lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 03 Feb 2008 10:14:55 -0600
From:	Jack Byer <ojbyer@....net>
To:	linux-kernel@...r.kernel.org
Subject:  2.6.24 module problem

Trying to boot 2.6.24 produces the following error messages when udev is 
called:

VFS: Mounted root (xfs filesystem) readonly.
Freeing unused kernel memory: 208k freed
PAX: modprobe:752, uid/euid: 0/0, invalid execution attempt at 
ffffffff88018000 RIP:
  [<ffffffff88018000>] :videodev:videodev_init+0x0/0x87
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000beb63163
Oops: 0011 [1] PREEMPT SMP
CPU 1
Modules linked in: videodev v4l2_common v4l1_compat
Pid: 752, comm: modprobe Not tainted 2.6.24 #5
RIP: 0010:[<ffffffff88018000>]  [<ffffffff88018000>] 
:videodev:videodev_init+0x0/0x87
RSP: 0018:ffff8100bea53e50  EFLAGS: 00010286
RAX: ffffffff88018000 RBX: ffffffff8800f200 RCX: 00000000ffffffff
RDX: ffffffff8800f200 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e5e40 R08: 0000000000000000 R09: 0000000000000000
R10: ffff810010007960 R11: ffffffff80213440 R12: 0000000000000001
R13: ffff8100be4834e8 R14: ffffffff8800f200 R15: ffffc2000006d888
FS:  00002b42fd501b00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff88018000 CR3: 00000000befcd000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 752, threadinfo ffff8100bea52000, task 
ffff8100bef26e80)
Stack:  ffffffff8024ceeb 0000000000009e50 ffffffff8800f218 ffffffff88007840
  000000000000001a 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 000000000000000d
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff88015ec8>] :videodev:__kstrtab_video_register_device+0x18/0xf48
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 83 ec 08 48 c7 c7 70 56 01 88 31 c0 e8 ee 12 21 f8 48 c7
RIP  [<ffffffff88018000>] :videodev:videodev_init+0x0/0x87
  RSP <ffff8100bea53e50>
CR2: ffffffff88018000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:574, uid/euid: 0/0, invalid execution attempt at 
ffffffff8801f000 RIP:
  [<ffffffff8801f000>] :snd_page_alloc:snd_mem_init+0x0/0x32
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000bea0b163
Oops: 0011 [2] PREEMPT SMP
CPU 1
Modules linked in: snd_page_alloc videodev v4l2_common v4l1_compat
Pid: 574, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff8801f000>]  [<ffffffff8801f000>] 
:snd_page_alloc:snd_mem_init+0x0/0x32
RSP: 0018:ffff8100be891e50  EFLAGS: 00010286
RAX: ffffffff8801f000 RBX: ffffffff8801a040 RCX: 00000000ffffffff
RDX: ffffffff8801a040 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e5c60 R08: 0000000000000000 R09: 0000000000000000
R10: ffff81001000e960 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100beb424e8 R14: ffffffff8801a040 R15: ffffc200000698f0
FS:  00002b4323388b00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff8801f000 CR3: 00000000bee7e000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 574, threadinfo ffff8100be890000, task 
ffff8100beefa740)
Stack:  ffffffff8024ceeb 0000000000003b9c ffffffff8801a058 0000000000000202
  000000000000001a 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 000000000000000c
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff8801d0d8>] 
:snd_page_alloc:__kstrtab_snd_dma_alloc_pages+0x18/0xdec
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 83 ec 08 31 d2 be a4 01 00 00 48 c7 c7 a8 cd 01 88 e8 69
RIP  [<ffffffff8801f000>] :snd_page_alloc:snd_mem_init+0x0/0x32
  RSP <ffff8100be891e50>
CR2: ffffffff8801f000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:774, uid/euid: 0/0, invalid execution attempt at 
ffffffff880335eb RIP:
  [<ffffffff880335eb>] :processor:acpi_processor_init+0x0/0xa3
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000beaa9163
Oops: 0011 [3] PREEMPT SMP
CPU 1
Modules linked in: processor bitrev crc32 snd_page_alloc videodev 
v4l2_common v4l1_compat
Pid: 774, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff880335eb>]  [<ffffffff880335eb>] 
:processor:acpi_processor_init+0x0/0xa3
RSP: 0018:ffff8100bf9c5e50  EFLAGS: 00010286
RAX: ffffffff880335eb RBX: ffffffff88029440 RCX: 00000000ffffffff
RDX: ffffffff88029440 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e5a80 R08: 0000000000000000 R09: 0000000000000000
R10: ffff81001000e960 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100beb42ef8 R14: ffffffff88029440 R15: ffffc2000006c7e0
FS:  00002ab7c17f9b00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff880335eb CR3: 00000000beb35000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 774, threadinfo ffff8100bf9c4000, task 
ffff8100bfaae000)
Stack:  ffffffff8024ceeb 000000000000a1bc ffffffff88029458 0000000000000202
  0000000000000026 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 0000001300000010
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff8802fcd0>] :processor:__param_max_cstate+0x28/0x1f94
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 53 bb 10 00 00 00 31 c0 fc 48 89 d9 48 c7 c7 c0 98 02 88 31
RIP  [<ffffffff880335eb>] :processor:acpi_processor_init+0x0/0xa3
  RSP <ffff8100bf9c5e50>
CR2: ffffffff880335eb
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:576, uid/euid: 0/0, invalid execution attempt at 
ffffffff8803a000 RIP:
  [<ffffffff8803a000>] :pata_ali:ali_init+0x0/0x1a
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000beb7e163
Oops: 0011 [4] PREEMPT SMP
CPU 1
Modules linked in: pata_ali processor bitrev crc32 snd_page_alloc 
videodev v4l2_common v4l1_compat
Pid: 576, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff8803a000>]  [<ffffffff8803a000>] 
:pata_ali:ali_init+0x0/0x1a
RSP: 0018:ffff8100be8d5e50  EFLAGS: 00010286
RAX: ffffffff8803a000 RBX: ffffffff88035840 RCX: 00000000ffffffff
RDX: ffffffff88035840 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e5ae0 R08: 0000000000000000 R09: 0000000000000000
R10: ffff81001000e960 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100be8773e0 R14: ffffffff88035840 R15: ffffc20000069d98
FS:  00002b5c35c7db00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff8803a000 CR3: 00000000bed88000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 576, threadinfo ffff8100be8d4000, task 
ffff8100bfaae740)
Stack:  ffffffff8024ceeb 0000000000004442 ffffffff88035858 0000000000000202
  0000000000000016 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 0000000000000000
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff88037e10>] :pata_ali:ali+0xd0/0x102a
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 c7 c2 a4 7d 03 88 48 c7 c6 40 58 03 88 48 c7 c7 00 50 03
RIP  [<ffffffff8803a000>] :pata_ali:ali_init+0x0/0x1a
  RSP <ffff8100be8d5e50>
CR2: ffffffff8803a000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:607, uid/euid: 0/0, invalid execution attempt at 
ffffffff88040000 RIP:
  [<ffffffff88040000>] :hwmon:hwmon_init+0x0/0x45
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000bef5b163
Oops: 0011 [5] PREEMPT SMP
CPU 1
Modules linked in: hwmon pata_ali processor bitrev crc32 snd_page_alloc 
videodev v4l2_common v4l1_compat
Pid: 607, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff88040000>]  [<ffffffff88040000>] 
:hwmon:hwmon_init+0x0/0x45
RSP: 0000:ffff8100be9a1e50  EFLAGS: 00010286
RAX: ffffffff88040000 RBX: ffffffff8803c040 RCX: 00000000ffffffff
RDX: ffffffff8803c040 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e59c0 R08: 0000000000000000 R09: 0000000000000020
R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000001
R13: ffff8100beb43490 R14: ffffffff8803c040 R15: ffffc200000689b8
FS:  00002ab5f156eb00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff88040000 CR3: 00000000beecb000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 607, threadinfo ffff8100be9a0000, task 
ffff8100be958e80)
Stack:  ffffffff8024ceeb 00000000000019b8 ffffffff8803c058 0000000000000202
  0000000000000017 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 000000000000000b 0000000000000000
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff8803e218>] :hwmon:__kstrtab_hwmon_device_register+0x18/0x680
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 83 ec 08 48 c7 c6 80 e1 03 88 48 c7 c7 40 c0 03 88 e8 89
RIP  [<ffffffff88040000>] :hwmon:hwmon_init+0x0/0x45
  RSP <ffff8100be9a1e50>
CR2: ffffffff88040000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:844, uid/euid: 0/0, invalid execution attempt at 
ffffffff88046000 RIP:
  [<ffffffff88046000>] :fan:acpi_fan_init+0x0/0x5f
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000befb0163
Oops: 0011 [6] PREEMPT SMP
CPU 1
Modules linked in: fan hwmon pata_ali processor bitrev crc32 
snd_page_alloc videodev v4l2_common v4l1_compat
Pid: 844, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff88046000>]  [<ffffffff88046000>] 
:fan:acpi_fan_init+0x0/0x5f
RSP: 0018:ffff8100beb0be50  EFLAGS: 00010286
RAX: ffffffff88046000 RBX: ffffffff88042200 RCX: 00000000ffffffff
RDX: ffffffff88042200 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e5960 R08: 0000000000000000 R09: 0000000000000000
R10: ffff81001000e960 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100be877be0 R14: ffffffff88042200 R15: ffffc20000068dd8
FS:  00002ae3401a7b00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff88046000 CR3: 00000000beba7000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 844, threadinfo ffff8100beb0a000, task 
ffff8100befe35c0)
Stack:  ffffffff8024ceeb 000000000000216f ffffffff88042218 0000000000000202
  0000000000000016 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 0000000000000000
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff880444d8>] :fan:fan_device_ids+0xb8/0x887
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 83 ec 08 48 8b 35 fd a4 b0 f8 48 c7 c7 50 44 04 88 e8 69
RIP  [<ffffffff88046000>] :fan:acpi_fan_init+0x0/0x5f
  RSP <ffff8100beb0be50>
CR2: ffffffff88046000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:756, uid/euid: 0/0, invalid execution attempt at 
ffffffff88052000 RIP:
  [<ffffffff88052000>] :r8169:rtl8169_init_module+0x0/0x1a
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000beba7163
Oops: 0011 [7] PREEMPT SMP
CPU 1
Modules linked in: r8169 fan hwmon pata_ali processor bitrev crc32 
snd_page_alloc videodev v4l2_common v4l1_compat
Pid: 756, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff88052000>]  [<ffffffff88052000>] 
:r8169:rtl8169_init_module+0x0/0x1a
RSP: 0018:ffff8100beb21e50  EFLAGS: 00010286
RAX: ffffffff88052000 RBX: ffffffff88048300 RCX: 00000000ffffffff
RDX: ffffffff88048300 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100be8e50c0 R08: 0000000000000000 R09: 0000000000000000
R10: ffff81001000c680 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100beb43d40 R14: ffffffff88048300 R15: ffffc2000006dad8
FS:  00002acac1447b00(0000) GS:ffff8100bf80d400(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff88052000 CR3: 00000000bee90000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 756, threadinfo ffff8100beb20000, task 
ffff8100be9c4000)
Stack:  ffffffff8024ceeb 000000000000a8ba ffffffff88048318 ffffffff88021400
  000000000000001d 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 0000000000000000 0000000000000000
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff8804eca8>] :r8169:__param_rx_copybreak+0x28/0x220a
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 c7 c2 35 eb 04 88 48 c7 c6 00 83 04 88 48 c7 c7 20 80 04
RIP  [<ffffffff88052000>] :r8169:rtl8169_init_module+0x0/0x1a
  RSP <ffff8100beb21e50>
CR2: ffffffff88052000
---[ end trace 540a4f9a60758d44 ]---
PAX: modprobe:572, uid/euid: 0/0, invalid execution attempt at 
ffffffff8805c000 RIP:
  [<ffffffff8805c000>] :i2c_core:i2c_init+0x0/0x30
PGD 4a2067 PUD 4a6063 PMD be865063 PTE 80000000be99f163
Oops: 0011 [8] PREEMPT SMP
CPU 0
Modules linked in: i2c_core r8169 fan hwmon pata_ali processor bitrev 
crc32 snd_page_alloc videodev v4l2_common v4l1_compat
Pid: 572, comm: modprobe Tainted: G      D 2.6.24 #5
RIP: 0010:[<ffffffff8805c000>]  [<ffffffff8805c000>] 
:i2c_core:i2c_init+0x0/0x30
RSP: 0000:ffff8100be86be50  EFLAGS: 00010286
RAX: ffffffff8805c000 RBX: ffffffff88054500 RCX: 00000000ffffffff
RDX: ffffffff88054500 RSI: 0000000000000001 RDI: ffffffff80580900
RBP: ffff8100bf91c660 R08: 0000000000000000 R09: ffff8100bf840798
R10: ffff810010005680 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8100bf8afd40 R14: ffffffff88054500 R15: ffffc2000006bae0
FS:  00002b6fcf628b00(0000) GS:ffffffff805a6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff8805c000 CR3: 00000000be428000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 572, threadinfo ffff8100be86a000, task 
ffff8100beefb5c0)
Stack:  ffffffff8024ceeb 0000000000008248 ffffffff88054518 0000000000000202
  000000000000001c 0000000000000000 0000000000000000 0000000000000000
  0000000000000000 0000000000000000 000000000000000f 000000000000000d
Call Trace:
  [<ffffffff8024ceeb>] sys_init_module+0x19b/0x1b20
  [<ffffffff8027f1c5>] vfs_read+0xc5/0x160
  [<ffffffff88058e78>] :i2c_core:__kstrtab_i2c_new_device+0x12/0x1ff2
  [<ffffffff80202e0e>] system_call+0x7e/0x83


Code: 48 83 ec 08 48 c7 c7 c0 41 05 88 e8 b0 16 35 f8 85 c0 74 0c
RIP  [<ffffffff8805c000>] :i2c_core:i2c_init+0x0/0x30
  RSP <ffff8100be86be50>
CR2: ffffffff8805c000
---[ end trace 540a4f9a60758d44 ]---

View attachment "2.6.24.config" of type "text/plain" (38877 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ