lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200712201937.34536.volker.armin.hemmann@tu-clausthal.de>
Date:	Thu, 20 Dec 2007 19:37:34 +0100
From:	"Hemmann, Volker Armin" <volker.armin.hemmann@...clausthal.de>
To:	David Newall <david@...idnewall.com>
Cc:	Scott <linux-kernel@...ecamel.eml.cc>, linux-kernel@...r.kernel.org
Subject: Re: almost daily Kernel oops with 2.6.23.9 - and now 2.6.23.11 as well

On Donnerstag, 20. Dezember 2007, David Newall wrote:
> >>> On Montag, 17. Dezember 2007, you wrote:
> >>>
> >>> and another one, this time tainted with the nvidia module:
> >>> 5194.130985] Unable to handle kernel paging request at 0000030000000000
> >>> RIP:
>
> Numbers like that don't suggest hardware faults.  All those zeros: It's
> far too round.  Sounds very like software.  In fact, it sounds like the
> start of significant hardware region.   And lo! there's a closed-source,
> possibly buggy nvidia module.  Try another; older or newer are equally
> good.

and this one was without the nvidia module:
http://marc.info/?l=linux-kernel&m=119790371708690&w=2

and the first one I reported, was without nvidia and not-tainted too:
http://marc.info/?l=linux-kernel&m=119776365425514&w=2

I am not a complete idiot. If I have a problem, I try to reproduce without 
nvidia first (after a clean shutdown and boot, with the module not even on 
harddisk). And I reproduced it without the module. The last oops with the 
module was just an example that it does not matter if the module is loaded or 
not and to (maybe) give some additional information.

Glück Auf,
Volker
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ