lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20080826160303.BA84E93CB6E@tippex.mynet.homeunix.org>
Date:	Tue, 26 Aug 2008 18:03:02 +0200
From:	Anders Eriksson <aeriksson@...tmail.fm>
To:	linux-kernel@...r.kernel.org
Subject: 2.6.25.15 bug?


Trying to track down a hard freeze bug, I enabled various hacker options. This 
one turned up in dmesg. I'm pretty sure it souldn't be there. 

This on seems to be unrealted to the bug I'm hunting though...


kobject: 'vcsa11' (d643fed8): kobject_uevent_env
kobject: 'vcsa11' (d643fed8): fill_kobj_path: path = '/class/vc/vcsa11'
IRQ handler type mismatch for IRQ 3
current handler: MPU401 UART
Pid: 4799, comm: hald-probe-seri Not tainted 2.6.25.15 #30
 [<c013d4e7>] setup_irq+0x1a4/0x1bc
 [<c013d644>] request_irq+0xc7/0xe5
 [<c023a18f>] ? serial8250_interrupt+0x0/0x114
 [<c0239f9d>] serial8250_startup+0x3b6/0x50d
 [<c02360c0>] uart_startup+0x70/0x125
 [<c023766d>] uart_open+0x158/0x390
 [<c0399705>] ? _spin_unlock+0x27/0x3c
 [<c02257e1>] ? check_tty_count+0x3b/0x8a
 [<c0228df9>] tty_open+0x164/0x2a9
 [<c015e60c>] chrdev_open+0x140/0x18c
 [<c015ad28>] __dentry_open+0xfb/0x1ad
 [<c015adf9>] nameidata_to_filp+0x1f/0x33
 [<c015e4cc>] ? chrdev_open+0x0/0x18c
 [<c015ae3b>] do_filp_open+0x2e/0x35
 [<c015ac17>] ? get_unused_fd_flags+0xcc/0xd6
 [<c0399705>] ? _spin_unlock+0x27/0x3c
 [<c015ae84>] do_sys_open+0x42/0xbc
 [<c015af40>] sys_open+0x1e/0x26
 [<c0102aba>] sysenter_past_esp+0x5f/0xa5
 =======================
kobject: 'microcode' (dc839e28): kobject_add_internal: parent: 'module', set: 'module'
kobject: 'holders' (d6072c30): kobject_add_internal: parent: 'microcode', set: '<NULL>'
kobject: 'microcode' (dc839e28): kobject_uevent_env
kobject: 'microcode' (dc839e28): fill_kobj_path: path = '/module/microcode'


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ