lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 21 Jan 2010 22:19:03 +0100 From: Toralf Förster <toralf.foerster@....de> To: Alexey Dobriyan <adobriyan@...il.com> Cc: linux-kernel@...r.kernel.org Subject: Re: kernel error : 'find /proc/ -type f | xargs -n 1 head -c 10 >/dev/null' Alexey Dobriyan wrote at 21:35:35 > On Thu, Jan 21, 2010 at 08:16:59PM +0100, Toralf Förster wrote: > > I was inspired by http://article.gmane.org/gmane.linux.kernel/941115 . > > > > Running the command (se subject) as a normal user at a 2.6.32.4 kernel > > gives this in /var/log/messages: > > > > head: page allocation failure. order:9, mode:0xd0 > > Pid: 2324, comm: head Not tainted 2.6.32.4 #1 > > Call Trace: > > [<c106e2cc>] ? __alloc_pages_nodemask+0x4bc/0x5a0 > > [<c108cf5a>] ? cache_alloc_refill+0x2ba/0x510 > > [<c108d299>] ? __kmalloc+0xe9/0xf0 > > [<c10aa755>] ? seq_read+0x195/0x370 > > Please, find out which file is causing this, if it's reproducible. > I reproduced the msg : "ACPI: Please implement acpi_video_bus_ROM_seq_show" by : by $> head -c 10 /proc/acpi/video/VID/info After suspend to disk and wakeup however the file /proc/acpi/video/VID/ROM was the culprit. The trace however I can't reproduce until now. -- MfG/Sincerely Toralf Förster -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists