2.6.23: x86_64 oops caused by hotplug running before vdso initialized

From: Chuck Ebbert
Date: Thu Dec 06 2007 - 14:45:02 EST


pages is NULL here, implying vma->vm_private_data was NULL. This is apparently
because init_vdso_vars() is __initcall and runs after the rootfs gets populated.
An experimental initrd containing an /sbin/hotplug binary caused this. Normally
we don't have that file in the initrd. Should vdso init be done earlier to prevent
this problem?


static struct page *special_mapping_nopage(struct vm_area_struct *vma,
unsigned long address, int *type)
{
struct page **pages;

BUG_ON(address < vma->vm_start || address >= vma->vm_end);

address -= vma->vm_start;
for (pages = vma->vm_private_data; address > 0 && *pages; ++pages)
address -= PAGE_SIZE;

===> if (*pages) {
struct page *page = *pages;
get_page(page);
return page;
}

return NOPAGE_SIGBUS;
}


Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
[<ffffffff810838e9>] special_mapping_nopage+0x3c/0x63
PGD 7f568067 PUD 7f571067 PMD 0
Oops: 0000 [1] SMP
CPU 1
Modules linked in:
Pid: 219, comm: hotplug Not tainted 2.6.23.9-77.fc8 #1
RIP: 0010:[<ffffffff810838e9>] [<ffffffff810838e9>]
special_mapping_nopage+0x3c/0x63
RSP: 0000:ffff810037f41d50 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff81007f4faff8 RCX: ffffffff8137e240
RDX: 0000000000000000 RSI: 00007fffeebfe000 RDI: ffff81007f4d8420
RBP: ffff81007f4d8420 R08: 00000007fffeebfe R09: 0000000000000000
R10: 000000006ffffdff R11: 000000006ffffe34 R12: 0000000000000000
R13: ffff81007f4da000 R14: 00007fffeebfe020 R15: ffff81007f4d8420
FS: 0000000000000000(0000) GS:ffff810002c3f300(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 000000007f4ae000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process hotplug (pid: 219, threadinfo ffff810037f40000, task ffff81007f4bc820)
Stack: ffffffff8107e42c 00000010000284d0 ffff81007f569ba8 00ff81000000f2a8
0000000000000000 ffff810000000000 00000007fffeebfe 00007fffeebfe000
0000000000000000 0000000000000004 0000000000400040 ffff81007f4d80b0
Call Trace:
[<ffffffff8107e42c>] __do_fault+0x89/0x489
[<ffffffff81081bd7>] handle_mm_fault+0x4ed/0x976
[<ffffffff81084a46>] vma_link+0x70/0xfd
[<ffffffff8125f037>] do_page_fault+0x45b/0x7e4
[<ffffffff810115ef>] arch_get_unmapped_area+0x184/0x1f9
[<ffffffff8108598c>] do_mmap_pgoff+0x2eb/0x350
[<ffffffff81120cec>] __up_write+0x27/0xf3
[<ffffffff8125d51d>] error_exit+0x0/0x84
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/