lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKwPUozoAPnU+ceoBkd2zO3ySO8N83dgV9ZP-4fxrAL26umKJw@mail.gmail.com>
Date:	Fri, 17 Jul 2015 14:59:33 +0800
From:	Kassey <kassey1216@...il.com>
To:	himangi774@...il.com, geert+renesas@...der.be,
	eli.billauer@...il.com, htejun@...il.com
Cc:	linux-kernel@...r.kernel.org
Subject: oops in devres_for_each_res

hi, All:
   do you have some suggestion on this log and trying patch ?

VERSION = 3
PATCHLEVEL = 10
SUBLEVEL = 49


diff --git a/drivers/base/devres.c b/drivers/base/devres.c
index 5230294..d0d14b5 100644
--- a/drivers/base/devres.c
+++ b/drivers/base/devres.c
@@ -483,8 +483,6 @@ static int release_nodes(struct device *dev,
struct list_head *first,

        cnt = remove_nodes(dev, first, end, &todo);

-       spin_unlock_irqrestore(&dev->devres_lock, flags);
-
        /* Release.  Note that both devres and devres_group are
         * handled as devres in the following loop.  This is safe.
         */
@@ -494,6 +492,7 @@ static int release_nodes(struct device *dev,
struct list_head *first,
                kfree(dr);
        }

+       spin_unlock_irqrestore(&dev->devres_lock, flags);
        return cnt;
 }



[1153, system_server][ 8643.034183][5] Unable to handle kernel NULL
pointer dereference at virtual address 00000008
[1153, system_server][ 8643.034198][5] pgd = ffffffc053949000
[1153, system_server][ 8643.034209][5] [00000008]
*pgd=00000000d39a6003, *pmd=0000000097c16003, *pte=0000000000000000
[1153, system_server][ 8643.034229][5] Internal error: Oops: 96000007
[#1] PREEMPT SMP
[1153, system_server][ 8643.034240][5] Modules linked in: core_ctl(PO) wlan(O)
[1153, system_server][ 8643.034263][5] CPU: 5 PID: 1153 Comm:
system_server Tainted: P W O 3.10.49-ge617a2b #1
[1153, system_server][ 8643.034276][5] task: ffffffc053a36e00 ti:
ffffffc05101c000 task.ti: ffffffc05101c000
[1153, system_server][ 8643.034299][5] PC is at devres_for_each_res+0x50/0xd0
[1153, system_server][ 8643.034312][5] LR is at devres_for_each_res+0x44/0xd0
[1153, system_server][ 8643.034325][5] pc : [<ffffffc0005c4894>] lr :
[<ffffffc0005c4888>] pstate: 800001c5
[1153, system_server][ 8643.034335][5] sp : ffffffc05101fb30
[1153, system_server][ 8643.034346][5] x29: ffffffc05101fb30 x28:
ffffffc06f610a48
[1153, system_server][ 8643.034356][5] x27: ffffffc06f610c88 x26:
0000000000000140
[1153, system_server][ 8643.034366][5] x25: ffffffc06f610c80 x24:
ffffffc05101fc00
[1153, system_server][ 8643.034375][5] x23: ffffffc0019ca728 x22:
ffffffc0005cff0c
[1153, system_server][ 8643.034384][5] x21: ffffffc0005cfd5c x20:
ffffffc0005cf7cc
[1153, system_server][ 8643.034394][5] x19: ffffffc06f610a48 x18:
0000007f78121744
[1153, system_server][ 8643.034403][5] x17: 0000007f781a6d78 x16:
ffffffc0002f7994
[1153, system_server][ 8643.034413][5] x15: ffffffffffffffff x14:
0ffffffffffffffd
[1153, system_server][ 8643.034422][5] x13: 0000000000000008 x12:
0000000000000018
[1153, system_server][ 8643.034432][5] x11: 0000000000000002 x10:
0101010101010101
[1153, system_server][ 8643.034441][5] x9 : 0000000000000000 x8 :
ffffffc06297ba80
[1153, system_server][ 8643.034450][5] x7 : 0000000000000000 x6 :
0000000000000000
[1153, system_server][ 8643.034460][5] x5 : ffffffc05101fc00 x4 :
ffffffc0005cf870
[1153, system_server][ 8643.034469][5] x3 : 0000000000000000 x2 :
0000000000000000
[1153, system_server][ 8643.034478][5] x1 : 0000000000000000 x0 :
0000000000000140

-- 
Best regards
Kassey
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ