lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070902113637.GA3160@hindley.org.uk>
Date:	Sun, 2 Sep 2007 12:36:37 +0100
From:	Mark Hindley <mark@...dley.org.uk>
To:	linux-kernel@...r.kernel.org
Cc:	rl@...lgate.ch, netdev@...r.kernel.org
Subject: [OOPS] 2.6.23-rc5 ? network/via-rhine [was: hang with
	CONFIG_MCYRIXIII]

I have now got an oops trace out of this box, which I presume has been
the cause of the previously observed hangs.

To my inexperienced eye it looks like it is related to via-rhine.

Thanks 

Mark
 
BUG: unable to handle kernel NULL pointer dereference at virtual address 00000025            
 printing eip:                                                                                                        
c0259a57                                                                                                              
*pde = 00000000                                                                                                       
Oops: 0000 [#1]                                                                                                       
PREEMPT                                                                                                               
Modules linked in: nfs cpufreq_userspace nfsd exportfs lockd sunrpc ppdev lp ac battery ipv6 sd_mod cpufreq_ondemand cpufreq_powersave longhaul af_packet tcp_diag inetv
CPU:    0                                                                                                             
EIP:    0060:[<c0259a57>]    Not tainted VLI                                                                          
EFLAGS: 00010246   (2.6.23-rc5 #1)                                                                                    
EIP is at tcp_rto_min+0x8/0x12                                                                                        
eax: 000000c8   ebx: c7ab1080   ecx: ffffffee   edx: 00000000                                                         
esi: c7ab1080   edi: 00000000   ebp: c9a24b20   esp: c0341dec                                                         
ds: 007b   es: 007b   fs: 0000  gs: 0033  ss: 0068                                                                    
Process ssh (pid: 4928, ti=c0341000 task=c963cf90 task.ti=c35b9000)                                                   
Stack: c0259b1b c7ab1080 c7ab1080 c025a2e8 c030c8a0 c025b906 00000080 00000080                                        
       c022f433 cacde032 00000000 00000000 00000001 28419aa8 731a8024 28419b18                                        
       00000000 00000000 c011ebc5 28419b18 00000282 028b585b 00000004 cceb3540                                        
Call Trace:                                                                                                           
 [<c0259b1b>] tcp_rtt_estimator+0xba/0x100                                                                            
 [<c025a2e8>] tcp_ack_saw_tstamp+0x14/0x43
 [<c025b906>] tcp_ack+0x6aa/0x1726
 [<c022f433>] skb_checksum+0x49/0x289
 [<c011ebc5>] local_bh_enable+0x5/0x8c
 [<c025f1bf>] tcp_rcv_established+0x344/0x5ed
 [<c024b660>] ip_route_input+0x3a/0xcdc
 [<c0264226>] tcp_v4_do_rcv+0x27/0x31d
 [<c0266309>] tcp_v4_rcv+0x71a/0x765
 [<c024e7b6>] ip_local_deliver+0x159/0x1bf
 [<c024e630>] ip_rcv+0x44e/0x47b
 [<c01b9540>] rb_insert_color+0x4c/0xad
 [<c024e630>] ip_rcv+0x44e/0x47b
 [<c0115bb4>] enqueue_entity+0x1d2/0x1f3
 [<c024e1e2>] ip_rcv+0x0/0x47b
 [<c023470b>] netif_receive_skb+0x30d/0x38e
 [<d00d55a8>] rhine_napipoll+0x2a7/0x46d [via_rhine]
 [<c02368c9>] net_rx_action+0x85/0x171
 [<c011ea8e>] __do_softirq+0x35/0x75
 [<c010665c>] do_softirq+0x3e/0x8d
 [<c013c6cc>] handle_level_irq+0x0/0xd0
 [<c011ea20>] irq_exit+0x29/0x62
 [<c010693b>] do_IRQ+0x94/0xad
 [<c0104cf3>] common_interrupt+0x23/0x30
 =======================
Code: 00 8b 14 24 8b 82 8c 02 00 00 89 82 10 04 00 00 a1 e0 6e 2f c0 89 82 14 04 00 00 83 c4 0c 5b 5e 5f 5d c3 8b 50 44 b8 c8 00 00 00 <f6> 42 25 20 74 03 8b 42 54 c3  
EIP: [<c0259a57>] tcp_rto_min+0x8/0x12 SS:ESP 0068:c0341dec
Kernel panic - not syncing: Fatal exception in interrupt

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ