lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 3 Oct 2007 17:40:46 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Greg KH <gregkh@...e.de>,
	Alexander Viro <viro@....linux.org.uk>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>
Subject: Re: [bug] crash when reading /proc/mounts (was: Re: Linux
	2.6.23-rc9 and a heads-up for the 2.6.24 series..)


* Linus Torvalds <torvalds@...ux-foundation.org> wrote:

> On Wed, 3 Oct 2007, Ingo Molnar wrote:
> > 
> > hm, i just triggered the procfs crash below with -rc9 on a testbox.
> 
> You have a terminally buggy piece of shit compiler.

hm, it's 4.0.2. Not the latest & greatest but i've been using it for 2 
years and this would be the first time it miscompiles a 32-bit kernel 
out of tens of thousands of successful kernel bootups.

>  - and as a result you get an exception on the *next* page:
> 
> 	BUG: unable to handle kernel paging request at virtual address f2a40000

Hm, are you sure? This is a CONFIG_DEBUG_PAGEALLOC=y kernel, so even a 
slight overrun of a non-NIL terminated string (as suspected by Al) could 
run into a non-mapped kernel page. (which would indicate not a compiler 
bug but use-after free)

i just found another config under which i get similar crashes, config 
attached. One common theme is CONFIG_DEBUG_FS and DEBUG_PAGEALLOC - and 
CONFIG_MAC80211_DEBUGFS is not enabled in this one so it's off the hook 
i think. (the crashes are attached below)

(my serial log on this box goes back about 6 months, and that alone 
shows more than 3500 successful kernel bootups on that particular 
testsystem, each kernel built by this compiler - and there's another 
testsystem that i use even more frequently. Despite that, a compiler bug 
is still possible of course.)

	Ingo

--------------->
kobject_uevent_env
fill_kobj_path: path = '/class/vc/vcsa8'
kobject vcsa8: cleaning up
BUG: unable to handle kernel paging request at virtual address f6207000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 0000000036207000
Oops: 0000 [#1]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    1
EIP:    0060:[<c016ecf1>]    Not tainted VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f6206ffe   ebx: c2de0f50   ecx: 0000002b   edx: f6206ffe
esi: f6206007   edi: c2dddfb0   ebp: f6503f18   esp: f6503f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process awk (pid: 1160, ti=f6503000 task=f73a8390 task.ti=f6503000)
Stack: 00000ff9 f6e5cf70 f6206ffe c2dddf80 f6e5cf70 c2dddfb0 f6503f30 c016ce40 
       c05d71b5 f6730f38 f6e5cf70 c2dddfb0 f6503f70 c016f05d 00000400 08098f18 
       f6730f38 f6e5cf90 00000000 0806bc2e 00000003 08094320 f6503fb0 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f6503f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#2]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002c   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f6367f18   esp: f6367f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process MAKEDEV (pid: 1170, ti=f6367000 task=f776e390 task.ti=f6367000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f6367f30 c016ce40 
       c05d71b5 f6473f38 f650ef70 c2dddfb0 f6367f70 c016f05d 00000400 b7f13000 
       f6473f38 f650ef90 00000000 f65eb580 000b7f13 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f6367f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#3]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002c   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f6358f18   esp: f6358f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process MAKEDEV (pid: 1174, ti=f6358000 task=f73ae390 task.ti=f6358000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f6358f30 c016ce40 
       c05d71b5 f6274f38 f650ef70 c2dddfb0 f6358f70 c016f05d 00000400 b7f02000 
       f6274f38 f650ef90 00000000 f65eb7b0 000b7f02 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f6358f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#4]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002a   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f6080f18   esp: f6080f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevd (pid: 1176, ti=f6080000 task=f7346390 task.ti=f6080000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f6080f30 c016ce40 
       c05d71b5 f67b3f38 f650ef70 c2dddfb0 f6080f70 c016f05d 00000400 b7f89000 
       f67b3f38 f650ef90 00000000 f6bb5120 000b7f89 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f6080f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#5]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002b   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f597ef18   esp: f597ef00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevsend (pid: 1264, ti=f597e000 task=f778e390 task.ti=f597e000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f597ef30 c016ce40 
       c05d71b5 f67c5f38 f650ef70 c2dddfb0 f597ef70 c016f05d 00000400 b7f12000 
       f67c5f38 f650ef90 00000000 f6073510 000b7f12 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f597ef00
BUG: unable to handle kernel paging request at virtual address f6207000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 0000000036207000
Oops: 0000 [#6]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    1
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f6206ffe   ebx: c2de0f50   ecx: 0000002b   edx: f6206ffe
esi: f6206007   edi: c2dddfb0   ebp: f5929f18   esp: f5929f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevsend (pid: 1265, ti=f5929000 task=f77af390 task.ti=f5929000)
Stack: 00000ff9 f6e5cf70 f6206ffe c2dddf80 f6e5cf70 c2dddfb0 f5929f30 c016ce40 
       c05d71b5 f6352f38 f6e5cf70 c2dddfb0 f5929f70 c016f05d 00000400 b7f31000 
       f6352f38 f6e5cf90 00000000 f66c9740 000b7f31 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f5929f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#7]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002b   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f6a98f18   esp: f6a98f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevsend (pid: 1266, ti=f6a98000 task=f7397390 task.ti=f6a98000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f6a98f30 c016ce40 
       c05d71b5 f7359f38 f650ef70 c2dddfb0 f6a98f70 c016f05d 00000400 b7f8a000 
       f7359f38 f650ef90 00000000 f6376dd0 000b7f8a 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f6a98f00
BUG: unable to handle kernel paging request at virtual address f6207000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 0000000036207000
Oops: 0000 [#8]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    1
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f6206ffe   ebx: c2de0f50   ecx: 0000002b   edx: f6206ffe
esi: f6206007   edi: c2dddfb0   ebp: f60c0f18   esp: f60c0f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevsend (pid: 1267, ti=f60c0000 task=f6372390 task.ti=f60c0000)
Stack: 00000ff9 f6e5cf70 f6206ffe c2dddf80 f6e5cf70 c2dddfb0 f60c0f30 c016ce40 
       c05d71b5 f6145f38 f6e5cf70 c2dddfb0 f60c0f70 c016f05d 00000400 b7fd2000 
       f6145f38 f6e5cf90 00000000 f6aa4890 000b7fd2 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f60c0f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#9]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002a   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f64c1f18   esp: f64c1f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process udevstart (pid: 1269, ti=f64c1000 task=f6742390 task.ti=f64c1000)
Stack: 00000ff9 f650ef70 f63d0ffe c2dddf80 f650ef70 c2dddfb0 f64c1f30 c016ce40 
       c05d71b5 f6b22f38 f650ef70 c2dddfb0 f64c1f70 c016f05d 00000400 b7f47000 
       f6b22f38 f650ef90 00000000 f667ecf0 000b7f47 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f64c1f00
fill_kobj_path: path = '/class/input/input0'
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#10]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 00000057   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f588cf18   esp: f588cf00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process ls (pid: 1289, ti=f588c000 task=f7346390 task.ti=f588c000)
Stack: 00000ff9 f59bef70 f63d0ffe c2dddf80 f59bef70 c2dddfb0 f588cf30 c016ce40 
       c05d71b5 f6f26f38 f59bef70 c2dddfb0 f588cf70 c016f05d 00000400 b7f48000 
       f6f26f38 f59bef90 00000000 f6376580 000b7f48 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f588cf00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#11]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 00000023   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f55e6f18   esp: f55e6f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process lvm.static (pid: 1329, ti=f55e6000 task=f7769390 task.ti=f55e6000)
Stack: 00000ff9 f59bef70 f63d0ffe c2dddf80 f59bef70 c2dddfb0 f55e6f30 c016ce40 
       c05d71b5 f6592f38 f59bef70 c2dddfb0 f55e6f70 c016f05d 00000400 b7f77000 
       f6592f38 f59bef90 00000000 f66c9900 000b7f77 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c01028e2>] syscall_call+0x7/0xb
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f55e6f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#12]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 0000002b   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f56e0f18   esp: f56e0f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process fsck.ext3 (pid: 1331, ti=f56e0000 task=f7769390 task.ti=f56e0000)
Stack: 00000ff9 f59bef70 f63d0ffe c2dddf80 f59bef70 c2dddfb0 f56e0f30 c016ce40 
       c05d71b5 f67f3f38 f59bef70 c2dddfb0 f56e0f70 c016f05d 00000400 b7dba000 
       f67f3f38 f59bef90 00000000 f60ce510 000b7dba 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c01028e2>] syscall_call+0x7/0xb
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f56e0f00
BUG: unable to handle kernel paging request at virtual address f63d1000
 printing eip:
c016ecf1
*pdpt = 0000000000003001
*pde = 0000000000ac1067
*pte = 00000000363d1000
Oops: 0000 [#13]
SMP DEBUG_PAGEALLOC
Modules linked in:
CPU:    0
EIP:    0060:[<c016ecf1>]    Tainted: G      D VLI
EFLAGS: 00010297   (2.6.23-rc9 #20)
EIP is at seq_path+0x60/0xca
eax: f63d0ffe   ebx: c2de0f50   ecx: 00000026   edx: f63d0ffe
esi: f63d0007   edi: c2dddfb0   ebp: f5703f18   esp: f5703f00
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process sulogin (pid: 1335, ti=f5703000 task=f7397390 task.ti=f5703000)
Stack: 00000ff9 f59bef70 f63d0ffe c2dddf80 f59bef70 c2dddfb0 f5703f30 c016ce40 
       c05d71b5 f6058f38 f59bef70 c2dddfb0 f5703f70 c016f05d 00000400 b7fcf000 
       f6058f38 f59bef90 00000000 f60ce660 000b7fcf 00000073 00000000 00000000 
Call Trace:
 [<c0103c8d>] show_trace_log_lvl+0x19/0x2e
 [<c0103d3f>] show_stack_log_lvl+0x9d/0xa5
 [<c0104083>] show_registers+0x1af/0x281
 [<c0104338>] die+0x11a/0x1e8
 [<c01138d1>] do_page_fault+0x632/0x715
 [<c04e7372>] error_code+0x72/0x80
 [<c016ce40>] show_vfsmnt+0x43/0x120
 [<c016f05d>] seq_read+0xf1/0x269
 [<c0159783>] vfs_read+0x90/0x10e
 [<c0159f9e>] sys_read+0x3f/0x63
 [<c0102876>] sysenter_past_esp+0x5f/0x89
 =======================
Code: f0 ff ff 76 77 eb 7a 8b 55 ec 8b 02 89 c2 8b 4d ec 03 51 0c 89 f7 29 c7 89 79 0c 89 f0 29 d0 eb 6c 89 f8 88 06 46 eb 54 8b 55 f0 <8b> 3a 42 89 55 f0 89 f9 84 c9 74 d0 0f be d9 89 da 8b 45 08 e8 
EIP: [<c016ecf1>] seq_path+0x60/0xca SS:ESP 0068:f5703f00

View attachment "config-crash2" of type "text/plain" (45731 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ