lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 28 Nov 2008 22:09:06 +0900
From:	Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To:	akpm@...ux-foundation.org
Cc:	linux-kernel@...r.kernel.org
Subject: Re: mmotm 2008-11-26-17-00 uploaded

Hello.

> The mm-of-the-moment snapshot 2008-11-26-17-00 has been uploaded to
I got below bug.
CentOS 5.2 (gcc (GCC) 4.1.2 20071124 (Red Hat 4.1.2-42)) on VMware Workstation 6.5.1.

[   24.978638] BUG: unable to handle kernel NULL pointer dereference at 00000004
[   24.980541] IP: [<c056bfb7>] loopback_get_stats+0x26/0x51
[   24.982191] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
[   24.982989] last sysfs file: /sys/class/firmware/microcode/loading
[   24.982989] Modules linked in: rfkill input_polldev sbs sbshc battery floppy serio_raw rtc_cmos rtc_core rtc_lib ac button pcnet32 mii i2c_piix4 i2c_core mptspi mptscsih mptbase scsi_transport_spi ext3 jbd mbcache [last unloaded: microcode]
[   24.982989] 
[   24.982989] Pid: 2213, comm: sadc Not tainted (2.6.28-rc6-mm1 #1) VMware Virtual Platform
[   24.982989] EIP: 0060:[<c056bfb7>] EFLAGS: 00010297 CPU: 0
[   24.982989] EIP is at loopback_get_stats+0x26/0x51
[   24.982989] EAX: 00000000 EBX: debf8848 ECX: 00000001 EDX: 00000001
[   24.982989] ESI: 00000000 EDI: 00000000 EBP: de7b9efc ESP: de7b9eec
[   24.982989]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[   24.982989] Process sadc (pid: 2213, ti=de7b9000 task=de5fc0b0 task.ti=de7b9000)
[   24.982989] Stack:
[   24.982989]  21415ecf debf8800 ddc2fda0 ddc2fda0 de7b9f04 c05a71be de7b9f14 c05a7613
[   24.982989]  c062db2c debf8800 de7b9f54 c049d8be 00001000 b7d58000 ddf08310 ddc2fdc0
[   24.982989]  00000000 00000000 000000c8 00000001 00000000 00000000 00000000 fffffffb
[   24.982989] Call Trace:
[   24.982989]  [<c05a71be>] ? dev_get_stats+0x19/0x1b
[   24.982989]  [<c05a7613>] ? dev_seq_show+0x21/0x80
[   24.982989]  [<c049d8be>] ? seq_read+0x1f2/0x2d8
[   24.982989]  [<c049d6cc>] ? seq_read+0x0/0x2d8
[   24.982989]  [<c04b5b0f>] ? proc_reg_read+0x60/0x74
[   24.982989]  [<c04b5aaf>] ? proc_reg_read+0x0/0x74
[   24.982989]  [<c048a6da>] ? vfs_read+0x6d/0x91
[   24.982989]  [<c048a930>] ? sys_read+0x3b/0x5d
[   24.982989]  [<c04032d1>] ? sysenter_do_call+0x12/0x31
[   24.982989] Code: 66 c0 56 c0 c3 55 83 c9 ff 89 e5 57 31 ff 56 31 f6 53 83 ec 04 8d 58 48 8b 80 20 03 00 00 89 45 f0 eb 0d 8b 45 f0 f7 d0 8b 04 88 <03> 78 04 03 30 89 c8 ba 50 96 79 c0 e8 72 a3 f7 ff 83 f8 1f 89 
[   24.982989] EIP: [<c056bfb7>] loopback_get_stats+0x26/0x51 SS:ESP 0068:de7b9eec
[   25.029067] ---[ end trace a599d5330cca1e8d ]---


[   26.174009] BUG: unable to handle kernel NULL pointer dereference at 00000004
[   26.179987] IP: [<c056bfb7>] loopback_get_stats+0x26/0x51
[   26.182919] *pde = 00000000 
[   26.184089] Oops: 0000 [#2] SMP DEBUG_PAGEALLOC
[   26.185005] last sysfs file: /sys/class/firmware/microcode/loading
[   26.185005] Modules linked in: rfkill input_polldev sbs sbshc battery floppy serio_raw rtc_cmos rtc_core rtc_lib ac button pcnet32 mii i2c_piix4 i2c_core mptspi mptscsih mptbase scsi_transport_spi ext3 jbd mbcache [last unloaded: microcode]
[   26.185005] 
[   26.185005] Pid: 2288, comm: ip Tainted: G      D    (2.6.28-rc6-mm1 #1) VMware Virtual Platform
[   26.185005] EIP: 0060:[<c056bfb7>] EFLAGS: 00010297 CPU: 0
[   26.185005] EIP is at loopback_get_stats+0x26/0x51
[   26.185005] EAX: 00000000 EBX: debf8848 ECX: 00000001 EDX: 00000001
[   26.185005] ESI: 00000000 EDI: 00000000 EBP: dda6dc64 ESP: dda6dc54
[   26.185005]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[   26.185005] Process ip (pid: 2288, ti=dda6d000 task=ddc00130 task.ti=dda6d000)
[   26.185005] Stack:
[   26.185005]  21415ecf de75a08c debf8800 de692a90 dda6dc6c c05a71be dda6dcb0 c05b08e9
[   26.185005]  dda6dc84 de75a000 c075a184 c075a180 00000000 00000000 00000000 00000000
[   26.185005]  00000000 00000000 00000000 00004034 debf8800 dda81918 00000000 dda6dcdc
[   26.185005] Call Trace:
[   26.185005]  [<c05a71be>] ? dev_get_stats+0x19/0x1b
[   26.185005]  [<c05b08e9>] ? rtnl_fill_ifinfo+0x2c1/0x44a
[   26.185005]  [<c05b1027>] ? rtnl_dump_ifinfo+0x44/0x72
[   26.185005]  [<c05b5881>] ? netlink_dump+0x4e/0x157
[   26.185005]  [<c05b7025>] ? netlink_dump_start+0xb6/0xc8
[   26.185005]  [<c05b0fe3>] ? rtnl_dump_ifinfo+0x0/0x72
[   26.185005]  [<c05b1107>] ? rtnetlink_rcv_msg+0xb2/0x1ae
[   26.185005]  [<c05b0fe3>] ? rtnl_dump_ifinfo+0x0/0x72
[   26.185005]  [<c05b1055>] ? rtnetlink_rcv_msg+0x0/0x1ae
[   26.185005]  [<c05b64b2>] ? netlink_rcv_skb+0x30/0x75
[   26.185005]  [<c05b0e72>] ? rtnetlink_rcv+0x17/0x1f
[   26.185005]  [<c05b6362>] ? netlink_unicast+0xd6/0x12b
[   26.185005]  [<c05b6998>] ? netlink_sendmsg+0x229/0x236
[   26.185005]  [<c059d952>] ? __sock_sendmsg+0x22/0x29
[   26.185005]  [<c059e763>] ? sock_sendmsg+0xb8/0xce
[   26.185005]  [<c043bdcc>] ? autoremove_wake_function+0x0/0x33
[   26.185005]  [<c0478b62>] ? might_fault+0x36/0x74
[   26.185005]  [<c0478b62>] ? might_fault+0x36/0x74
[   26.185005]  [<c04ec46d>] ? __copy_from_user_ll+0x11/0xce
[   26.185005]  [<c059ef09>] ? move_addr_to_kernel+0x39/0x41
[   26.185005]  [<c059efb5>] ? sys_sendto+0xa4/0xc0
[   26.185005]  [<c0476430>] ? __do_fault+0x179/0x29d
[   26.185005]  [<c0469fba>] ? wake_up_page+0x17/0x1b
[   26.185005]  [<c046a019>] ? unlock_page+0x25/0x28
[   26.185005]  [<c0476519>] ? __do_fault+0x262/0x29d
[   26.185005]  [<c059f6e4>] ? sys_socketcall+0xf2/0x18d
[   26.185005]  [<c04032d1>] ? sysenter_do_call+0x12/0x31
[   26.185005] Code: 66 c0 56 c0 c3 55 83 c9 ff 89 e5 57 31 ff 56 31 f6 53 83 ec 04 8d 58 48 8b 80 20 03 00 00 89 45 f0 eb 0d 8b 45 f0 f7 d0 8b 04 88 <03> 78 04 03 30 89 c8 ba 50 96 79 c0 e8 72 a3 f7 ff 83 f8 1f 89 
[   26.185005] EIP: [<c056bfb7>] loopback_get_stats+0x26/0x51 SS:ESP 0068:dda6dc54
[   26.279258] ---[ end trace a599d5330cca1e8e ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ