lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACsaVZK1cbH+Aq+zG8zNs=wk7jacFTpnwJo8bQvy6L_bd4XLFQ@mail.gmail.com>
Date:	Sun, 15 Nov 2015 14:28:18 -0800
From:	Kyle Sanderson <kyle.leet@...il.com>
To:	Linux-Kernal <linux-kernel@...r.kernel.org>
Cc:	torvalds@...ux-foundation.org
Subject: BUG: unable to handle kernel paging request at ffffe8ff7fc00001

[290371.835867] BUG: unable to handle kernel paging request at ffffe8ff7fc00001
[290371.835891] IP: [<ffffffff810a174f>] kstat_irqs+0x4f/0x90
[290371.835912] PGD 800000000172f063 PUD 0
[290371.835929] Oops: 0000 [#1] PREEMPT SMP
[290371.835950] Modules linked in: xt_hashlimit ts_kmp xt_set ts_bm
xt_string xt_length ipt_REJECT nf_reject_ipv4 xt_recent xt_tcpudp nf
                                                      _conntrack_ipv4
nf_defrag_ipv4 xt_conntrack nf_conntrack ip_set_hash_ip
ip_set_hash_net ip_set nfnetlink iptable_filter ip_tables x_tabl
                                                  es ipv6 joydev
binfmt_misc x86_pkg_temp_thermal coretemp kvm_intel igb kvm ioatdma
i2c_algo_bit i2c_i801 i2c_core pcspkr xhci_pci dca rt
                                       c_cmos processor thermal_sys
button xts gf128mul aes_x86_64 cbc sha256_generic libiscsi
scsi_transport_iscsi tg3 ptp pps_core libphy e10
                                  00 fuse nfs lockd grace sunrpc jfs
multipath linear raid10 raid456 async_raid6_recov async_memcpy
async_pq async_xor xor async_tx raid6_
                        pq raid1 raid0 dm_snapshot dm_bufio dm_crypt
dm_mirror dm_region_hash dm_log dm_mod hid_sunplus hid_sony led_class
hid_samsung hid_pl
[290371.836382]  hid_petalynx hid_monterey hid_microsoft hid_logitech
hid_gyration hid_ezkey hid_cypress hid_chicony hid_cherry hid_belk
                                                    in hid_apple
hid_a4tech sl811_hcd usbhid xhci_hcd ohci_hcd uhci_hcd usb_storage
ehci_pci ehci_hcd usbcore usb_common aic94xx libsas lpfc
                                           crc_t10dif crct10dif_common
qla2xxx megaraid_sas megaraid_mbox megaraid_mm megaraid aacraid sx8
DAC960 cciss 3w_9xxx 3w_xxxx mptsas scs
                         i_transport_sas mptfc scsi_transport_fc
mptspi mptscsih mptbase atp870u dc395x qla1280 imm parport dmx3191d
sym53c8xx gdth advansys init
              io BusLogic arcmsr aic7xxx aic79xx scsi_transport_spi sg
pdc_adma sata_inic162x sata_mv ata_piix ahci libahci sata_qstor
sata_vsc sata_u
 li sata_sis sata_sx4 sata_nv sata_via sata_svw sata_sil24 sata_sil
sata_promise pata_sl82c105 pata_via pata_jmicron pata_marvell pata_si
                                                       s
[290371.836962]  pata_netcell pata_pdc202xx_old pata_triflex
pata_atiixp pata_opti pata_amd pata_ali pata_it8213 pata_pcmcia pcmcia
pcmc                                                         ia_core
pata_ns87415 pata_ns87410 pata_serverworks pata_artop pata_it821x
pata_optidma pata_hpt3x2n pata_hpt3x3 pata_hpt37x pata_hpt366
                                                pata_cmd64x pata_efar
pata_rz1000 pata_sil680 pata_radisys pata_pdc2027x pata_mpiix libata
[290371.841239] CPU: 2 PID: 1078 Comm: usage.pl Not tainted 4.1.7-hardened-r1 #1
[290371.841274] Hardware name: Supermicro Super Server/X10SRi-F, BIOS
1.0b 04/21/2015
[290371.841310] task: ffff88058394c9b0 ti: ffff88058394cf70 task.ti:
ffff88058394cf70
[290371.841362] RIP: 0010:[<ffffffff810a174f>]  [<ffffffff810a174f>]
kstat_irqs+0x4f/0x90
[290371.841402] RSP: 0018:ffff8801020f3c28  EFLAGS: 00010293
[290371.841433] RAX: 0000000000000000 RBX: 0000000000000000 RCX:
ffff88087fc00000
[290371.841468] RDX: 0000000000000000 RSI: 000060f700000001 RDI:
ffffffff81a312a0
[290371.841502] RBP: ffff8801020f3c48 R08: ffffffffffffffff R09:
0000000000000000
[290371.841537] R10: 0000000000000000 R11: 0000000000000000 R12:
ffffffff81a312a0
[290371.841572] R13: ffff880855adf600 R14: 00000000094c1b2d R15:
ffff880857526b00
[290371.841607] FS:  00007f4f65348700(0000) GS:ffff88087fc80000(0000)
knlGS:0000000000000000
[290371.841644] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[290371.841676] CR2: ffffe8ff7fc00001 CR3: 0000000857750000 CR4:
00000000001606f0
[290371.841711] Stack:
[290371.841734]  ffff8801020f3c48 0000000000000029 000000000000c580
0000000000000005
[290371.841781]  ffff8801020f3c68 ffffffff810a17ae 00000000ffffffff
000000000000002a
[290371.841829]  ffff8801020f3d78 ffffffff811f1cea ffff8801020f3d28
ffffffff8118e621
[290371.841876] Call Trace:
[290371.841902]  [<ffffffff810a17ae>] kstat_irqs_usr+0x1e/0x40
[290371.841936]  [<ffffffff811f1cea>] show_stat+0x5ca/0x690
[290371.841968]  [<ffffffff8118e621>] ? do_last+0x151/0x13b0
[290371.842000]  [<ffffffff811a5c2d>] seq_read+0xcd/0x3b0
[290371.842031]  [<ffffffff811e8cc3>] proc_reg_read+0x43/0x70
[290371.842063]  [<ffffffff8117e6a3>] __vfs_read+0x23/0xd0
[290371.842096]  [<ffffffff8107d091>] ? get_parent_ip+0x11/0x50
[290371.842128]  [<ffffffff8107d125>] ? preempt_count_add+0x55/0xb0
[290371.842161]  [<ffffffff8117ed90>] vfs_read+0xc0/0x1d0
[290371.842191]  [<ffffffff8117fc21>] SyS_read+0x41/0xb0
[290371.842224]  [<ffffffff8171ad9f>] system_call_fastpath+0x16/0x72
[290371.842256] Code: 83 78 48 00 74 56 4c 8b 25 7f c4 6a 00 31 db ba
ff ff ff ff eb 18 66 0f 1f 44 00 00 48 63 c8 49 8b 75 48 48 8b 0c
                                                    cd 80 54 8d 81
<03> 1c 0e 83 c2 01 be 08 00 00 00 48 63 d2 4c 89 e7 e8 9b fd 44
[290371.842567] RIP  [<ffffffff810a174f>] kstat_irqs+0x4f/0x90
[290371.842602]  RSP <ffff8801020f3c28>
[290371.842629] CR2: ffffe8ff7fc00001
[290371.843126] ---[ end trace 65aad936a2936575 ]---


ncurses and friends seem to be wrecked. Any tips would be appreciated.
System is still live.

Thanks,
Kyle.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ