lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5747.1290574539@localhost>
Date:	Tue, 23 Nov 2010 23:55:39 -0500
From:	Valdis.Kletnieks@...edu
To:	akpm@...ux-foundation.org
Cc:	mm-commits@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: mmotm 2010-11-23 - WARNING: at drivers/tty/tty_io.c:1331

On Tue, 23 Nov 2010 16:13:06 PST, akpm@...ux-foundation.org said:
> The mm-of-the-moment snapshot 2010-11-23-16-12 has been uploaded to
> 
>    http://userweb.kernel.org/~akpm/mmotm/

Seen during boot:

[   22.859616] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
[   23.015434] ------------[ cut here ]------------
[   23.015443] WARNING: at drivers/tty/tty_io.c:1331 tty_open+0x2a2/0x49a()
[   23.015446] Hardware name: Latitude E6500                  
[   23.015448] Modules linked in:
[   23.015453] Pid: 1207, comm: plymouthd Not tainted 2.6.37-rc3-mmotm1123 #3
[   23.015455] Call Trace:
[   23.015461]  [<ffffffff8103b189>] warn_slowpath_common+0x80/0x98
[   23.015465]  [<ffffffff8103b1b6>] warn_slowpath_null+0x15/0x17
[   23.015469]  [<ffffffff8128a3ab>] tty_open+0x2a2/0x49a
[   23.015475]  [<ffffffff810fd53f>] chrdev_open+0x11d/0x146
[   23.015479]  [<ffffffff810fd422>] ? chrdev_open+0x0/0x146
[   23.015483]  [<ffffffff810f7b4c>] __dentry_open+0x31a/0x483
[   23.015488]  [<ffffffff810f88fe>] nameidata_to_filp+0x50/0x57
[   23.015492]  [<ffffffff81105e53>] do_last+0x448/0x5b2
[   23.015497]  [<ffffffff81229229>] ? __raw_spin_lock_init+0x31/0x50
[   23.015501]  [<ffffffff81106205>] do_filp_open+0x248/0x64a
[   23.015507]  [<ffffffff810a5c4d>] ? trace_preempt_on+0x15/0x28
[   23.015511]  [<ffffffff81110cda>] ? alloc_fd+0x17c/0x18e
[   23.015516]  [<ffffffff8155adfc>] ? _raw_spin_unlock+0x30/0x69
[   23.015521]  [<ffffffff8155e3b8>] ? sub_preempt_count+0x35/0x49
[   23.015525]  [<ffffffff81110cda>] ? alloc_fd+0x17c/0x18e
[   23.015529]  [<ffffffff810f8965>] do_sys_open+0x60/0xfb
[   23.015533]  [<ffffffff8155a64b>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[   23.015537]  [<ffffffff810f8a1b>] sys_open+0x1b/0x1d
[   23.015542]  [<ffffffff8100277b>] system_call_fastpath+0x16/0x1b
[   23.015545] ---[ end trace 12db3a7ab6675b51 ]---


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ