lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 13 Mar 2009 22:22:55 +0100
From:	Francois Romieu <romieu@...zoreil.com>
To:	Christian <cjs@....com>
Cc:	netdev@...r.kernel.org
Subject: Re: skb_over_panic kernel panic

Christian <cjs@....com> :
[...]
> skb_over_panic: text:fffffffff80456cc4 len:2580 put:2580
> head:ffff9900bf18a000 data:ffff8800bf18a010 tail:0xa end:0x640 dev:eth0
> --------[ cut here ] ----------
> kernel BUG at net/core/skbuff.c:124!xt:ffffffff80456cc4 len:2580
> put:2580 head:ffff8800bf18a000 data:ffff8800bf18a010 tail:0xa 
> invalid opcode: 0000 [#1] SMP
> last sysfs file: /sys/devices/pci0000:00/0000:00:1f.0/resource
> CPU 5
> Modules linked in nvidia(P)
> Pid: 0, comm: swapper Tainted: P        2.6.28.7 #3
[...]
> # lsmod
> Module                  Size  Used by
> nvidia               7797560  0 

Can you reproduce the bug when nvidia's module is not loaded
after boot ?

-- 
Ueimor
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ