rexton2

Kernel failure message 1

Mar 10th, 2016
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.77 KB | None | 0 0
  1. Kernel failure message 1:
  2. BUG: unable to handle kernel NULL pointer dereference at 00000008
  3. IP: [<c1175b96>] __inode_permission+0x46/0xa0
  4. *pdpt = 000000003153c001 *pde = 0000000000000000
  5. Oops: 0000 [#3] SMP
  6. Modules linked in: cpufreq_stats cpufreq_powersave cpufreq_conservative cpufreq_userspace bnep bluetooth 6lowpan_iphc uinput nfsd auth_rpcgss oid_registry nfs_acl nfs lockd fscache sunrpc fuse loop parport_pc ppdev lp parport joydev arc4 radeon ttm drm_kms_helper rtl8192ce drm uvcvideo rtl_pci rtlwifi intel_powerclamp videobuf2_vmalloc coretemp videobuf2_memops videobuf2_core rtl8192c_common snd_hda_codec_realtek i2c_algo_bit kvm_intel snd_hda_codec_generic psmouse v4l2_common videodev media mac80211 iTCO_wdt iTCO_vendor_support cfg80211 snd_hda_intel snd_hda_controller snd_hda_codec snd_hwdep snd_pcm_oss evdev kvm toshiba_acpi serio_raw pcspkr ene_ir snd_mixer_oss mei_me ac sparse_keymap rfkill rc_core mei snd_pcm button wmi battery shpchp toshiba_bluetooth video lpc_ich snd_timer snd i2c_i801 i2c_core acpi_cpufreq mfd_core soundcore processor thermal_sys ext4 crc16 mbcache jbd2 hid_generic usbhid hid sg sd_mod sr_mod crc_t10dif crct10dif_generic cdrom crct10dif_common ums_realtek usb_storage crc32c_intel
  7. ahci libahci ehci_pci ehci_hcd libata scsi_mod r8169 mii usbcore usb_common
  8. CPU: 0 PID: 3338 Comm: systemd-logind Tainted: G D 3.16.0-4-686-pae #1 Debian 3.16.7-ckt20-1+deb8u4
  9. Hardware name: TOSHIBA Satellite C660/PWWAA, BIOS 1.20 11/26/10
  10. task: f2b58560 ti: f14e6000 task.ti: f14e6000
  11. EIP: 0060:[<c1175b96>] EFLAGS: 00010246 CPU: 0
  12. EIP is at __inode_permission+0x46/0xa0
  13. EAX: 00000000 EBX: c0080c78 ECX: 00000000 EDX: 00000024
  14. ESI: 00000024 EDI: f14e7efc EBP: f14e7e24 ESP: f14e7e1c
  15. DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
  16. CR0: 80050033 CR2: 00000008 CR3: 36956000 CR4: 000007f0
  17. Stack:
  18. 00000000 c0080c78 f14e7e3c c11775fa 00018800 f14e7efc ffffffec f14e7ecc
  19. f14e7e94 c1178fb9 c117601f 00000000 f60e8c20 f2b58560 f60e8c20 f2b58560
  20. f14e7efc f2e8e02b 00000024 f14a2340 00000000 00000000 00000000 c0c01c00
  21. Call Trace:
  22. [<c11775fa>] ? may_open+0x6a/0x100
  23. [<c1178fb9>] ? do_last+0x459/0xf40
  24. [<c117601f>] ? link_path_walk+0x5f/0x6d0
  25. [<c1179b50>] ? path_openat+0xb0/0x550
  26. [<c114c37b>] ? free_pages_and_swap_cache+0x8b/0xa0
  27. [<c117a7a1>] ? do_filp_open+0x31/0x80
  28. [<c117598f>] ? getname_flags+0x3f/0x140
  29. [<c116b8da>] ? do_sys_open+0x10a/0x200
  30. [<c116ba20>] ? SyS_openat+0x20/0x30
  31. [<c147e61f>] ? sysenter_do_call+0x12/0x12
  32. Code: 89 d8 e8 9e f3 ff ff 85 c0 74 0a 5b 5e 5d c3 8d b6 00 00 00 00 8b 43 30 85 c0 75 2b 89 f2 89 d8 5b 5e 5d e9 7d cf 06 00 8b 43 18 <8b> 48 08 85 c9 74 31 89 f2 89 d8 ff d1 eb cd f6 40 0c 08 74 b8
  33. EIP: [<c1175b96>] __inode_permission+0x46/0xa0 SS:ESP 0068:f14e7e1c
  34. CR2: 0000000000000008
  35. ---[ end trace 536058c72d02266f ]---
Advertisement
Add Comment
Please, Sign In to add comment