c0104472>] sysenter_past_esp+0x5f/0x85
Jan 30 14:09:20 localhost kernel:  =======================
Jan 30 14:09:20 localhost kernel: Code: 00 8d bf 00 00 00 00 55 85 c0
89 e5 89 c2 74 34 89 e0 25 00 e0 ff ff 83 40 14 01 65 a1 04 00 00 00
c1 e0 07 8d 84 10 80 01 00 00 <ff> 08 83 3a 02 74 1b 89 e0 25 00 e0 ff
ff 83 68 14 01 8b 40 08
Jan 30 14:09:20 localhost kernel: EIP: [<c0140214>]
module_put+0x24/0x60 SS:ESP 0068:f4a1bf40
Jan 30 14:09:20 localhost kernel:  <3>BUG: scheduling while atomic:
udevd/0x10000001/11594, CPU#0
Jan 30 14:09:20 localhost kernel:  [<c01054ca>] show_trace_log_lvl+0x1a/0x30
Jan 30 14:09:20 localhost kernel:  [<c0105c52>] show_trace+0x12/0x20
Jan 30 14:09:20 localhost kernel:  [<c0105d26>] dump_stack+0x16/0x20
Jan 30 14:09:20 localhost kernel:  [<c03ec386>] __schedule+0xdd6/0xf90
Jan 30 14:09:20 localhost kernel:  [<c0119f27>] __cond_resched+0x17/0x30
Jan 30 14:09:20 localhost kernel:  [<c03ecc9a>] cond_resched+0x2a/0x40
Jan 30 14:09:20 localhost kernel:  [<c0120f1a>] put_files_struct+0x9a/0xb0
Jan 30 14:09:20 localhost kernel:  [<c012206b>] do_exit+0x11b/0x800
Jan 30 14:09:20 localhost kernel:  [<c0105b1b>] die+0x23b/0x250
Jan 30 14:09:20 localhost kernel:  [<c0115b75>] do_page_fault+0x145/0x610
Jan 30 14:09:20 localhost kernel:  [<c03ee69c>] error_code+0x7c/0x84
Jan 30 14:09:20 localhost kernel:  [<c01a360e>] sysfs_release+0x3e/0x70
Jan 30 14:09:20 localhost kernel:  [<c01684f1>] __fput+0xa1/0x170
Jan 30 14:09:20 localhost kernel:  [<c0168629>] fput+0x19/0x20
Jan 30 14:09:20 localhost kernel:  [<c01656f7>] filp_close+0x47/0x70
Jan 30 14:09:20 localhost kernel:  [<c01669d9>] sys_close+0x69/0xc0
Jan 30 14:09:20 localhost kernel:  [<c0104472>] sysenter_past_esp+0x5f/0x85
Jan 30 14:09:20 localhost kernel:  =======================
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists