lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1331694008.2293.10.camel@firefly>
Date:	Tue, 13 Mar 2012 23:00:08 -0400
From:	"Nathan A. Mourey II" <nmoureyii@...rr.com>
To:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Oops with kernel 3.3-rc7

Hello All,
	I have had another oops to report.  I am using btrfs as my root file
system.  It was originally ext4 that I converted to btrfs.  I also
had /home on a separate partition but deleted it and extended my root
partition then grew the root file system with "btrfs filesystem resize"
My /boot partition is ext2.  Please feel free to email me with any
questions.  

TIA -- Nate

[   12.678120] hub 4-0:1.0: port 1, status 0100, change 0000, 12 Mb/s
[   12.678126] usb 4-1: USB disconnect, device number 2
[   12.678130] usb 4-1: unregistering device
[   12.678134] usb 4-1: unregistering interface 4-1:1.0
[   12.680983] scsi 3:0:0:2: killing request
[   12.681625] BUG: unable to handle kernel NULL pointer dereference at 00000004
[   12.682009] IP: [<c1425553>] sd_revalidate_disk+0x13/0x1fa0
[   12.682717] *pde = 00000000 
[   12.683765] Oops: 0000 [#1] SMP 
[   12.684850] Modules linked in: ehci_hcd
[   12.684850] 
[   12.684850] Pid: 1120, comm: blkid Not tainted 3.3.0-rc7 #1 HP Pavilion 061 DM170A-ABA A350N/'P4SD-LA'
[   12.684850] EIP: 0060:[<c1425553>] EFLAGS: 00010292 CPU: 0
[   12.684850] EIP is at sd_revalidate_disk+0x13/0x1fa0
[   12.684850] EAX: f4452200 EBX: f5020800 ECX: 00000001 EDX: 00000000
[   12.684850] ESI: f4452200 EDI: ffffff85 EBP: 00000000 ESP: f4677d1c
[   12.684850]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[   12.684850] Process blkid (pid: 1120, ti=f4676000 task=f55b61c0 task.ti=f4676000)
[   12.684850] Stack:
[   12.684850]  f458d400 c10ca9e5 c142576f f6688180 c10e3822 f5f4d310 c10fae20 f445223c
[   12.684850]  f5f4d310 f5444800 c10fae20 c10e44a4 f4677d70 f4452200 f445223c 00000000
[   12.684850]  ffffff85 f4452200 c10d1315 f5020800 f5020884 f50208cc c10e3f52 f5020800
[   12.684850] Call Trace:
[   12.684850]  [<c10ca9e5>] ? kfree+0xc5/0xf0
[   12.684850]  [<c142576f>] ? sd_revalidate_disk+0x22f/0x1fa0
[   12.684850]  [<c10e3822>] ? find_inode+0x52/0x90
[   12.684850]  [<c10fae20>] ? I_BDEV+0x10/0x10
[   12.684850]  [<c10fae20>] ? I_BDEV+0x10/0x10
[   12.684850]  [<c10e44a4>] ? iget5_locked+0x74/0x190
[   12.684850]  [<c10d1315>] ? get_super+0x15/0xa0
[   12.684850]  [<c10e3f52>] ? iput+0x32/0x1a0
[   12.684850]  [<c127447c>] ? rescan_partitions+0x8c/0x2c0
[   12.684850]  [<c127c597>] ? kobject_release+0x37/0x90
[   12.684850]  [<c14238e1>] ? scsi_disk_put+0x21/0x40
[   12.684850]  [<c10fc43e>] ? __blkdev_get+0x22e/0x330
[   12.684850]  [<c10fc587>] ? blkdev_get+0x47/0x2d0
[   12.684850]  [<c10fb54e>] ? bdget+0xee/0x100
[   12.684850]  [<c10fae30>] ? bdev_test+0x10/0x10
[   12.684850]  [<c10fb5e8>] ? bd_acquire+0x88/0xc0
[   12.684850]  [<c10ccc8c>] ? __dentry_open.clone.15+0x1bc/0x2f0
[   12.684850]  [<c10cddb2>] ? nameidata_to_filp+0x52/0x60
[   12.684850]  [<c10fc810>] ? blkdev_get+0x2d0/0x2d0
[   12.684850]  [<c10da079>] ? do_last.clone.37+0xa9/0x720
[   12.684850]  [<c10db844>] ? path_openat+0xa4/0x350
[   12.684850]  [<c10dbbe4>] ? do_filp_open+0x34/0x90
[   12.684850]  [<c10e5d25>] ? alloc_fd+0x35/0xe0
[   12.684850]  [<c10cdeb0>] ? do_sys_open+0xf0/0x1c0
[   12.684850]  [<c10cdfb0>] ? sys_open+0x30/0x40
[   12.684850]  [<c15fa790>] ? sysenter_do_call+0x12/0x26
[   12.684850] Code: c1 89 54 24 04 c7 04 24 dd e9 6d c1 e8 a7 82 fd ff e9 1a f6 ff ff 66 90 55 31 d2 57 56 53 83 ec 68 8b a8 40 01 00 00 89 44 24 34 <8b> 45 04 89 44 24 30 8b 80 5c 02 00 00 83 f8 04 0f 95 c2 83 f8 
[   12.684850] EIP: [<c1425553>] sd_revalidate_disk+0x13/0x1fa0 SS:ESP 0068:f4677d1c
[   12.684850] CR2: 0000000000000004
[   12.720873] uhci_hcd 0000:00:1d.0: reserve dev 2 ep81-INT, period 16, phase 8, 17 us
[   12.725280] ---[ end trace 264203d6be4b7bd0 ]---
[   12.727629] ehci_hcd 0000:00:1d.7: GetStatus port:1 status 001803 0  ACK POWER sig=j CSC CONNECT
[   12.728405] hub 5-0:1.0: port 1: status 0501 change 0001
[   12.729759] ehci_hcd 0000:00:1d.7: GetStatus port:7 status 001803 0  ACK POWER sig=j CSC CONNECT
[   12.730582] hub 5-0:1.0: port 7: status 0501 change 0001
[   12.731444] usb 4-1: usb_disable_device nuking all URBs
[   12.732501] hub 1-0:1.0: state 7 ports 2 chg 0000 evt 0002
[   12.733367] uhci_hcd 0000:00:1d.0: port 1 portsc 008a,00



Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ