lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200806170042.m5H0gJAR051370@www262.sakura.ne.jp>
Date:	Tue, 17 Jun 2008 09:42:19 +0900
From:	penguin-kernel@...ove.sakura.ne.jp
To:	akataria@...are.com
Cc:	dhecht@...are.com, linux-kernel@...r.kernel.org
Subject: Re: [2.6.22? VMware?] BUG() at sysfs_follow_link+0x129/0x260

Hello.

Alok Kataria wrote:
> Is this bug reproducible ?
Yes.

> Does this oops happen while the vmware-install script is still
> executing ?
It happened while /usr/bin/vmware-config-tools.pl is running.
I uploaded screenshots at the moment of oops.
http://I-love.SAKURA.ne.jp/tmp/oops-1.png
http://I-love.SAKURA.ne.jp/tmp/oops-2.png
http://I-love.SAKURA.ne.jp/tmp/oops-3.png

> Or does it happen after the installation/upgrade is complete ?
> If its the latter case, Can you please determine what line in the perl
> script is triggering this oops ?
The process who triggered this oops is "slabinfo".
So I tried "strace slabinfo" while I am running /usr/bin/vmware-config-tools.pl ,
and I found that the oops is happening while trying to read hgfsReqCache entry.
http://I-love.SAKURA.ne.jp/tmp/oops-4.png

Here is my environment:

 Host OS:

   CentOS 5.1 x86_64 on ThinkPad X60
   VMware workstation 6.0.4

 Guest OS:

   Ubuntu 7.10 i386
   Using NAT's DHCP for networking.

Regards.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ