lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 25 Jan 2008 15:20:45 -0800
From:	"Yinghai Lu" <yhlu.kernel@...il.com>
To:	"Greg KH" <gregkh@...e.de>
Cc:	"Ingo Molnar" <mingo@...e.hu>, jacob.shin@....com,
	"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>,
	"Linus Torvalds" <torvalds@...ux-foundation.org>
Subject: Re: threshold_init_device/kobject_uevent_env oops

On Jan 25, 2008 3:08 PM, Greg KH <gregkh@...e.de> wrote:
> On Fri, Jan 25, 2008 at 11:35:56PM +0100, Ingo Molnar wrote:
..
> Also, can someone enable CONFIG_KOBJECT_DEBUG and send me the output of
> the startup of this code?  That should help explain what order things
> are happening it.

Calling initcall 0xffffffff80ba1dee: threshold_init_device+0x0/0x3f()
kobject: 'threshold_bank4' (ffff8108265450c0): kobject_add_internal:
parent: 'machinecheck0', set: '<NULL>'
kobject: 'misc0' (ffff810425497418): kobject_add_internal: parent:
'threshold_bank4', set: '<NULL>'
kobject: 'misc1' (ffff810425497498): kobject_add_internal: parent:
'threshold_bank4', set: '<NULL>'
kobject: 'misc2' (ffff810425497518): kobject_add_internal: parent:
'threshold_bank4', set: '<NULL>'
Unable to handle kernel NULL pointer dereference at 0000000000000018 RIP:
 [<ffffffff8045d443>] kobject_uevent_env+0x31/0x45f
PGD 0
Oops: 0000 [1] SMP
CPU 0
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.24-smp-g99f1c97d-dirty #2
RIP: 0010:[<ffffffff8045d443>]  [<ffffffff8045d443>]
kobject_uevent_env+0x31/0x45f
RSP: 0000:ffff81042645bb50  EFLAGS: 00010286
RAX: ffffffff809a2906 RBX: 0000000000000000 RCX: ffffffff8084b050
RDX: 0000000000000018 RSI: 0000000000000000 RDI: 0000000000000018
RBP: 0000000000000018 R08: ffff8108265ffaf0 R09: 00000000265ffaf0
R10: ffffc20002eb9ad0 R11: ffff8108265ffaf0 R12: 0000000000000000
R13: 0000000000000008 R14: 0000000000000000 R15: 0000000000000004
FS:  0000000000000000(0000) GS:ffffffff80b4f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 0000000000000018 CR3: 0000000000201000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 1, threadinfo ffff81042645a000, task ffff81082643c000)
Stack:  ffff8108265ffaf0 00000000802c7ffe ffffffff809a2906 ffffffff80a96f10
 ffff8108265ffc30 0000000000000000 ffff8108265ffaf0 ffff8108265450c0
 0000000000000004 ffffffff802c7b93 00000000265ffaf0 00000000c000040f
Call Trace:
 [<ffffffff802c7b93>] sysfs_add_file+0x5b/0x81
 [<ffffffff80215fcb>] allocate_threshold_blocks+0x184/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80215fb9>] allocate_threshold_blocks+0x172/0x1b0
 [<ffffffff80216236>] threshold_create_device+0x23f/0x32e
 [<ffffffff8023fede>] __mod_timer+0xc3/0xd3
 [<ffffffff80ba1e04>] threshold_init_device+0x16/0x3f
 [<ffffffff80b9963a>] kernel_init+0x175/0x2e1
 [<ffffffff8020cd48>] child_rip+0xa/0x12
 [<ffffffff80b994c5>] kernel_init+0x0/0x2e1
 [<ffffffff8020cd3e>] child_rip+0x0/0x12


Code: 48 8b 37 31 c0 48 c7 c7 34 68 9d 80 e8 80 aa dd ff 48 89 e8
RIP  [<ffffffff8045d443>] kobject_uevent_env+0x31/0x45f
 RSP <ffff81042645bb50>
CR2: 0000000000000018
---[ end trace 778e504de7e3b1e3 ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ