lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 5 Jan 2008 15:34:25 +0100
From:	Mikael Pettersson <mikpe@...uu.se>
To:	Alexander Shaduri <ashaduri@...il.com>
Cc:	Al Viro <viro@...IV.linux.org.uk>, linux-kernel@...r.kernel.org
Subject: Re: BUG: unable to handle kernel paging request at virtual address

Alexander Shaduri writes:
 > On Sat, 5 Jan 2008 09:10:12 +0000
 > Al Viro <viro@...IV.linux.org.uk> wrote:
 > 
 > > and we have q->page == 0x48464443.  Seeing how we assign that sucker, that
 > > smells like we've got a page on quicklist with {0x43, 0x44, 0x46, 0x48}
 > > in its first 4 bytes.  Instead of having address of the next page stored
 > > in there...
 > > 
 > > Do other oopsen of the same kind give the same value?
 > 
 > I've got another oops here with a different value. This time a bttv message
 > preceded it. Note that the oops happened shortly *after* I stopped capturing
 > (watching the tv through mplayer).
 > 
 > Output of dmesg:
 > 
 > bttv0: OCERR @ 375e2014,bits: HSYNC OFLOW FDSR OCERR*
 > (two pages of the same message here)
 > 
 > bttv0: OCERR @ 375e2014,bits: HSYNC OFLOW FDSR OCERR*
 > bttv0: OCERR @ 375e2014,bits: HSYNC OFLOW FBUS FDSR OCERR*
 > BUG: unable to handle kernel paging request at virtual address 23232323
 >  printing eip:
 > c011d6f8
 > *pde = 00000000
 > Oops: 0000 [#1]
 > PREEMPT SMP
 > Modules linked in: ppp_generic slhc iptable_filter ip_tables ip6table_filter ip6_tables x_tables ipv6 cpufreq_conservative cpufreq_ondemand cpufreq_userspace cpufreq_powersave powernow_k8 freq_table snd_pcm_oss snd_mixer_oss snd_seq_midi snd_emu10k1_synth snd_emux_synth snd_seq_virmidi snd_seq_midi_event snd_seq_midi_emul snd_seq capability commoncap fuse nls_koi8_r nls_cp866 loop dm_mod binfmt_misc uhci_hcd it87 hwmon_vid eeprom nvidia(P) tuner tvaudio snd_emu10k1 bttv snd_rawmidi snd_ac97_codec video_buf firmware_class ir_common ac97_bus snd_pcm snd_seq_device compat_ioctl32 i2c_algo_bit snd_timer snd_page_alloc emu10k1_gp snd_util_mem btcx_risc tveeprom videodev gameport ohci1394 ieee1394 ide_cd snd_hwdep snd v4l2_common v4l1_compat agpgart soundcore i2c_nforce2 thermal button rtc_cmos rtc_core rtc_lib forcedeth k8temp i2c_core hwmon cdrom sg ohci_hcd ehci_hcd usbcore edd fan processor pata_amd
 > CPU:    0
 > EIP:    0060:[<c011d6f8>]    Tainted: P        VLI

This kernel is tainted by the nvidia module...
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ