lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 14 May 2009 23:47:39 -0700
From:	Shivdas Gujare <shivdas.tech@...il.com>
To:	linux-kernel@...r.kernel.org
Cc:	linux-usb@...r.kernel.org
Subject: Understanding kernel Oops while using M-USB

Following is a part of Oops on BeagleBoard, which I am trying to understand...
I have pasted complete Oops at http://pastie.org/478896

[<c0036d24>] (omap3_pm_idle+0x0/0x120) from [<c002c184>] (cpu_idle+0x40/0x60)
[<c002c144>] (cpu_idle+0x0/0x60) from [<c0299bfc>] (rest_init+0x58/0x6c)
 r5:c037ee8c r4:c0387d38
[<c0299ba4>] (rest_init+0x0/0x6c) from [<c0008a00>] (start_kernel+0x260/0x2b8)
[<c00087a0>] (start_kernel+0x0/0x2b8) from [<80008034>] (0x80008034)

--------------------end of oops------------------
c00087a0(virtual address of start_kernel) + 0x260(offset) = c0008a00
(value in square bracket above)
where c0008a00 is the address of next instruction after branch
instruction to c0299ba4(i.e rest_init)

But here, I didn't understood what is 0x2b8 from
(start_kernel+0x260/0x2b8). i.e. 0x260 is a offset from start_kernel
but what is 0x2b8?
Also what address 0x80008034 points to?

I tried to analyze this using "arm-none-linux-gnueabi-objdump -D vmlinux".

I what general scenarios "Unable to handle kernel paging request at
virtual address" this message gets printed?


Thanks for your help.

Thanks and Regards,
Shivdas Gujare
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ