Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 329284 Details for
Bug 442808
sys-kernel/gentoo-sources sys-kernel/hardened-sources 3.6.5, 3.6.6 keyspan driver GPF oops
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
oops output when opening keyspan serial port
mimic_keyspan_oops (text/plain), 3.02 KB, created by
Hank Leininger
on 2012-11-11 20:49:35 UTC
(
hide
)
Description:
oops output when opening keyspan serial port
Filename:
MIME Type:
Creator:
Hank Leininger
Created:
2012-11-11 20:49:35 UTC
Size:
3.02 KB
patch
obsolete
>Linux version 3.6.6-hardened (root@foo) (gcc version 4.6.3 (Gentoo 4.6.3 p1.3, pie-0.5.2) ) #1 SMP Sun Nov 11 11:01:47 EST 2012 >[snip] > >general protection fault: 0000 [#1] SMP >Modules linked in: xt_tcpudp xt_NOTRACK nf_nat_ftp nf_conntrack_ftp iptable_raw iptable_nat iptable_mangle iptable_filter xt_state xt_owner xt_limit ipt_REJECT ipt_REDIRECT ipt_MASQUERADE nf_nat xt_LOG ip_tables x_tables nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 coretemp hwmon kvm_intel kvm igb keyspan ioatdma dca crc32c_intel i7core_edac aesni_intel edac_core ablk_helper aes_x86_64 usbserial aes_generic loop(O) >CPU 0 >Pid: 3769, comm: minicom Tainted: G O 3.6.6-hardened #1 Supermicro X8DTU/X8DTU >RIP: 0010:[<ffffffffa0037ae2>] [<ffffffffa0037ae2>] keyspan_open+0x134/0x177 [keyspan] >RSP: 0018:ffff8806154f99a8 EFLAGS: 00010246 >RAX: 80010200ffffff8d RBX: ffff88062283a000 RCX: 0000000000000000 >RDX: 0000000000000000 RSI: 0000000022443410 RDI: 0000000000002580 >RBP: ffff8806154f99e8 R08: 0000000000000000 R09: 0000000000000001 >R10: 0000000001448800 R11: ffff88062244c008 R12: ffff88062244c000 >R13: 0000000000002580 R14: 0000000000000cbd R15: ffff88061d092a80 >FS: 000002e457f54700(0000) GS:ffff88063fc00000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >CR2: 000000000062fae0 CR3: 0000000001441000 CR4: 00000000000007f0 >DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Process minicom (pid: 3769, threadinfo ffff8806199bf930, task ffff8806199bf460) >Stack: > ffff8806154f99c8 0504ffff814302a3 ffff8806154f99c8 ffff88061d092428 > ffff88062244c008 ffff88062392b800 ffff88061d0923c0 ffff88061759e150 > ffff8806154f9a28 ffffffffa00a666c ffff8806154f9a28 ffff88062244c0c0 >Call Trace: > [<ffffffffa00a666c>] serial_activate+0x5b/0x86 [usbserial] > [<ffffffff812a6b40>] tty_port_open+0x9a/0xdf > [<ffffffffa00a6b23>] serial_open+0x5a/0x69 [usbserial] > [<ffffffff8129f210>] tty_open+0x357/0x4ec > [<ffffffff81109888>] chrdev_open+0x13d/0x16c > [<ffffffff8110974b>] ? cdev_put+0x39/0x39 > [<ffffffff811038f9>] do_dentry_open+0x172/0x222 > [<ffffffff81103de2>] finish_open+0x46/0x5e > [<ffffffff81114b44>] do_last+0xa4e/0xbfd > [<ffffffff81112259>] ? link_path_walk+0xd5/0x503 > [<ffffffff811f6b3e>] ? security_file_alloc+0x2f/0x37 > [<ffffffff81114db6>] path_openat+0xc3/0x36c > [<ffffffff8122b410>] ? gr_log_resource+0x24/0x100 > [<ffffffff811153b8>] do_filp_open+0x44/0x9a > [<ffffffff8143201b>] ? _raw_spin_unlock+0x1a/0x22 > [<ffffffff81121396>] ? alloc_fd+0xec/0x104 > [<ffffffff81104ab1>] do_sys_open+0x7b/0x155 > [<ffffffff81104bbb>] sys_open+0x30/0x3f > [<ffffffff81438f73>] system_call_fastpath+0x18/0x1d > [<ffffffff814322c7>] ? retint_swapgs_pax+0xd/0x12 >Code: c5 78 35 0f b6 55 ce 45 31 c0 31 c9 44 0f b6 4d cf 44 89 ef 48 b8 00 00 00 00 00 00 00 80 49 0b 47 60 41 8b 77 68 41 29 d1 31 d2 <ff> d0 85 c0 75 07 44 89 ab 88 01 00 00 44 89 b3 90 01 00 00 41 >RIP [<ffffffffa0037ae2>] keyspan_open+0x134/0x177 [keyspan] > RSP <ffff8806154f99a8> >---[ end trace d7dd5d5cafb51147 ]--- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 442808
: 329284 |
329286