lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <g2we6bf505b1004281306sa6ddb207p7a1b8853c3ab308f@mail.gmail.com>
Date:	Wed, 28 Apr 2010 15:06:58 -0500
From:	Xianghua Xiao <xiaoxianghua@...il.com>
To:	Thomas Gleixner <tglx@...utronix.de>
Cc:	john stultz <johnstul@...ibm.com>,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: 2.6.33.3-rt16 Oops caused by umount

On Wed, Apr 28, 2010 at 2:38 PM, Thomas Gleixner <tglx@...utronix.de> wrote:
> On Wed, 28 Apr 2010, Xianghua Xiao wrote:
>> Thomas,
>> I patched it and re-run it however did not find any condition from
>> your patch had a hit.
>> In your patch I changed :
>>
>> if (!file->f_path) {
>> to
>> if(!(&(file->f_path))){
>> Otherwise it won't compile as f_path is a not a pointer.
>
> True :)
>
>> # reboot
>> # Oops: Kernel access of bad area, sig: 11 [#1]
>
> Ok. Can you please enable CONFIG_DEBUG_LIST ?
>
> Thanks,
>
>        tglx
>
I turned on that, could not find any difference from the oops log.
If I try to remount it rw then ro, the remount ro will cause similar oops
Thanks,
Xianghua

# reboot
# Oops: Kernel access of bad area, sig: 11 [#1]
PREEMPT 834x SYS
Modules linked in:
NIP: c009ca1c LR: c009c9cc CTR: 00000000
REGS: cde43dd0 TRAP: 0300   Not tainted  (2.6.33.3-rt16)
MSR: 00009032 <EE,ME,IR,DR>  CR: 24000444  XER: 20000000
DAR: 31c554a2, DSISR: 20000000
TASK = ce9219d0[1396] 'umount' THREAD: cde42000
GPR00: 0000001d cde43e80 ce9219d0 c0454910 000002ac 000002ac 00008000 00000000
GPR08: 00007fff 31c5547a c0454910 cea82b78 44000442 100bbc1c 0fffd000 ffffffff
GPR16: 00000001 00000000 007fff00 00000000 00000000 0fffa1a0 00000000 cde43ec8
GPR24: 00000021 00000060 c045869c c04586b8 c050bd6c ce951488 00008000 cea82960
NIP [c009ca1c] fs_may_remount_ro+0x88/0x150
LR [c009c9cc] fs_may_remount_ro+0x38/0x150
Call Trace:
[cde43e80] [c009c9cc] fs_may_remount_ro+0x38/0x150 (unreliable)
[cde43ea0] [c009da10] do_remount_sb+0x138/0x178
[cde43ec0] [c00bc420] do_mount+0x54c/0x840
[cde43f10] [c00bc7e4] sys_mount+0xd0/0xfc
[cde43f40] [c00141e8] ret_from_syscall+0x0/0x38
--- Exception: c01 at 0xfe5f8c4
    LR = 0x10051b88
Instruction dump:
817f0000 2f8b0000 419e0008 7c005a2c 7f9fe800 419e0080 813f000c 2f890000
419e00a8 81290024 2f890000 419e00b4 <80090028> 2f800000 419e0028 a009006e
---[ end trace cd3eb2ed5361fbce ]---
------------[ cut here ]------------
kernel BUG at kernel/rtmutex.c:808!
Oops: Exception in kernel mode, sig: 5 [#2]
PREEMPT 834x SYS
Modules linked in:
NIP: c03aa79c LR: c03aa774 CTR: c011fbfc
REGS: cde43b00 TRAP: 0700   Tainted: G      D     (2.6.33.3-rt16)
MSR: 00021032 <ME,CE,IR,DR>  CR: 82004428  XER: 00000000
TASK = ce9219d0[1396] 'umount' THREAD: cde42000
GPR00: 00000001 cde43bb0 ce9219d0 00000001 000002ac 000002ac 00008000 00000000
GPR08: 00000000 00000000 ce9219d0 cde42000 22004422 100bbc1c 0fffd000 ffffffff
GPR16: 00000001 00000000 007fff00 00000000 00000000 0fffa1a0 00000000 c050bd74
GPR24: 00000021 cf0231a0 cec19b34 c050bd6c cec1a9a8 00009032 cde52080 cde52080
NIP [c03aa79c] rt_spin_lock_slowlock+0x84/0x318
LR [c03aa774] rt_spin_lock_slowlock+0x5c/0x318
Call Trace:
[cde43bb0] [c03aa774] rt_spin_lock_slowlock+0x5c/0x318 (unreliable)
[cde43c30] [c009c7e4] file_sb_list_del+0x34/0x6c
[cde43c50] [c009cf6c] __fput+0x154/0x254
[cde43c80] [c00843dc] remove_vma+0x64/0xd0
[cde43c90] [c00845b0] exit_mmap+0x168/0x1c4
[cde43cf0] [c0022f48] mmput+0x7c/0x124
[cde43d10] [c0027ba8] exit_mm+0x148/0x170
[cde43d40] [c0029d90] do_exit+0x500/0x60c
[cde43d90] [c0011cc0] die+0x19c/0x1a4
[cde43db0] [c00181e0] bad_page_fault+0x98/0xd0
[cde43dc0] [c0014688] handle_page_fault+0x7c/0x80
--- Exception: 300 at fs_may_remount_ro+0x88/0x150
    LR = fs_may_remount_ro+0x38/0x150
[cde43ea0] [c009da10] do_remount_sb+0x138/0x178
[cde43ec0] [c00bc420] do_mount+0x54c/0x840
[cde43f10] [c00bc7e4] sys_mount+0xd0/0xfc
[cde43f40] [c00141e8] ret_from_syscall+0x0/0x38
--- Exception: c01 at 0xfe5f8c4
    LR = 0x10051b88
Instruction dump:
38600001 4bc74275 801b0004 3afb0008 2f800000 419e0270 801b0010 7c4a1378
5400003a 7c400278 7c000034 5400d97e <0f000000> 83c20000 39200002 2f9e0002
---[ end trace cd3eb2ed5361fbcf ]---
Fixing recursive fault but reboot is needed!
BUG: scheduling while atomic: umount/0x00000001/1396, CPU#0
Modules linked in:
Call Trace:
[cde43900] [c0009d0c] show_stack+0x70/0x1b8 (unreliable)
[cde43940] [c001e8c8] __schedule_bug+0x90/0x94
[cde43960] [c03a9024] __schedule+0x2ac/0x390
[cde43980] [c03a92ac] schedule+0x28/0x54
[cde43990] [c0029d08] do_exit+0x478/0x60c
[cde439e0] [c0011cc0] die+0x19c/0x1a4
[cde43a00] [c0011f44] _exception+0x138/0x16c
[cde43af0] [c0014834] ret_from_except_full+0x0/0x4c
--- Exception: 700 at rt_spin_lock_slowlock+0x84/0x318
    LR = rt_spin_lock_slowlock+0x5c/0x318
[cde43c30] [c009c7e4] file_sb_list_del+0x34/0x6c
[cde43c50] [c009cf6c] __fput+0x154/0x254
[cde43c80] [c00843dc] remove_vma+0x64/0xd0
[cde43c90] [c00845b0] exit_mmap+0x168/0x1c4
[cde43cf0] [c0022f48] mmput+0x7c/0x124
[cde43d10] [c0027ba8] exit_mm+0x148/0x170
[cde43d40] [c0029d90] do_exit+0x500/0x60c
[cde43d90] [c0011cc0] die+0x19c/0x1a4
[cde43db0] [c00181e0] bad_page_fault+0x98/0xd0
[cde43dc0] [c0014688] handle_page_fault+0x7c/0x80
--- Exception: 300 at fs_may_remount_ro+0x88/0x150
    LR = fs_may_remount_ro+0x38/0x150
[cde43ea0] [c009da10] do_remount_sb+0x138/0x178
[cde43ec0] [c00bc420] do_mount+0x54c/0x840
[cde43f10] [c00bc7e4] sys_mount+0xd0/0xfc
[cde43f40] [c00141e8] ret_from_syscall+0x0/0x38
--- Exception: c01 at 0xfe5f8c4
    LR = 0x10051b88
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ