lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 3 Dec 2007 08:12:43 -0800
From:	Arjan van de Ven <arjan@...radead.org>
To:	Kyle Rose <krose@...se.org>
Cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: OOPS at mm/rmap.c:628

On Mon, 03 Dec 2007 10:30:16 -0500
Kyle Rose <krose@...se.org> wrote:

> Not on the list, so please be sure to include me in any
> replies/comments/questions.
> 
> Thanks,
> Kyle
> 
> 
> 
> Ubuntu 2.6.22-14 source (2.6.22.9 with some other patches,
> presumably). x86_64
> Intel Core 2 Duo E6600
> 4G
> 
> 
> kern.log output:
> 
> Dec  3 06:10:02 kai kernel: [3080315.180287] ------------[ cut here
> ]------------
> Dec  3 06:10:02 kai kernel: [3080315.180289] kernel BUG at
> mm/rmap.c:628! Dec  3 06:10:02 kai kernel: [3080315.180292] invalid


Hi,

Thank you for your report.
there have been several reports (at least 8 on lkml already) of this
BUG() before for 2.6.22 (and a few before that), however nobody has
reported this in 2.6.23 or later, so it's very likely something that
this got fixed since in a later kernel....

Greetings,
    Arjan van de Ven

-- 
If you want to reach me at my work email, use arjan@...ux.intel.com
For development, discussion and tips for power savings, 
visit http://www.lesswatts.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ