lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 06 May 2008 00:33:04 +0200
From:	thomas@...3r.de
To:	linux-kernel@...r.kernel.org
Subject: BUG: unable to handle kernel paging request

See also attached config and dmesg:


[  706.684483] BUG: unable to handle kernel paging request at fa4213d8
[  706.684488] IP: [<f8b9e4f3>] :oprofile:alloc_cpu_buffers+0x39/0xce
[  706.684496] *pde = 00000000 
[  706.684500] Oops: 0002 [#1] SMP 
[  706.684502] last sysfs file: /sys/devices/pci0000:00/0000:00:09.0/irq
[  706.684505] Modules linked in: oprofile cpufreq_stats rfcomm l2cap bluetooth
autofs4 fuse sunrpc nf_conntrack_netbios_ns nf_conntrack_ipv4 xt_state
nf_conntrack ipt_REJECT iptable_filter ip_tables xt_tcpudp ip6t_REJECT
ip6table_filter ip6_tables x_tables cpufreq_ondemand dm_crypt ext2 dm_mirror
dm_log dm_multipath scsi_dh dm_mod ipv6 snd_hda_intel snd_seq_dummy snd_seq_oss
snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss forcedeth
snd_pcm snd_timer snd_page_alloc snd_hwdep pcspkr k8temp snd soundcore button
i2c_nforce2 i2c_core mtd chipreg map_funcs serio_raw hwmon sg pata_amd
pata_acpi ata_generic libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd
ehci_hcd [last unloaded: scsi_wait_scan]
[  706.684537] 
[  706.684539] Pid: 7857, comm: oprofiled Not tainted (2.6.26-rc1-next-20080505
#21)
[  706.684542] EIP: 0060:[<f8b9e4f3>] EFLAGS: 00210286 CPU: 0
[  706.684547] EIP is at alloc_cpu_buffers+0x39/0xce [oprofile]
[  706.684550] EAX: f8ba6000 EBX: fa4213c0 ECX: f8b9e4f1 EDX: 00000000
[  706.684552] ESI: 00000000 EDI: 00002000 EBP: 00010000 ESP: f45cfe98
[  706.684554]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  706.684556] Process oprofiled (pid: 7857, ti=f45cf000 task=f6314f00
task.ti=f45cf000)
[  706.684558] Stack: ffffffea f6228180 00000000 f8b9ec99 f8b9e119 ffffffea
f6228180 f8b9ecd2 
[  706.684563]        f6228180 f3363988 c047f42d f453cd80 f29cf3b8 f45cff14
f6228180 f45cff14 
[  706.684568]        00000001 c047f543 f6228180 00000000 00000000 f45cff14
c0489f07 00000000 
[  706.684572] Call Trace:
[  706.684575]  [<f8b9ec99>] event_buffer_open+0x0/0x55 [oprofile]
[  706.684582]  [<f8b9e119>] oprofile_setup+0x11/0x84 [oprofile]
[  706.684588]  [<f8b9ecd2>] event_buffer_open+0x39/0x55 [oprofile]
[  706.684595]  [<c047f42d>] __dentry_open+0x118/0x212
[  706.684602]  [<c047f543>] nameidata_to_filp+0x1c/0x2c
[  706.684607]  [<c0489f07>] do_filp_open+0x35a/0x6c3
[  706.684612]  [<c041bcf8>] kunmap_atomic+0x67/0x87
[  706.684617]  [<c046e520>] handle_mm_fault+0x6e7/0x6f8
[  706.684621]  [<c0470e14>] mmap_region+0x2de/0x394
[  706.684633]  [<c047f23f>] do_sys_open+0x40/0xb0
[  706.684638]  [<c047f2f3>] sys_open+0x1e/0x23
[  706.684643]  [<c0404a92>] syscall_call+0x7/0xb
[  706.684653]  =======================
[  706.684654] Code: 8d 2c fd 00 00 00 00 53 e8 f8 28 95 c7 89 c6 e9 8d 00 00
00
bb c0 43 ba f8 31 d2 89 e8 03 1c b5 c0 5e 74 c0 e8 d2 56 8d c7 85 c0 <89> 43 18
74 7e 8d 43 34 c7 43 04 00 00 00 00 89 73 2c c7 43 0c 
[  706.684677] EIP: [<f8b9e4f3>] alloc_cpu_buffers+0x39/0xce [oprofile] SS:ESP
0068:f45cfe98
[  706.684684] ---[ end trace 4f359ae625277917 ]---
Download attachment "config-2.6.26-rc1-next-20080505" of type "application/octet-stream" (83285 bytes)

View attachment "d1.txt" of type "text/plain" (47429 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ