Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 298138 Details for
Bug 431038
oops in net tulip driver on ifup, threadlock, tulip_stop_rxtx() failed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
dmesg-ifup-2.6.25-113-errors.txt
dmesg-ifup-2.6.25-113-errors.txt (text/plain), 5.90 KB, created by
Andrew Farris
on 2008-03-15 09:03:38 UTC
(
hide
)
Description:
dmesg-ifup-2.6.25-113-errors.txt
Filename:
MIME Type:
Creator:
Andrew Farris
Created:
2008-03-15 09:03:38 UTC
Size:
5.90 KB
patch
obsolete
>000:02:0a.0: tulip_stop_rxtx() failed (CSR5 0xfc06c012 CSR6 0xff970111) >BUG: unable to handle kernel NULL pointer dereference at 000000a4 >IP: [<f91c0341>] :tulip:tulip_interrupt+0x261/0xaf8 >*pde = 354e6067 *pte = 00000000 >Oops: 0000 [#1] SMP >Modules linked in: tulip appletalk smsc47m192 hwmon_vid hwmon i2c_i801 i2c_core vfat fat x >fs fuse sunrpc ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi > scsi_transport_iscsi ipt_REJECT ipt_LOG nf_conntrack_ipv4 iptable_filter ip_tables ip6t_R >EJECT xt_tcpudp ip6t_LOG xt_limit nf_conntrack_ipv6 xt_state nf_conntrack ip6table_filter >ip6_tables x_tables ipv6 pata_acpi ata_piix ata_generic libata sd_mod scsi_mod ext3 jbd mb >cache uhci_hcd ohci_hcd ehci_hcd [last unloaded: microcode] > >Pid: 12088, comm: ip Not tainted (2.6.25-0.113.rc5.git2.fc9 #1) >EIP: 0060:[<f91c0341>] EFLAGS: 00210002 CPU: 0 >EIP is at tulip_interrupt+0x261/0xaf8 [tulip] >EAX: 00000000 EBX: d7102700 ECX: 00000015 EDX: f79de6a0 >ESI: 00000034 EDI: cac1f242 EBP: c729fb34 ESP: c729fad8 > DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 >Process ip (pid: 12088, ti=c729f000 task=c2174000 task.ti=c729f000) >Stack: c708c168 c729fb0c f9074828 f79ded8c f79de120 f79de6a0 f9074800 fc69c0d0 > 00000000 00000000 00000000 00000019 c04447b7 f79de14c 00540292 0000007f > f79de6a0 00000080 00000054 00000340 00200202 c708c140 000000a0 c729fb54 >all Trace: > [<c04447b7>] ? trace_hardirqs_on+0xe9/0x10a > [<c046113d>] ? request_irq+0xc1/0x112 > [<f91c00e0>] ? tulip_interrupt+0x0/0xaf8 [tulip] > [<f91c36f9>] ? tulip_open+0x1f/0x18a [tulip] > [<c05c596c>] ? dev_open+0x46/0x7e > [<c05c54e8>] ? dev_change_flags+0x9f/0x152 > [<c05cc074>] ? do_setlink+0x24a/0x2fc > [<c05cd375>] ? rtnl_newlink+0x2a0/0x40d > [<c05cd13b>] ? rtnl_newlink+0x66/0x40d > [<c05cd17c>] ? rtnl_newlink+0xa7/0x40d > [<c04d7370>] ? selinux_netlink_recv+0x4d/0x57 > [<c05cd0d5>] ? rtnl_newlink+0x0/0x40d > [<c05cd0bb>] ? rtnetlink_rcv_msg+0x1a5/0x1bf > [<c05ccf16>] ? rtnetlink_rcv_msg+0x0/0x1bf > [<c05da226>] ? netlink_rcv_skb+0x30/0x86 > [<c05ccf0e>] ? rtnetlink_rcv+0x1e/0x26 > [<c05d9d4a>] ? netlink_unicast+0x1b7/0x215 > [<c05da000>] ? netlink_sendmsg+0x258/0x265 > [<c05ba26b>] ? sock_sendmsg+0xde/0xf9 > [<c04741e3>] ? handle_mm_fault+0x2d7/0x732 > [<c0439533>] ? autoremove_wake_function+0x0/0x33 > [<c040a2f4>] ? native_sched_clock+0xb5/0xd1 > [<c04fd954>] ? copy_from_user+0x39/0x121 > [<c05c0c75>] ? verify_iovec+0x40/0x6f > [<c05ba3c5>] ? sys_sendmsg+0x13f/0x192 > [<c040a026>] ? sched_clock+0x8/0xb > [<c0442ff9>] ? lock_release_holdtime+0x1a/0x115 > [<c04d60bd>] ? avc_has_perm_noaudit+0x3a1/0x3dc > [<c0483625>] ? check_object+0x130/0x184 > [<c0476c3a>] ? __vma_link+0x6e/0x73 > [<c0476c8e>] ? vma_link+0x4f/0xc4 > [<c040a2f4>] ? native_sched_clock+0xb5/0xd1 > [<c05bb2f9>] ? sys_socketcall+0x16b/0x186 > [<c0405d12>] ? syscall_call+0x7/0xb > ======================= >Code: 83 80 98 00 00 00 10 83 80 a4 00 00 00 02 83 80 98 00 00 00 02 8b 55 e4 8b 4d ec 8b >b8 a4 00 00 00 8b 84 f2 18 01 00 00 c1 e9 02 <8b> b0 a4 00 00 00 f3 a5 8b 4d ec 83 e1 03 7 >4 02 f3 a4 83 7b 54 >EIP: [<f91c0341>] tulip_interrupt+0x261/0xaf8 [tulip] SS:ESP 0068:c729fad8 >---[ end trace 4ffd1fc7e0da526b ]--- >FahCore_78.exe used greatest stack depth: 884 bytes left >============================================================================= >BUG kmalloc-2048 (Tainted: G D ): Poison overwritten >----------------------------------------------------------------------------- >INFO: 0xc203b960-0xc203b9bb. First byte 0x0 instead of 0x6b >INFO: Allocated in tulip_refill_rx+0x38/0xe0 [tulip] age=656193 cpu=0 pid=3438 >INFO: Freed in skb_release_data+0x8e/0x92 age=650432 cpu=0 pid=12027 >INFO: Slab 0xc1070c40 used=10 fp=0xc203b950 flags=0x400040c3 >INFO: Object 0xc203b950 @offset=14672 fp=0xc203e240 > >Bytes b4 0xc203b940: f2 09 00 00 c1 ec 75 04 5a 5a 5a 5a 5a 5a 5a 5a <F2>...<C1><EC>u.ZZZ >ZZZZZ > Object 0xc203b950: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk > Object 0xc203b960: 00 04 5a 7d 9f 01 00 06 25 08 81 1c 08 00 45 00 ..Z}....%.....E. > Object 0xc203b970: 00 46 90 82 00 00 2f 06 5e 73 5a 1b 80 ef c0 a8 .F..../.^sZ..<EF> ><C0><A8> > Object 0xc203b980: 01 0a da 8f 1a ea bd 04 f5 c6 18 a3 5c 29 80 18 ..<DA>..<EA><BD>. ><F5><C6>.<A3>\).. > Object 0xc203b990: 01 f5 22 47 00 00 01 01 08 0a 41 ec 73 8a 04 6c .<F5>"G......A<EC>s. >.l > Object 0xc203b9a0: 33 91 0c 7b de 6b 85 83 bf 49 3f 93 9e 32 5c f1 3..{<DE>k..<BF>I?..2 >\<F1> > Object 0xc203b9b0: d0 2c 70 8c 6a cd 8c 8a 08 00 58 00 6b 6b 6b 6b <D0>,p.j<CD>....X.kk >kk > Object 0xc203b9c0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk > Redzone 0xc203c150: bb bb bb bb <BB><BB><BB><BB> > > Padding 0xc203c178: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ >Pid: 2964, comm: wnck-applet Tainted: G D 2.6.25-0.113.rc5.git2.fc9 #1 > [<c048341f>] print_trailer+0x111/0x119 > [<c04834a8>] check_bytes_and_report+0x81/0xa4 > [<c0483599>] check_object+0xa4/0x184 > [<c04846dc>] __slab_alloc+0x404/0x509 > [<c048504d>] __kmalloc_track_caller+0x93/0xf8 > [<c05bc548>] ? sock_alloc_send_skb+0x87/0x1b9 > [<c05bc548>] ? sock_alloc_send_skb+0x87/0x1b9 > [<c05bfe62>] __alloc_skb+0x49/0xf8 > [<c05bc548>] sock_alloc_send_skb+0x87/0x1b9 > [<c04d8ea2>] ? selinux_socket_getpeersec_dgram+0x41/0x67 > [<c0620b0c>] unix_stream_sendmsg+0x167/0x31d > [<c05b9b3b>] sock_aio_write+0x103/0x110 > [<c04d7fab>] ? inode_has_perm+0x5b/0x65 > [<c0487e57>] do_sync_readv_writev+0xa1/0xdf > [<c04d8385>] ? file_has_perm+0x7f/0x88 > [<c0439533>] ? autoremove_wake_function+0x0/0x33 > [<c04dade8>] ? selinux_file_permission+0x103/0x109 > [<c04d3b84>] ? security_file_permission+0xf/0x11 > [<c04884ab>] do_readv_writev+0x82/0x165 > [<c05b9a38>] ? sock_aio_write+0x0/0x110 > [<c04406ae>] ? clockevents_program_event+0xe1/0xf0 > [<c04885c7>] vfs_writev+0x39/0x49 > [<c0488612>] sys_writev+0x3b/0x8e > [<c0405d12>] syscall_call+0x7/0xb > ======================= >FIX kmalloc-2048: Restoring 0xc203b960-0xc203b9bb=0x6b > >FIX kmalloc-2048: Marking all objects used
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 431038
:
293570
|
293571
|
293572
|
293574
|
295760
| 298138 |
299658