lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090814074033.GA3046@localdomain.by>
Date:	Fri, 14 Aug 2009 10:40:33 +0300
From:	Sergey Senozhatsky <sergey.senozhatsky@...il.com>
To:	Lin Ming <ming.m.lin@...el.com>
Cc:	Len Brown <lenb@...nel.org>, "Brown, Len" <len.brown@...el.com>,
	"Moore, Robert" <robert.moore@...el.com>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: acpi_ex_system_memory_space_handler oops

On (08/14/09 10:34), Lin Ming wrote:
> Hi, Sergey
> 
Hi Lin,

> Could you please help to locate the line of code that causes oops, as
> below?
>     
According to EIP, acpi_ex_system_memory_space_handler+0x75
0x0000023f <acpi_ex_system_memory_space_handler+94>:    call   0x240 <acpi_ex_system_memory_space_handler+95>
0x00000244 <acpi_ex_system_memory_space_handler+99>:    mov    $0x3004,%eax                                  
0x00000249 <acpi_ex_system_memory_space_handler+104>:   add    $0x10,%esp
0x0000024c <acpi_ex_system_memory_space_handler+107>:   jmp    0x3f5 <acpi_ex_system_memory_space_handler+532>
0x00000251 <acpi_ex_system_memory_space_handler+112>:   mov    $0x1,%eax
0x00000256 <acpi_ex_system_memory_space_handler+117>:   mov    0x8(%ebx),%edx  	<<
0x00000259 <acpi_ex_system_memory_space_handler+120>:   mov    %edx,-0x28(%ebp)
0x0000025c <acpi_ex_system_memory_space_handler+123>:   cmp    %edx,-0x14(%ebp)
                                                          
which I belive is (marked with __):
        /*
         * Does the request fit into the cached memory mapping?
         * Is 1) Address below the current mapping? OR         
         *    2) Address beyond the current mapping?  
         */
        if ((__ address __ < mem_info->mapped_physical_address) ||
            (((acpi_integer) address + length) > ((acpi_integer)
                                                  mem_info->
                                                  mapped_physical_address +
                                                  mem_info->mapped_length))) {
                

> 1. Compile the kernel with debug info
>    Kernel menuconfig -> Kernel hacking -> Compile the kernel with debug info
> 
> 2. Retest until it oops, here you get the address of code that causes oops.
>    addr2line -e vmlinux <the address>
> 
Sure, will try.


        Sergey

Download attachment "signature.asc" of type "application/pgp-signature" (316 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ