lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 8 Dec 2011 15:28:52 +0100
From:	Manuel Lauss <manuel.lauss@...glemail.com>
To:	linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org
Subject: 3.2-rc: oops in do_sys_open

Hello,

I get this oops on almost all 3.2-rcX versions on a single machine.
It occured during
the 3.1 rc-phase as well, went away with 3.1 final and reappeared in
3.2-rc again.

Full dmesg and config attached.

Thanks!
      Manuel Lauss

BUG: unable to handle kernel paging request at fffffffffff81137
IP: [<ffffffff8109dbc4>] do_sys_open+0x104/0x1d0
PGD 160d067 PUD 160e067 PMD 0
Oops: 0000 [#1]
CPU 0
Modules linked in: sata_sil sata_uli

Pid: 1117, comm: mount Not tainted 3.2.0-rc4-00255-g77a7300 #1 System
manufacturer System Product Name/K8U-X
RIP: 0010:[<ffffffff8109dbc4>]  [<ffffffff8109dbc4>] do_sys_open+0x104/0x1d0
RSP: 0018:ffff88002c423f38  EFLAGS: 00010283
RAX: fffffffffff8111f RBX: 0000000000000003 RCX: ffff88002de19cd0
RDX: ffff88002c80d578 RSI: ffffffff8109f460 RDI: ffff88002dfb70c0
RBP: fffffffffff8111f R08: ffff88002e1ca9c0 R09: ffb57f3610294403
R10: ffff88002c423c88 R11: 00000000084c077f R12: ffff88002c43a000
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000
FS:  00007fcb6ee79740(0000) GS:ffffffff8161b000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffffff81137 CR3: 000000002d70a000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 1117, threadinfo ffff88002c422000, task ffff88002d786e20)
Stack:
 0000018000008041 0000030000000022 0000000000000064 0000000000000011
 00007ffff03ce838 0000000000000000 00007ffff03cec40 0000000000000000
 0000000000000000 ffffffff813bf8b8 0000000000000246 00007ffff03ce5d0
Call Trace:
 [<ffffffff813bf8b8>] ? system_call_fastpath+0x16/0x1b
Code: ff e8 c1 82 01 00 85 c0 89 c3 78 76 89 ef 44 89 e9 48 89 e2 4c
89 e6 e8 eb e3 00 00 48 3d 00 f0 ff ff 48 89 c5 0f 87 bc 00 00 00
 8b 70 18 4c 8d 78 10 41 bd 20 00 00 00 4c 89 ff 4c 8b 76 30
RIP  [<ffffffff8109dbc4>] do_sys_open+0x104/0x1d0
 RSP <ffff88002c423f38>
CR2: fffffffffff81137
---[ end trace c2efc7f5bf164291 ]---

(gdb) list *0xffffffff8109dbc4
0xffffffff8109dbc4 is in do_sys_open
(/usr/src/linux.git/include/linux/fsnotify.h:230).
225      * fsnotify_open - file was opened
226      */
227     static inline void fsnotify_open(struct file *file)
228     {
229             struct path *path = &file->f_path;
230             struct inode *inode = path->dentry->d_inode;
231             __u32 mask = FS_OPEN;
232
233             if (S_ISDIR(inode->i_mode))
234                     mask |= FS_ISDIR;

Download attachment "config-moya" of type "application/octet-stream" (45579 bytes)

Download attachment "dmesg-moya" of type "application/octet-stream" (28110 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ