Re: [PATCH 1/2] utrace core

From: Alexey Dobriyan
Date: Wed Aug 27 2008 - 17:45:33 EST


On Thu, Aug 28, 2008 at 01:32:11AM +0400, Alexey Dobriyan wrote:
> > And run to confirm that attach/detach/exec program still crashes it.
> > There is PREEMPT_RCU now so it will be even more not funny.
>
> As promised, quickly reproducible via expt_ptratt.c:

Another one:

kernel BUG at kernel/utrace.c:2275!
invalid opcode: 0000 [1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file: /sys/kernel/slab/utrace_attached_engine/objects
CPU 0
Modules linked in: xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack ip_tables xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 sr_mod cdrom
Pid: 5118, comm: exe Tainted: G W 2.6.27-rc4-next-20080827-utrace #5
RIP: 0010:[<ffffffff802608ef>] [<ffffffff802608ef>] utrace_get_signal+0x6ff/0x710
RSP: 0018:ffff88017ace5c98 EFLAGS: 00010093
RAX: 0000000000000000 RBX: ffff88017aced910 RCX: ffff88017e2b23c0
RDX: ffffffffffffffff RSI: ffff88017ace5cf8 RDI: ffff88017acc5640
RBP: ffff88017ace5d38 R08: 0000000000000002 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffff88017aced908 R14: ffff88017aced900 R15: ffff88017acc5640
FS: 0000000000000000(0000) GS:ffffffff80551600(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007fff249c8bc9 CR3: 000000017ad2c000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process exe (pid: 5118, threadinfo ffff88017ace4000, task ffff88017acc5640)
Stack: ffff88017ace5ef8 0000000000000002 0000000000000000 ffff88017ace5ef8
ffff88017ace5e78 ffff88017ace5f58 ffff88017e206288 0000000000000400
0000000000000401 ffff88017e206848 0000001000000000 0000000000010000
Call Trace:
[<ffffffff802412fc>] get_signal_to_deliver+0x24c/0x310
[<ffffffff8020ab54>] do_notify_resume+0xd4/0x860
[<ffffffff8028ff08>] ? check_bytes_and_report+0x38/0xd0
[<ffffffff80209b7b>] ? sys_execve+0x5b/0x80
[<ffffffff802901c3>] ? check_object+0x223/0x250
[<ffffffff80290811>] ? init_object+0x51/0x90
[<ffffffff80256f5d>] ? trace_hardirqs_on+0xd/0x10
[<ffffffff80209b7b>] ? sys_execve+0x5b/0x80
[<ffffffff8020b9c7>] int_signal+0x12/0x17
Code: 00 00 48 89 41 10 48 8b 82 20 01 00 00 48 89 41 18 e9 5e fa ff ff 0f 0b eb fe 48 8b 75 80 4c 89 ff e8 e6 e5 ff ff e9 28 fd ff ff <0f> 0b eb fe 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5
RIP [<ffffffff802608ef>] utrace_get_signal+0x6ff/0x710
RSP <ffff88017ace5c98>
---[ end trace 4eaa2a86a8e2da22 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/