lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <DCEAAC0833DD314AB0B58112AD99B93B0469029A@ismail.innsys.innovsys.com>
Date:	Mon, 19 May 2008 17:23:25 -0500
From:	"Rune Torgersen" <runet@...ovsys.com>
To:	"Scott Wood" <scottwood@...escale.com>
Cc:	<linuxppc-dev@...abs.org>, <linux-kernel@...r.kernel.org>,
	<linux-ide@...r.kernel.org>
Subject: RE: Oops with PREEMPT-RT on 2.6.25.4

Rune Torgersen wrote:> Scott Wood wrote:
> Of course I then ran headfirst into another one....
> This one seems to happen when I attempt to read flash through an mtd
> driver. 

Both if these is hitting a BUG_ON in kmap_atomic
(include/asm-powerpc/highmem.h)

> 
> Oops: Exception in kernel mode, sig: 5 [#1]
> PREEMPT Innovative Systems ApMax
> Modules linked in:
> NIP: c005e780 LR: c005e758 CTR: 00000000
> REGS: ef2c1d20 TRAP: 0700   Not tainted  (2.6.25.4-rt1)
> MSR: 00029032 <EE,ME,IR,DR>  CR: 48222482  XER: 20000000
> TASK = ef2a1a90[98] 'S21initenv' THREAD: ef2c0000
> GPR00: 3ffcf581 ef2c1dd0 ef2a1a90 00000000 c02cae8c 00000002 00000001
> 3ffcf580 GPR08: 00000000 c0370000 00000000 c037000c 28222484 1009ecc0
> 00000000 100a5838 GPR16: 10090000 10090000 00000000 00000000 10090000
> ef2a7100 3ee38385 100955ac GPR24: 00000000 ef2a4ef0 00000000 c27dc700
> c27dcb80 00000003 ef359040 c0334f88 NIP [c005e780]
> do_wp_page+0x650/0xc2c 
> LR [c005e758] do_wp_page+0x628/0xc2c
> Call Trace:
> [ef2c1dd0] [c005e758] do_wp_page+0x628/0xc2c (unreliable)
> [ef2c1e10] [c0012420] do_page_fault+0x338/0x4b4
> [ef2c1f40] [c0010120] handle_page_fault+0xc/0x80
> --- Exception: 301 at 0x100322e0
>     LR = 0x100322dc
> Instruction dump:
> 409e0594 4810f2e1 3d20c035 1fa3000f 8129b140 3bbd0003 57ab103a
> 7c0b482e 7d6b4a14 540007fa 30e0ffff 7cc70110 <0f060000> 3d20c035
> 3d40c035 8129b480 Oops: Exception in kernel mode, sig: 5 [#2]
> PREEMPT Innovative Systems ApMax
> Modules linked in:
> NIP: c005db0c LR: c005dae4 CTR: 00000000
> REGS: ef29fd00 TRAP: 0700   Tainted: G      D   (2.6.25.4-rt1)
> MSR: 00029032 <EE,ME,IR,DR>  CR: 48002482  XER: 20000000
> TASK = ef26e070[102] 'sed' THREAD: ef29e000
> GPR00: 3ee2d581 ef29fdb0 ef26e070 00000000 c02cae8c 00000000 00000001
> 3ee2d580 GPR08: 00000000 c0370000 00000000 c037000c 00000722 1009ecc0
> 4802dfa4 4802d878 GPR16: 0014f73c 00000000 00000000 00000003 4802cce0
> 00000000 00000001 02000000 GPR24: ef3592e0 0ffece1c ef3592e0 ef2a50fc
> ef2a4df4 00000003 c27dcfe0 c27ff4c0 NIP [c005db0c]
> __do_fault+0x1e0/0x804 
> LR [c005dae4] __do_fault+0x1b8/0x804
> Call Trace:
> [ef29fdb0] [c005dae4] __do_fault+0x1b8/0x804 (unreliable)
> [ef29fe10] [c0012420] do_page_fault+0x338/0x4b4
> [ef29ff40] [c0010120] handle_page_fault+0xc/0x80
> --- Exception: 301 at 0x48017b10
>     LR = 0x48007ac8
> Instruction dump:
> 409e060c 4810ff55 3d20c035 1fa3000f 8129b140 3bbd0003 57ab103a
> 7c0b482e 7d6b4a14 540007fa 30e0ffff 7cc70110 <0f060000> 3d20c035
> 3d40c035 8129b480 _______________________________________________
> Linuxppc-dev mailing list
> Linuxppc-dev@...abs.org
> https://ozlabs.org/mailman/listinfo/linuxppc-dev

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ