lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 30 Jan 2008 20:23:17 +0000 (UTC)
From:	Sven Geggus <lists@...hsschwanzdomain.de>
To:	linux-kernel@...r.kernel.org
Subject: XFS oops in vanilla 2.6.24

Hi there,

I get the following with 2.6.24:

Ending clean XFS mount for filesystem: dm-0
BUG: unable to handle kernel paging request at virtual address f2134000
printing eip: c021a13a *pde = 010b5067 *pte = 32134000 
Oops: 0000 [#1] PREEMPT DEBUG_PAGEALLOC
Modules linked in: radeon drm rfcomm l2cap sym53c8xx scsi_transport_spi snd_via82xx 8139too snd_mpu401_uart snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc via_agp agpgart

Pid: 3889, comm: bash Not tainted (2.6.24 #3)
EIP: 0060:[<c021a13a>] EFLAGS: 00010282 CPU: 0
EIP is at xfs_file_readdir+0xfa/0x18c
EAX: 00000000 EBX: 000002f5 ECX: 00000020 EDX: 00000000
ESI: 00000000 EDI: f2133ff8 EBP: f227ff68 ESP: f227ff10
 DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
Process bash (pid: 3889, ti=f227e000 task=f7205a80 task.ti=f227e000)
Stack: 000002f5 00000000 2c000137 00000000 00000000 c0165358 f227ff94 f221c810 
       f2d85e48 00000000 00000000 00000000 000002f5 00000000 f2133000 00001000 
       00000ff8 000002f9 00000000 c0421c80 f221c810 f1cdbe48 f227ff88 c0165543 
Call Trace:
 [<c0104da3>] show_trace_log_lvl+0x1a/0x2f
 [<c0104e53>] show_stack_log_lvl+0x9b/0xa3
 [<c0104efb>] show_registers+0xa0/0x1e2
 [<c010514c>] die+0x10f/0x1dd
 [<c0113555>] do_page_fault+0x43a/0x519
 [<c040fe52>] error_code+0x6a/0x70
 [<c0165543>] vfs_readdir+0x5d/0x89
 [<c01655cd>] sys_getdents64+0x5e/0xa0
 [<c0103f06>] syscall_call+0x7/0xb
 =======================
Code: 89 74 24 04 81 e3 ff ff ff 7f 89 1c 24 ff 55 bc 85 c0 0f 85 82 00 00 00 8b 4f 10 31 d2 83 c1 1f 83 e1 f8 29 4d d0 19 55 d4 01 cf <8b> 57 08 8b 4f 0c 89 55 d8 89 4d dc 83 7d d4 00 7f a1 7c 06 83 
EIP: [<c021a13a>] xfs_file_readdir+0xfa/0x18c SS:ESP 0068:f227ff10
---[ end trace e518e1370efb695e ]---

Sven

-- 
"Software is like sex; it's better when it's free"
	                              (Linus Torvalds)

/me is giggls@...net, http://sven.gegg.us/ on the Web
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ