lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200706101700.08985.caglar@pardus.org.tr>
Date:	Sun, 10 Jun 2007 17:00:08 +0300
From:	"S.Çağlar Onur" <caglar@...dus.org.tr>
To:	Arkadiusz Miskiewicz <arekm@...en.pl>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: cat /dev/snapshot == OOPs

10 Haz 2007 Paz tarihinde, Arkadiusz Miskiewicz şunları yazmıştı: 
> sudo cat /dev/snapshot

Same here with Linus's latest (although mine is tainted)

[11028.693171] swsusp: Basic memory bitmaps created
[11028.693219] BUG: unable to handle kernel NULL pointer dereference at 
virtual address 0000000c
[11028.693227]  printing eip:
[11028.693230] c0148b33
[11028.693232] *pde = 00000000
[11028.693237] Oops: 0000 [#1]
[11028.693240] SMP
[11028.693244] Modules linked in: isofs zlib_inflate af_packet snd_pcm_oss 
snd_mixer_oss snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq 
snd_seq_device snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc 
nvidia(P) uvcvideo compat_ioctl32 videodev v4l1_compat v4l2_common hci_usb 
bluetooth intel_agp agpgart tsdev usbhid hid ff_memless sdhci mmc_core 
i2c_i801 i2c_core joydev iTCO_wdt iTCO_vendor_support firewire_ohci 
firewire_core crc_itu_t e100 mii ipw3945 ieee80211 ieee80211_crypt 
firmware_class serio_raw cpufreq_ondemand cpufreq_userspace cpufreq_powersave 
acpi_cpufreq freq_table rtc_cmos rtc_core rtc_lib ext3 jbd mbcache sr_mod 
cdrom sd_mod ata_generic ehci_hcd ata_piix ohci1394 ieee1394 uhci_hcd usbcore 
ahci libata scsi_mod
[11028.693331] CPU:    0
[11028.693332] EIP:    0060:[<c0148b33>]    Tainted: P       VLI
[11028.693335] EFLAGS: 00010206   (2.6.22-rc4-CFS-v16 #4)
[11028.693344] EIP is at memory_bm_position_reset+0x5/0x1a
[11028.693349] eax: c03d808c   ebx: c03d80e0   ecx: 00000002   edx: 00000000
[11028.693355] esi: c57f6d80   edi: 08051000   ebp: 00001000   esp: e0383f50
[11028.693359] ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
[11028.693365] Process cat (pid: 13165, ti=e0382000 task=f6109800 
task.ti=e0382000)
[11028.693368] Stack: c0149882 08051000 c03d80e0 c57f6d80 08051000 00000000 
c014ae82 00001000
[11028.693381]        c57f6d80 c02b4d00 c0174664 e0383fa0 f6109800 08051000 
c57f6d80 fffffff7
[11028.693393]        08051000 e0382000 c01749a8 e0383fa0 00000000 00000000 
00000000 00000003
[11028.693404] Call Trace:
[11028.693408]  [<c0149882>] snapshot_read_next+0x6b/0x164
[11028.693425]  [<c014ae82>] snapshot_read+0x11/0x45
[11028.693438]  [<c0174664>] vfs_read+0xb1/0x15b
[11028.693456]  [<c01749a8>] sys_read+0x41/0x67
[11028.693471]  [<c0103dd0>] syscall_call+0x7/0xb
[11028.693505]  =======================
[11028.693507] Code: 74 07 89 f8 e8 5d 04 00 00 31 d2 89 f8 e8 13 2d 01 00 89 
f2 eb b4 31 c0 b9 04 00 00 00 89 df f3 ab 5b 5e 5f 5d c3 8b 10 89 50 08 <8b> 
52 0c c7 40 10 00 00 00 00 c7 40 14 ff ff ff ff 89 50 0c c3
[11028.693561] EIP: [<c0148b33>] memory_bm_position_reset+0x5/0x1a SS:ESP 
0068:e0383f50
[11028.707698] swsusp: Basic memory bitmaps freed

Cheers
-- 
S.Çağlar Onur <caglar@...dus.org.tr>
http://cekirdek.pardus.org.tr/~caglar/

Linux is like living in a teepee. No Windows, no Gates and an Apache in house!

Download attachment "signature.asc " of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ