lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200806271907.29968.rjw@sisk.pl>
Date:	Fri, 27 Jun 2008 19:07:29 +0200
From:	"Rafael J. Wysocki" <rjw@...k.pl>
To:	Soeren Sonnenburg <kernel@....de>
Cc:	Linux Kernel <linux-kernel@...r.kernel.org>
Subject: Re: 2.6.26-rc7: BUG at kernel/power/snapshot.c:493

On Friday, 27 of June 2008, Soeren Sonnenburg wrote:
> Dear all,
> 
> Anyone else seeing this? Happened after resuming from s2both (from
> disk)...

At what point exactly did it happen?

> VFS: Mounted root (ext2 filesystem).
> ------------[ cut here ]------------
> kernel BUG at kernel/power/snapshot.c:493!
> invalid opcode: 0000 [#1] PREEMPT SMP 
> Modules linked in:
> 
> Pid: 568, comm: linuxrc Not tainted (2.6.26-rc7-sonne #35)
> EIP: 0060:[<c0157f99>] EFLAGS: 00010282 CPU: 0
> EIP is at memory_bm_set_bit+0x29/0x30
> EAX: fffffff2 EBX: f7165f1c ECX: 00000000 EDX: 03000200
> ESI: f7115000 EDI: b7f2a008 EBP: f7165f28 ESP: f7165f18
>  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
> Process linuxrc (pid: 568, ti=f7164000 task=f7b65f80 task.ti=f7164000)
> Stack: f7165f1c 00000013 f7117000 00000002 f7165f5c c0158e9b bf96e5ec c02dd570 
>        00001000 c05fa980 00000008 00000008 00000000 00000000 f7000200 c05fa980 
>        b7f2a008 f7165f70 c015b3af f7000200 b7f2a008 00001000 f7165f90 c0185e28 
> Call Trace:
>  [<c0158e9b>] ? snapshot_write_next+0xcb/0x7a0
>  [<c02dd570>] ? write_chan+0x0/0x380
>  [<c015b3af>] ? snapshot_write+0x1f/0x70
>  [<c0185e28>] ? vfs_write+0x98/0x120
>  [<c015b390>] ? snapshot_write+0x0/0x70
>  [<c0185f6d>] ? sys_write+0x3d/0x70
>  [<c010333a>] ? syscall_call+0x7/0xb
>  =======================
> Code: 00 00 55 89 e5 53 83 ec 0c 8d 4d f8 8d 5d f4 89 1c 24 e8 4b ff ff ff 85 c0
> EIP: [<c0157f99>] memory_bm_set_bit+0x29/0x30 SS:ESP 0068:f7165f18
> ---[ end trace 70a926e889075b3c ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ