lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 30 Jan 2007 16:02:33 +0100
From:	Karsten Wiese <fzu@...gehoertderstaat.de>
To:	linux@...mer.net
Cc:	linux-kernel@...r.kernel.org, "Ingo Molnar" <mingo@...e.hu>
Subject: Re: [OOPS] on 2.6.20-rc5-rt10

Am Dienstag, 30. Januar 2007 15:30 schrieb Remy Bohmer:
> Hello All,
> 
> Once in a while we see the following stacktrace.
> We do not know yet the exact condition that generates this, but is
> there anyone that recognises this oops?
> 
> Kind Regards,
> 
> Remy Bohmer
> 
> 
> Jan 30 14:09:20 localhost kernel: BUG: unable to handle kernel paging
> request at virtual address 2e3277e5
> Jan 30 14:09:20 localhost kernel:  printing eip:
> Jan 30 14:09:20 localhost kernel: c0140214
> Jan 30 14:09:20 localhost kernel: *pde = 00000000
> Jan 30 14:09:20 localhost kernel: stopped custom tracer.
> Jan 30 14:09:20 localhost kernel: Oops: 0002 [#1]
> Jan 30 14:09:20 localhost kernel: PREEMPT SMP
> Jan 30 14:09:20 localhost kernel: Modules linked in: cap_over
> commoncap i2c_dev uhci_hcd i2c_i801 i2c_core ehci_hcd
> Jan 30 14:09:20 localhost kernel: CPU:    0
> Jan 30 14:09:20 localhost kernel: EIP:    0060:[<c0140214>]    Not tainted VLI
> Jan 30 14:09:20 localhost kernel: EFLAGS: 00010246   (2.6.20-rc5-rt10 #1)
> Jan 30 14:09:20 localhost kernel: EIP is at module_put+0x24/0x60
> Jan 30 14:09:20 localhost kernel: eax: 2e3277e5   ebx: f774da00   ecx:
> c1df40a0   edx: 2e327665
> Jan 30 14:09:20 localhost kernel: esi: f6e93af0   edi: 2e327665   ebp:
> f4a1bf40   esp: f4a1bf40
> Jan 30 14:09:20 localhost kernel: ds: 007b   es: 007b   ss: 0068
> preempt: 00000002
> Jan 30 14:09:20 localhost kernel: Process udevd (pid: 11594,
> ti=f4a1a000 task=f6014710 task.ti=f4a1a000)
> Jan 30 14:09:20 localhost kernel: Stack: f4a1bf54 c01a360e 00000010
> f5882ac0 f7e3f9c4 f4a1bf78 c01684f1 00000000
> Jan 30 14:09:20 localhost kernel:        00000000 f43d5c14 f7dc3c40
> f5882ac0 c1f60680 00000000 f4a1bf80 c0168629
> Jan 30 14:09:20 localhost kernel:        f4a1bf98 c01656f7 f4a1bfb0
> c1f60680 c1f60700 00000003 f4a1bfb0 c01669d9
> Jan 30 14:09:20 localhost kernel: Call Trace:
> Jan 30 14:09:20 localhost kernel:  [<c01054ca>] show_trace_log_lvl+0x1a/0x30
> Jan 30 14:09:20 localhost kernel:  [<c010559b>] show_stack_log_lvl+0xbb/0x100
> Jan 30 14:09:20 localhost kernel:  [<c01057c0>] show_registers+0x1e0/0x300
> Jan 30 14:09:20 localhost kernel:  [<c0105a05>] die+0x125/0x250
> Jan 30 14:09:20 localhost kernel:  [<c0115b75>] do_page_fault+0x145/0x610
> Jan 30 14:09:20 localhost kernel:  [<c03ee69c>] error_code+0x7c/0x84
> Jan 30 14:09:20 localhost kernel:  [<c01a360e>] sysfs_release+0x3e/0x70
> Jan 30 14:09:20 localhost kernel:  [<c01684f1>] __fput+0xa1/0x170
> Jan 30 14:09:20 localhost kernel:  [<c0168629>] fput+0x19/0x20
> Jan 30 14:09:20 localhost kernel:  [<c01656f7>] filp_close+0x47/0x70
> Jan 30 14:09:20 localhost kernel:  [<c01669d9>] sys_close+0x69/0xc0
> Jan 30 14:09:20 localhost kernel:  [<c0104472>] sysenter_past_esp+0x5f/0x85
> Jan 30 14:09:20 localhost kernel:  =======================
> Jan 30 14:09:20 localhost kernel: Code: 00 8d bf 00 00 00 00 55 85 c0
> 89 e5 89 c2 74 34 89 e0 25 00 e0 ff ff 83 40 14 01 65 a1 04 00 00 00
> c1 e0 07 8d 84 10 80 01 00 00 <ff> 08 83 3a 02 74 1b 89 e0 25 00 e0 ff
> ff 83 68 14 01 8b 40 08
> Jan 30 14:09:20 localhost kernel: EIP: [<c0140214>]
> module_put+0x24/0x60 SS:ESP 0068:f4a1bf40

I think I saw similar oopses.
Cause was a driver having freed some kmalloced struct _before_
sysfs_release had given its ok.
Happened on physical device removal or rmmod here.

      Karsten
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ