lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <489086328@web.de>
Date:	Thu, 30 Oct 2008 19:19:11 +0100
From:	devzero@....de
To:	linux-kernel@...r.kernel.org
Cc:	airlied@...ux.ie
Subject: BUG:  amd64-agp  oopses on 2nd load

found during module testing.

reproduce:

modprobe amd64-agp 

module does not load (expected)

then modprobe amd64-agp a second time and you get the oops below (which is not expected)

2.6.28-rc2-git3-default 
vmware workstation 6.5
non amd-platform
no X11 running

if not reproducible, i can provide .config or further information.

regards
roland


BUG: unable to handle kernel paging request at 0356402e
IP: [<c01cbd9f>] kobject_put+0x7/0x37
*pde = 00000000
Oops: 0000 [#1] SMP
last sysfs file: /sys/firmware/edd/int13_dev80/extensions
Modules linked in: amd64_agp(+) iptable_filter ip_tables ip6table_filter ip6_tables x_tables ipv6 af_packet microcode firmware_class fuse loop dm_mod ide_cd_mod cdrom pata_acpi ata_piix mousedev ahci serio_raw ata_generic libata psmouse ide_pci_generic ppdev 8250_pnp rtc_cmos 8250 rtc_core parport_pc pcnet32 piix shpchp intel_agp container i2c_piix4 mii button ac pci_hotplug rtc_lib pcspkr parport ide_core serial_core agpgart evdev i2c_core floppy uhci_hcd usbcore edd ext3 mbcache jbd fan mptsas scsi_transport_sas mptfc scsi_transport_fc scsi_tgt mptspi mptscsih mptbase scsi_transport_spi sd_mod crc_t10dif sg scsi_mod thermal processor thermal_sys [last unloaded: speedstep_lib]

Pid: 2471, comm: modprobe Tainted: G        W  (2.6.28-rc2-git3-default #4) VMware Virtual Platform
EIP: 0060:[<c01cbd9f>] EFLAGS: 00010202 CPU: 0
EIP is at kobject_put+0x7/0x37
EAX: 0356400e EBX: 0356400e ECX: f0869034 EDX: f0863fbc
ESI: f0869fbc EDI: f0869fbc EBP: ee94a000 ESP: ee94be84
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process modprobe (pid: 2471, ti=ee94a000 task=ef381470 task.ti=ee94a000)
Stack:
 f0869f88 c021fbf9 c01b1472 f0869f88 f086e000 f0869fbc ee94a000 c01d818f
 f086a200 f086e000 00000000 f086e027 f086a200 c010113d 00000246 00000000
 00000282 0000001e efbd9c20 00000001 00000282 efbcb980 00000001 00000001
Call Trace:
 [<c021fbf9>] driver_register+0x51/0xc2
 [<c01b1472>] sysfs_addrm_finish+0x13/0x1aa
 [<f086e000>] agp_amd64_init+0x0/0xbd [amd64_agp]
 [<c01d818f>] __pci_register_driver+0x3c/0x69
 [<f086e000>] agp_amd64_init+0x0/0xbd [amd64_agp]
 [<f086e027>] agp_amd64_init+0x27/0xbd [amd64_agp]
 [<c010113d>] _stext+0x4d/0x148
 [<c0142936>] load_module+0x12cd/0x142e
 [<c01295dc>] __request_region+0x0/0x80
 [<c0142b1e>] sys_init_module+0x87/0x176
 [<c01039eb>] sysenter_do_call+0x12/0x2f
Code: a3 34 c0 ba d0 80 00 00 53 31 db e8 17 87 fa ff 85 c0 74 0c ba 04 c6 34 c0 89 c3 e8 8b ff ff ff 89 d8 5b c3 85 c0 53 89 c3 74 2e <f6> 40 20 01 75 1a 50 ff 30 68 c7 c6 30 c0 68 50 02 00 00 68 16
EIP: [<c01cbd9f>] kobject_put+0x7/0x37 SS:ESP 0068:ee94be84
---[ end trace 4eaa2a86a8e2da22 ]---


__________________________________________________________________
Run, Fatboy, Run" sowie "Rails & Ties" kostenlos anschauen!
Blockbuster-Gutscheine sichern unter http://www.blockbuster.web.de

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ