lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 29 Jan 2007 19:56:05 -0800
From:	Andrew Morton <akpm@...l.org>
To:	Alan Cox <alan@...hat.com>
Cc:	Christoph Hellwig <hch@....de>, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] tty: cleanup release_mem

On Mon, 29 Jan 2007 14:06:04 -0500
Alan Cox <alan@...hat.com> wrote:

> On Mon, Jan 29, 2007 at 07:12:35PM +0100, Christoph Hellwig wrote:
> > Okay.  Now that we get into the details I've also added some renaming,
> > release_mem becomes release_tty and the new factored out function is
> > release_one_tty.  The difference is documented in the kdoc comments.
> > 
> > 
> > Signed-off-by: Christoph Hellwig <hch@....de>
> Acked-by: Alan Cox <alan@...hat.com>

VFS: Mounted root (ext3 filesystem) readonly.
Freeing unused kernel memory: 300k freed
Write protecting the kernel read-only data: 920k
BUG: unable to handle kernel paging request at virtual address 6b6b6bdf
 printing eip:
c02a91ec
*pde = 00000000
Oops: 0000 [#1]
SMP 
last sysfs file: /block/hdc/range
Modules linked in:
CPU:    0
EIP:    0060:[<c02a91ec>]    Not tainted VLI
EFLAGS: 00010286   (2.6.20-rc6-mm3 #1)
EIP is at release_tty+0x2c/0x40
eax: 6b6b6b6b   ebx: f71c860c   ecx: c0175e24   edx: 00000000
esi: 00000000   edi: 00000001   ebp: c222fe88   esp: c222fe80
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process init (pid: 1, ti=c222e000 task=c222cae0 task.ti=c222e000)
Stack: f71c860c 00000000 c222ff3c c02aac29 00000000 c22e453c c222fea0 00000006 
       c222fec4 002ad15c 00000000 00000001 00000000 00000000 00000000 00000001 
       c06650a0 000001d8 00000000 c222ff24 c013d53f c0178d34 f7c383c4 c222ff20 
Call Trace:
 [<c0103f7a>] show_trace_log_lvl+0x1a/0x30
 [<c0104038>] show_stack_log_lvl+0xa8/0xe0
 [<c0104259>] show_registers+0x1e9/0x2f0
 [<c010447a>] die+0x11a/0x250
 [<c0115580>] do_page_fault+0x2f0/0x5f0
 [<c03d74b4>] error_code+0x7c/0x84
 [<c02aac29>] release_dev+0x519/0x750
 [<c02aae72>] tty_release+0x12/0x20
 [<c017b8e4>] __fput+0xb4/0x180
 [<c017bb02>] fput+0x22/0x40
 [<c0178db7>] filp_close+0x47/0x70
 [<c0179f4d>] sys_close+0x6d/0xc0
 [<c0102edc>] sysenter_past_esp+0x5d/0x99
 =======================
Code: 89 e5 83 ec 08 89 1c 24 89 c3 89 74 24 04 89 d6 8b 80 fc 00 00 00 85 c0 74 05 e8 00 ff ff ff 89 f2 89 d8 e8 f7 fe ff ff 8b 43 04 <8b> 40 74 e8 8c b3 e9 ff 8b 1c 24 8b 74 24 04 89 ec 5d c3 90 55 
EIP: [<c02a91ec>] release_tty+0x2c/0x40 SS:ESP 0068:c222fe80
Kernel panic - not syncing: Attempted to kill init!
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ