lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 14 May 2007 11:22:32 +0100
From:	Barry Scott <barry.scott@...lan.co.uk>
To:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Opss: 2.6.21-1.3116.ONELAN Kernel last sysfs file: /class/vc/vcsa7/dev

I'm testing the robustness of Xorg 1.3 server with intel 2.0 driver
by restarting the X and a set of apps every 30 seconds. After
about an hour this happened.

2.6.21-1.3116.ONELAN is the same as 2.6.21-1.3116 from FC7
but with the spec file change so that we can run the kernel on an FC4
system.

eth0: no IPv6 routers present
BUG: unable to handle kernel paging request at virtual address 6b6b6b6b
 printing eip:
6b6b6b6b
*pde = 00000000
Oops: 0000 [#1]
SMP
last sysfs file: /class/vc/vcsa7/dev
Modules linked in: ipv6(U) autofs4(U) usbvision(U) videodev(U) 
v4l2_common(U) v4l1_compat(U) i2c_core(U) video(U) dock(U) button(U) 
battery(U) ac(U) uhci_hcd(U) ehci_hcd(U) iTCO_wdt(U) 
iTCO_vendor_support(U) snd_hda_intel(U) snd_hda_codec(U) 
snd_seq_dummy(U) snd_seq_oss(U) snd_seq_midi_event(U) snd_seq(U) 
snd_seq_device(U) snd_pcm_oss(U) snd_mixer_oss(U) snd_pcm(U) 
snd_timer(U) snd(U) soundcore(U) snd_page_alloc(U) e1000(U) floppy(U) 
sr_mod(U) cdrom(U) ata_generic(U) ext3(U) jbd(U) mbcache(U) 
dm_snapshot(U) dm_zero(U) dm_mirror(U) dm_mod(U) ata_piix(U) libata(U) 
sd_mod(U) scsi_mod(U)
CPU:    0
EIP:    0060:[<6b6b6b6b>]    Not tainted VLI
EFLAGS: 00010202   (2.6.21-1.3116.ONELAN #1)
EIP is at 0x6b6b6b6b
eax: dc2588d4   ebx: 6b6b6b6b   ecx: cdf27000   edx: d4438c18
esi: dc2588d4   edi: c0711e94   ebp: d236df34   esp: d236df28
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udev (pid: 10208, ti=d236d000 task=ccccb550 task.ti=d236d000)
Stack: c05602bd cd383164 ce92457c d236df6c c04b6e2c c04421da c04849d0 
00000000
       de879e54 00001000 09e8e708 ce924598 d4438c18 dc2589ac d765dc24 
c04b6d8c
       09e8e708 d236df90 c047e706 d236df9c c0404fd4 00000000 00001000 
d765dc24
Call Trace:
 [<c0405e46>] show_trace_log_lvl+0x19/0x2e
 [<c0405ef8>] show_stack_log_lvl+0x9d/0xa5
 [<c04063bf>] show_registers+0x1d1/0x2a3
 [<c04066c3>] die+0x12a/0x204
 [<c0617fd9>] do_page_fault+0x3f5/0x4c1
 [<c061674c>] error_code+0x7c/0x84
 [<c04b6e2c>] sysfs_read_file+0xa0/0x14e
 [<c047e706>] vfs_read+0xaf/0x163
 [<c047f04d>] sys_read+0x3d/0x61
 [<c0404f8c>] syscall_call+0x7/0xb
 =======================
Code:  Bad EIP value.
EIP: [<6b6b6b6b>] 0x6b6b6b6b SS:ESP 0068:d236df28


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ