Advertisement
Guest User

cat /dev/urandom > /dev/null

a guest
Jun 9th, 2016
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.98 KB | None | 0 0
  1. Unable to handle kernel NULL pointer dereference at virtual address 00000003
  2. pgd = a8680000
  3. [00000003] *pgd=389a1831, *pte=00000000, *ppte=00000000
  4. Internal error: Oops: 17 [#2] PREEMPT SMP ARM
  5. Modules linked in: btmrvl_sdio btmrvl bluetooth tvp5150_mxc evbug mwifiex_sdio mwifiex
  6. CPU: 2 PID: 386 Comm: cat Tainted: G D 3.10.17-cm-fx6+g33597e3 #33
  7. task: a84e5680 ti: a8592000 task.ti: a8592000
  8. PC is at sha_transform+0x17a8/0x17e4
  9. LR is at extract_buf+0xa0/0x110
  10. pc : [<8028b8d4>] lr : [<8031d91c>] psr: 60000013
  11. sp : a8593e04 ip : 6686d032 fp : a8593e2c
  12. r10: 2e74c652 r9 : 7a8d3f75 r8 : 7c5bfa3f
  13. r7 : 1c1bd6e7 r6 : ffffffff r5 : e07f9cb0 r4 : 9108be0c
  14. r3 : 4f9409b2 r2 : 78d0e95f r1 : 6d1dd8bc r0 : 8f5e8761
  15. Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
  16. Control: 10c53c7d Table: 3868004a DAC: 00000015
  17. Process cat (pid: 386, stack limit = 0xa8592238)
  18. Stack: (0xa8593e04 to 0xa8594000)
  19. 3e00: 00000020 80cb5cb0 a8593e48 a8593efe 80cb5cc4 60000013 7ec2d528
  20. 3e20: a8593eec a8593e30 8031d91c 8028a138 8031e054 1c1bd6e7 bb319704 f7f9fcf8
  21. 3e40: b42a4fa3 ff424f4f e4db44c6 7a8d3f75 f59989f0 610207d4 92f2254a 9813d438
  22. 3e60: 9255a1d2 0a563382 11d9df68 937d4216 073aaab3 1b8b6c06 b80a4eb2 9a99b5de
  23. 3e80: 5b34fb4a 691570f5 61acac0a 54f7a4d9 f96ab718 40852310 907d2acd 1871f90f
  24. 3ea0: fb72c45d 4ff9a8ad 55b37d9d 1c0c85ec 68c92382 cf12e760 72e76bfe 1807d193
  25. 3ec0: 836229e9 b08853ce 0000000a 000008e8 a8593efe 00000718 a8592000 a8592000
  26. 3ee0: a8593f34 a8593ef0 8031e374 8031d888 00000000 80cb5cb0 00000000 7cf67f08
  27. 3f00: 6bdd38cf da189252 a87e7f08 a87b4d80 7ec2cc40 a8593f78 7ec2cc40 00000000
  28. 3f20: 00001000 00000000 a8593f44 a8593f38 8031e428 8031e2f4 a8593f74 a8593f48
  29. 3f40: 800c97ec 8031e420 00000000 00000000 00000000 00000000 00000000 a87b4d80
  30. 3f60: 7ec2cc40 00000000 a8593fa4 a8593f78 800c9e84 800c9758 00000000 00000000
  31. 3f80: 0009b988 00001000 7ec2cc40 00000003 8000e704 a8592000 00000000 a8593fa8
  32. 3fa0: 8000e580 800c9e4c 0009b988 00001000 00000003 7ec2cc40 00001000 00000000
  33. 3fc0: 0009b988 00001000 7ec2cc40 00000003 00000001 00000000 00000001 00000003
  34. 3fe0: 00000000 7ec2cc1c 0001362c 76f36fcc 60000010 00000003 eaffff2c e308047c
  35. Backtrace:
  36. [<8028a12c>] (sha_transform+0x0/0x17e4) from [<8031d91c>] (extract_buf+0xa0/0x110)
  37. [<8031d87c>] (extract_buf+0x0/0x110) from [<8031e374>] (extract_entropy_user+0x8c/0x12c)
  38. r9:a8592000 r8:a8592000 r7:00000718 r6:a8593efe r5:000008e8
  39. r4:0000000a
  40. [<8031e2e8>] (extract_entropy_user+0x0/0x12c) from [<8031e428>] (urandom_read+0x14/0x1c)
  41. [<8031e414>] (urandom_read+0x0/0x1c) from [<800c97ec>] (vfs_read+0xa0/0x14c)
  42. [<800c974c>] (vfs_read+0x0/0x14c) from [<800c9e84>] (SyS_read+0x44/0x80)
  43. r8:00000000 r7:7ec2cc40 r6:a87b4d80 r5:00000000 r4:00000000
  44. [<800c9e40>] (SyS_read+0x0/0x80) from [<8000e580>] (ret_fast_syscall+0x0/0x30)
  45. r9:a8592000 r8:8000e704 r7:00000003 r6:7ec2cc40 r5:00001000
  46. r4:0009b988
  47. Code: e0833006 e51b6030 e0835005 e0855002 (e5969004)
  48. ---[ end trace d23c4d5c2750c6a5 ]---
  49. Segmentation fault
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement